PPB Forensics – May 2010 IP Theft IT Forensic Solutions Chris Hatfield Senior Manager, IT Forensics
Risk Management The process of determining the maximum acceptable level of overall risk to and from a proposed activity, then using risk assessment techniques to determine the initial level of risk and, if this is excessive, developing a strategy to ameliorate appropriate individual risks until the overall level of risk is reduced to an acceptable level.
Security Triad
Authentication
Layer 1
Layer 2
Layer 3
Sources ACB
Mobile Devices A E G I C MO N B F HJ K L D
Hard Copy BAC
Web mail, mail clients and mail servers. Communication BCA
Local, Remote and Hosted. Data Locations BAC
Pro-Active Solutions
Data transfer restrictions Internet Logging Personal restrictions Disable unnecessary media connections (USB/CD) Monitor USB connections Restrict working hours on IT equipment Monitor/log printing habits Monitor customer relationship software Restrict access to only data they require access to Log user activity Keep reliable backups Multi user authentication
Re-Active Solutions POLICE POLICE POLICE POLICE POLICE POLICE POLICE POLICE POLICE
Re-Active Solutions Control crime scene Equipment Locations People Contain evidence Forensic image Backup tapes Physical segregation Evidence continuity Do not touch original Document all actions
Re-Active Solutions Conduct Forensic Analysis Time of compromise Extent of compromise Threat assessment USB access lists Internet activity Events timeline Personal activity Business activity Printing activity File access
Questions PPB Forensics – May 2010 Joe Dicks Partner, Melbourne Phillip Russo Director, Perth Andrew McLeish Senior Manager, Melbourne Chris Hatfield Senior Manager, Sydney