PPB Forensics – May 2010 IP Theft IT Forensic Solutions Chris Hatfield Senior Manager, IT Forensics.

Slides:



Advertisements
Similar presentations
Remote Monitoring System 90% of organizations dont know: – # of devices in population – # of model numbers – # of pages printed – Toner levels in each.
Advertisements

Intermediate 2 Computing
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Automation of the home, housework or household activity. Linked systems/appliances to centralized control. Remote monitoring of the home from a tabletop.
OC RIMS Cyber Safety & Security Incident Response.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Effective Discovery Techniques In Computer Crime Cases.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
An Introduction to System Administration Chapter 1.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Kwong Chak Cheung, Dick ( ) Wong Cheuk Lun, Tim ( )
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
New Data Regulation Law 201 CMR TJX Video.
November 2009 Network Disaster Recovery October 2014.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
The Impact of Physical Security on Network Security
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Secure Data Sharing What is it Where is it What is the Risk – Strategic > What Policy should be enforced > How can the process be Audited > Ongoing Process.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
1 DMG900 + EXP1015 (GSM-GPRS) DMG900 + EXP1015 Sending SMS: to modify REM variables status and required plant information Receiving SMS: plant status,
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Networking Components 10/2/07. Parts of a Network Clients –Computers that request or order information from a server –Usually desktop computers with their.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Enterprise Data Strategy
Communications & Networks National 4 & 5 Computing Science.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Creating and Managing Networks CSC February, 1999.
Windows Small Business Server 2003 R2 Powering Small Businesses.
1 I ntegrated S ite S ecurity for G rids WP2 – Site Assessment Methodology, 20 June 2007 WP2 - Methodology ISS e G Integrated Site Security.
LO2 Understand the key components used in networking.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Part One Progress Check. Was your result as good as you hoped? The ‘multiple choice’ questions are OK if you know your stuff But the ‘longer’ questions.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Blackboard Security System
ISSeG Integrated Site Security for Grids WP2 - Methodology
CONNECTING TO THE INTERNET
How to Fix MSN error code 80072efd and Messages ?
Securing the Network Perimeter with ISA 2004
How to Fix MSN error code 403 and Messages ?
Some bits on how it works
Business Risks of Insecure Networks
Digital Forensics in the Corporation
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Global One Communications
Presentation transcript:

PPB Forensics – May 2010 IP Theft IT Forensic Solutions Chris Hatfield Senior Manager, IT Forensics

Risk Management The process of determining the maximum acceptable level of overall risk to and from a proposed activity, then using risk assessment techniques to determine the initial level of risk and, if this is excessive, developing a strategy to ameliorate appropriate individual risks until the overall level of risk is reduced to an acceptable level.

Security Triad

Authentication

Layer 1

Layer 2

Layer 3

Sources ACB

Mobile Devices A E G I C MO N B F HJ K L D

Hard Copy BAC

Web mail, mail clients and mail servers. Communication BCA

Local, Remote and Hosted. Data Locations BAC

Pro-Active Solutions

Data transfer restrictions Internet Logging Personal restrictions Disable unnecessary media connections (USB/CD) Monitor USB connections Restrict working hours on IT equipment Monitor/log printing habits Monitor customer relationship software Restrict access to only data they require access to Log user activity Keep reliable backups Multi user authentication

Re-Active Solutions POLICE POLICE POLICE POLICE POLICE POLICE POLICE POLICE POLICE

Re-Active Solutions Control crime scene Equipment Locations People Contain evidence Forensic image Backup tapes Physical segregation Evidence continuity Do not touch original Document all actions

Re-Active Solutions Conduct Forensic Analysis Time of compromise Extent of compromise Threat assessment USB access lists Internet activity Events timeline Personal activity Business activity Printing activity File access

Questions PPB Forensics – May 2010 Joe Dicks Partner, Melbourne Phillip Russo Director, Perth Andrew McLeish Senior Manager, Melbourne Chris Hatfield Senior Manager, Sydney