This presentation will take a look at to prevent your information from being discovered by and investigator.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
®® Microsoft Windows 7 for Power Users Tutorial 6 Optimizing Your Hard Disk.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
File Management Systems
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Week:#14 Windows Recovery
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
Operating Systems.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Capturing Computer Evidence Extracting Information.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 7 Installing and Using Windows XP Professional.
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Configuring the MagicInfo Pro Display
Microsoft ® Official Course Module 13 Troubleshooting and Recovering Windows 8.
Hands-On Microsoft Windows Server 2008
Module 13: Configuring Availability of Network Resources and Content.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Tutorial 11 Installing, Updating, and Configuring Software
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Week #7 Objectives: Secure Windows 7 Desktop
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
To proceed onto the next stage of the install please Agree to the terms and conditions and select next.
Troubleshooting Windows Vista Security Chapter 4.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
1 Computer Disk management Using Disk Management To open Disk Management: Click Start, right-click My Computer, and then click Manage. Under the Storage.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Computing Fundamentals Module Lesson 10 — File Management with Windows Explorer Computer Literacy BASICS.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
Microsoft Office XP Illustrated Introductory, Enhanced with Programs, Files, and Folders Working.
Your Digital Technology Briefcase My information…when and where I need it.
Understanding Backup and Recovery Methods Lesson 8.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Microsoft Windows XP Professional MCSE Exam
Understand Encryption LESSON 2.5_A Security Fundamentals.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Product Training 1 JetFlash Software Application.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 3: Windows7 Part 3.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
File-System Management
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Chapter 3: Windows7 Part 3.
Microsoft Windows 7 Basics
Presentation transcript:

This presentation will take a look at to prevent your information from being discovered by and investigator.

 BitLocker  BCWipe  PD-8700 Hard Drive Degausser & Physical Hard Drive Destroyer

 BitLocker Drive Encryption is a data protection feature available in Windows Enterprise and Ultimate for client computers and in Windows Server BitLocker is Microsoft's response to a frequent customer request: address these very real threats of data theft or disclosure from lost, stolen or inappropriately decommissioned PC hardware with a tightly integrated solution in the Windows Operating System.

 BitLocker provides both mobile and office enterprise information workers with enhanced data protection should their systems be lost or stolen and secure data deletion when it comes time to decommission those assets. Not to mention preventing investigators from accessing your data.  BitLocker enhances data protection by bringing together two major sub-functions: drive encryption and the integrity checking of early boot components.

 Strengths  Drive encryption protects data by preventing unauthorized users from breaking Windows file and system protection on lost, stolen or inappropriately decommissioned computers. This protection is achieved by encrypting the entire Windows volume; with BitLocker all user and system files are encrypted including the swap and hibernation files.  Integrity checking the early boot components helps to ensure that data decryption is performed only if those components appear unmolested and that the encrypted drive is located in the original computer.

 Weaknesses  BitLocker is limited to Windows Server 2008, Windows Enterprise and Ultimate Operating Systems

 The Dooping  BitLocker prevents data from being retrieved from the hard disk once the disk has been removed from it’s original host machine.

 BCWipe TM data wiping software enables you to permanently delete selected files so that they can never be recovered or undeleted. BCWipe embeds itself within Windows and can be activated from the Explorer FILE Menu OR from the context (right-click) menu OR from BCWipe Task Manager OR from a command-line prompt.

 Strengths  Destroys all contents of the whole hard drive, including boot records and operating system files.  Delete with wiping Using this command, which is available in the context menus of the 'My computer' window, you can delete and wipe a file, a folder, or a group of files and folders.  Wipe free disk space Using this command, available in the context menus of the 'My computer' window, you can completely and permanently remove all traces of previously deleted files.  Wipe Swap File The swap file is a Windows system file that is used for virtual memory support. If you are working on a file or document (even one that has been encrypted), Windows will copy all or part of it in an open unencrypted form to the swap file on your hard disk. Encryption keys, passwords, and other sensitive information can also be 'swapped' to your hard drive. Even if you use all the security features in the latest versions of Windows, simply investigating the swap file in DOS mode with readily available tools may allow for significant data retrieval. BCWipe offers the option to wipe unused portions of the swap file to ensure your total security.

 Wipe File Slacks A file slack is the disk space from the end of a file up to end of the last cluster used by that file. You can turn file slacks wiping on or off before running BCWipe commands. (Read more explanations on file slacks in the Tips & Tricks section.)Tips & Tricks  Wipe Empty Directory Entries* The file system records the names and attributes of files to a special area of your disk drive (so called 'directory entries' for FAT and MFT for NTFS). When a file is deleted, the corresponding directory entry is modified by the file system which makes it invisible to Windows and to you. However, most of the information still exists and the name and attributes can be restored using any recovery utility. BCWipe shreds directory entries and MFT so that the information can never be recovered.  Swap File Encryption* The BCWipe CyrptoSwap utility allows you to encrypt the Swap File, which provides you with additional security. Supported symmetric algorithms and key lengths: Rijndael 256-bit key (Cipher Block Chaining Mode), Blowfish 448-bit key (Cipher Block Chaining Mode), GOST bit key (Cipher Feedback Mode), Twofish 256-bit key (Cipher Block Chaining Mode).

 Hexadecimal File Viewer* Using the Hexadecimal File Viewer, you can examine contents of files after wiping. This utility is useful for investigating the quality of the wiping process, for example when you use a custom wiping scheme.  BCWipe Task Manager* Administrators now have complete flexibility for choosing what to wipe, when to wipe it, and how to wipe it. Lists of recently used files are removed from the File Menus of specific programs. Wipe your Internet Cache, Cookies, History, etc. Wipe the entire swap file. Wipe selected Registry Keys and user activity history stored by Windows.  Transparent Wiping* With BCWipe's new Transparent Wiping feature, all wiping operations can now be set to run automatically - deleted files are securely wiped on the fly. Transparent Wiping securely erases the following sensitive information on the fly: - All files and folders deleted using normal commands - Temporary files created by Windows and applications - Temporary files created when working with data secured with encryption - Data stored in Windows Restore Point when the Restore Point is deleted - Data stored in Recycle Bin when Empty Recycle Bin is selected - Or only specific types of files, folders and applications by configuring include/exclude lists

 Weakness  Once BCWipe is initiated it can not be recovered.

 The Doop  BCWipe can be initiated upon unauthorized access to your drive.

 The PD-8700 is designed to provide a safe, convenient and effective method of destroying confidential information contained on hard drives. The PD-8700 degausses and then physically destroys the hard drive ensuring that the information previously contained on the hard drive is permanently erased and destroyed.

 Strengths  The Destruction mode of the PD-8700 is designed to physically disable the hard drive, preventing data from being recovered. The physical destruction visibly identifies hard drives that have been properly sanitized.  The PD-8700 does not rely on software, therefore it will erase all operating systems. In addition, degaussing is the only way of erasing hard drives that are not functioning.

 Weakness  Requires an actual machine in order to accomplish the task and can not be done without someone actually placing the drive into the machine.

 The Doop  Let’s see an investigator recover data from this.

 dows-vista/features/bitlocker.aspx dows-vista/features/bitlocker.aspx   htm htm