OC RIMS Cyber Safety & Security Incident Response.

Slides:



Advertisements
Similar presentations
Internet Security What you can do to protect your family.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Network Security.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
Breaking Trust On The Internet
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Guide to Computer Forensics and Investigations, Second Edition
BACS 371 Computer Forensics
Security+ Guide to Network Security Fundamentals
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.
Technology for Computer Forensics by Alicia Castro.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
DVG-N5402SP.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Capturing Computer Evidence Extracting Information.
Securing a Wireless Network
Your storage on the ground; Your files in the cloud.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Information Systems
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Protecting Your Information Assets
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
Digital Crime Scene Investigative Process
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
PLUG IT IN SIX Protecting Your Information Assets.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.
Network Security & Accounting
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Web Forensics Matthew M. Kimball.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Managing Windows Security
CYBER FORENSICS | Kiran Bettadapur S. | 5/8/2018.
Working at a Small-to-Medium Business or ISP – Chapter 8
TECHNOLOGY GUIDE THREE
Computer Forensics 1 1.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Business Risks of Insecure Networks
Introduction to Digital Forensics
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Cybersecurity and Cyberhygiene
Test 3 review FTP & Cybersecurity
INTERNET SECURITY.
Presentation transcript:

OC RIMS Cyber Safety & Security Incident Response

Types of Cyber Events - Intrusion (external/internal) - Hackers Targeting Asset/Account Managers - Sexual Harassment - Termination - Workmen's Comp Claims - Theft of IP

Civil vs. Criminal Theft of Personal Data Theft of IP Stalking Cyber Impersonation Hacking Wire Tapping Child Pornography Look Familiar?

Preservation

Preserve Digital Evidence The most important thing to remember is to protect and preserve the evidence no matter what the final outcome! The most important thing to remember is to protect and preserve the evidence no matter what the final outcome! If you choose not to preserve the evidence now it may be altered or destroyed when you need it! If you choose not to preserve the evidence now it may be altered or destroyed when you need it!

What is Imaging? o Write blocked/protected o Bit-by-bit copy of the device o Verified o Proven and court accepted methodology o Different then Ghost or other file copying!!

Forensics What can it do for you? Clear and concise explanation of: Forensic copy of original evidence Forensic copy of original evidence Methodology used for examination Methodology used for examination Whether or not the date/time stamps are a reliable indicator Whether or not the date/time stamps are a reliable indicator What is slack and unallocated space What is slack and unallocated space How is data stored and recovered How is data stored and recovered

Deleting - Recycle Bin Artifacts - File systems - Recoverable

Anti-Forensics

Wiping

Monitoring o Third party o Offsite, appliance or application o Local

Encryption o Transmission (SSH) o User and Master Keys o Securing Your Keys o Whole Disk, Volume or File Level

Prevention #1 hacking tool = social engineering o Operating System Permissions o Logging of Data Access & Transfers (system wide/centralized/long term) (system wide/centralized/long term) o Monitoring o Restrict Web Browsing (browser) o Removable Media o Vulnerability Testing

Secure Wireless SSID SSID WEP/WAP WEP/WAP MAC Address MAC Address Wired Wired Air Card Air Card

Wireless

The “Cloud” Dangers and Risk Uncontrolled Access by Users Unsecured Access Internet Dependant

Cloud Tools and Tips Google/MSN Admin Controls Secure Computer/Connection Password Rules Backup Two-Factor Authentication

David McCain