Forensics Week 6.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
OC RIMS Cyber Safety & Security Incident Response.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Developing a Records & Information Retention & Disposition Program:
WLCG Cloud Traceability Working Group progress Ian Collier Pre-GDB Amsterdam 10th March 2015.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Cloud Usability Framework
Welcome Course 20410B Module 0: Introduction Audience
Cloud Computing ity-notre-dame-logo.jpg Matthew Cunningham Selina Sambar Maria Skorcz.
Information Security Technological Security Implementation and Privacy Protection.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
Global Program Management Dawn Davis, SVP Global Records Management.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
Multiboot System under Windows XP – Ubuntu – Windows 7 Qiong LIN - 28 April 2012.
Cloud Computing New Technology Presentation Riley Woldt EDT 661.
WLCG Cloud Traceability Working Group face to face report Ian Collier 11 February 2015.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
1 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO x4242 Cloud Network Defense.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Mastering Windows Network Forensics and Investigation Chapter 17: The Challenges of Cloud Computing and Virtualization.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
MDOP Compatibility & Management Microsoft Application Virtualization (App-V) Microsoft Enterprise Desktop Virtualization (MED-V) Reduce Support Costs.
Windows Certification Paths OR MCSA Windows Server 2012 Installing and Configuring Windows Server 2012 Exam (20410) Administering Windows Server.
Cloud Computing HOW PROFITABLY CLOUD COMPUTING IS TO YOUR BUSINESS?
LANDesk Software Confidential Data Analytics LANDESK Day 5. March 2014 Jan Pisarik Technical Presales Manager.
Clouding with Microsoft Azure
10/16/2017 7:22 AM © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
Protect your Digital Enterprise
University of Colorado at Colorado Springs
Mobile Devices in the Corporate World
Out of sight, out of….. control?
Chapter 6: Securing the Cloud
PhD Oral Exam Presentation
Avenues International Inc.
| Data Connectors: Atlanta, GA
Platform as a Service (PaaS)
The Future? Or the Past and Present?
VIRTUALIZATION & CLOUD COMPUTING
Cloud Computing.
Reducing Cost and Risk During an Investigation
Security managed from the cloud.
The Future? Or the Past and Present?
Power BI Security Best Practices
Introduction to Cloud Computing
Data Protection & Security
Secure & Unified Identity
Cloud Testing Shilpi Chugh.
In-Class Activity… Cloud Computing.
Securing Cloud-Native Applications Jason Schmitt CEO
Azure AD Deployment Are you maximising your Azure AD investment?
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Forensics Week 4.
Ad Hoc Phase Structured Phase Enterprise Phase
Securely run and grow your business
To change the image on this slide, select the picture and delete it
Presentation transcript:

Forensics Week 6

Digital Forensic Challenges What are we trying to determine? Who did or/is doing what? When was it done? What was it changed from and to? Why? ... Being the most complicated Question Programming 1st and foremost the application needs to have security in mind Identity management, Role separation, Logging Is the application designed to tell us who, when, what and why? Company Investment in tracking technology Basic ability to pull logs Security Incident Event Monitor (SIEM) to correlate events Challenges In the environment Hardware – Ease of wiping machines, Ease to replace Hard Drives, Self-Wiping Drives Cloud – SaaS and PaaS – logging, access, encryption, shared multi-tenant data Cloud – Access from multiple devices (compromise or tracking) Legal Issues – evolving Privacy and Protection rules, BYOD Cloud – Preservation, Storage, Chain of Custody, Cross-Organizational Cooperation, Logging (current tools and process are insufficient)

Other Digital Forensic Challenges Encryption Lack of Training Lack of Resources Volume of Data Internet of Things/Device Proliferation Legal Challenges Number of Cases and Expectations for what’s possible