Computer & Network Forensics

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
Guide to Computer Forensics and Investigations, Second Edition
Security, Privacy, and Ethics Online Computer Crimes.
COS 413 DAY 2. Agenda Questions? Assignment 1 due next class Finish Discussion on Preparing for Computing Investigations Begin Discussion on Understanding.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.
Incidence Response & Computer Forensics, Second Edition
COS/PSA 413 Day 10. Agenda Lab 4 Write-ups are in –Will have corrected by next class Lab 5 write-ups due Oct 19 Assignment 3 posted (due Oct 21) Capstone.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Computer Forensics Day 1
Guide to Computer Forensics and Investigations Third Edition
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Third Edition
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Use Policies Deputy Attorney General Robert Morgester
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Lecture 11: Law and Ethics
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
Chapter 1 Computer Forensics and Investigations as a Profession.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Topic 5: Basic Security.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Guide to Computer Forensics and Investigations Fifth Edition Topic 1 Understanding The Digital Forensics Profession and Investigations All slides copyright.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics 1 1.
Guide to Computer Forensics and Investigations Fifth Edition
Introduction to Computer Forensics
Guide to Computer Forensics and Investigations Fifth Edition
Introduction to Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Introduction to Digital Forensics
Presentation transcript:

91.580.203 Computer & Network Forensics Xinwen Fu Chapter 1 Computer Forensics and Investigations as a Profession

Outline Understand computer forensics Prepare for computer investigations Understand enforcement agency investigations Understand corporate investigations Maintain professional conduct 91.580.203 Dr. Xinwen Fu

Understanding Computer Forensics Computer forensics involves obtaining and analyzing digital information from individual computers for use as evidence in civil, criminal, or administrative cases Network forensics yields information about how a perpetrator or hackers gained access to a network The Fourth Amendment to the U.S. Constitution protects everyone’s rights to be secure in their person, residence, and property from search and seizure What happened in O.J. Simpson’s case? 91.580.203 Dr. Xinwen Fu

Understanding Computer Forensics (continued) When preparing to search for evidence in a criminal case, include the suspect’s computers and its components in the search warrant Computer forensics is a very complicated process; there are legal, political, business and technical factors that will shape every investigation Prison Break - politics a mere hope for secrecy is not a legally cognizable expectation of privacy. 91.580.203 Dr. Xinwen Fu

CSIRT: Computer Security Incident Response Team Manage investigations and conduct forensic analysis of systems Draw on resources from those involved in vulnerability assessment risk management network intrusion detection incident response Resolve or terminate all case investigations Michael Scofield Lincoln Burrows http://en.wikipedia.org/wiki/Prison_Break 91.580.203 Dr. Xinwen Fu

Components of CSIRT Vulnerability assessment and risk management Computer investigations & network intrusion detection Incident response Computer CSIRT 91.580.203 Dr. Xinwen Fu

Vulnerability Assessment and Risk Management Test and verify the integrity of standalone workstations and network servers Examine physical security of systems and the security of operating systems (OSs) and applications Test for known vulnerabilities of OSs Launch attacks on the network, workstations, and servers to assess vulnerabilities 91.580.203 Dr. Xinwen Fu

Computer Investigations Involves scientifically examining and analyzing data from computer storage media so that the data can be used as evidence in court The evidence can be inculpatory or exculpatory – Duke lacrosse team rape charge Objective is different from that of data recovery or disaster recovery Investigating computers includes: Securely collecting/searching computer data Examining suspect data to determine details such as origin and content Presenting computer-based information to courts Applying laws to computer practice Former Duke Lacrosse 'Rape' Prosecutor Charged With Withholding Evidence, Misleading Court RALEIGH, N.C. —  Former Duke lacrosse rape prosecutor Mike Nifong has been slapped with additional ethics charges by the state bar association, which has accused him of withholding DNA evidence and making misleading statements to the court. http://www.foxnews.com/story/0,2933,246281,00.html 91.580.203 Dr. Xinwen Fu

Network Intrusion Detection and Incident Response Functions Detect intruder attacks using automated tools and monitoring network firewall logs manually Track, locate, and identify the intruder Deny further access to the network Collect evidence for civil or criminal litigation against the intruders 91.580.203 Dr. Xinwen Fu

Implement Security Measures Course Outline CSIRT: Computer Security Incident Response Team Incident occurs: Point-in-Time or Ongoing Investigate the incident pre-incident preparation Detection of Incidents Initial Response Formulate Response Strategy Data Collection Data Analysis Reporting Pre-incident preparation: Take actions to prepare the organization and CSIRT before an incident occurs Detection of incident: Identify a potential computer security incident Initial response: Perform an initial investigation, recording the basic details surrounding the incident, assembling the incident response team, and notifying the individuals who need to know about the incident Formulate response strategy: Based on the results of all the known facts, determine the best response and obtain management approval. Determine what civil, criminal, administrative, or other actions are appropriate to take, based on the conclusions drawn from the investigation Investigate the incident: perform a thorough collection of data. Review the data collected to determine what happened, when it happened, who did it, and how it can be prevented in the future. Reporting: Accurately report information about the investigation in a manner useful to decision makers. Resolution: Employ security measures and procedural changes, record lessons learned, and develop long-term fixes for any problems identified. Resolution Recovery Implement Security Measures 91.580.203 Dr. Xinwen Fu

A Brief History of Computer Forensics Mainframe era Well-known crimes ― one-half cent $12.234 PC era By the early 1990s, specialized tools for computer forensics were available ASR Data created the tool Expert Witness for the Macintosh Recover deleted files and file fragments EnCase by one member of ASR Data FTK (Access Data's Forensic Toolkit) iLook (reading disk images) 91.580.203 Dr. Xinwen Fu

Outline Understand computer forensics Prepare for computer investigations Understand enforcement agency investigations Understand corporate investigations Maintain professional conduct 91.580.203 Dr. Xinwen Fu

Computer Investigations and Forensics Public investigations Target criminal cases Conducted by government agencies Follow the law of search and seizure/enforcement www.usdoj.gov/criminal/cybercrime Private or corporate investigations Target civil cases Conducted by private companies/lawyers Follow private or corporate policies 91.580.203 Dr. Xinwen Fu

Outline Understand computer forensics Prepare for computer investigations Understand enforcement agency investigations Understand corporate investigations Maintain professional conduct 91.580.203 Dr. Xinwen Fu

Understanding Enforcement Agency Investigations Understand local city, county, state, and federal laws on computer-related crimes Until 1993, laws defining computer crimes did not exist States have added specific language to their criminal codes to define crimes that involve computers "Computers and networks are only tools that can be used to commit crimes and are, therefore, no different from the lockpick a burglar uses to break into a house" Possible computer crimes: data theft, child molestation images, drug transaction information on a hard disk 91.580.203 Dr. Xinwen Fu

Legal Process for Computer Crimes A criminal case follows three stages: Complaint Someone files a complaint Investigation A specialist investigates the complaint Prosecution Prosecutor collects evidence and builds a case Complaint Investigation Prosecution 91.580.203 Dr. Xinwen Fu

Levels of Law Enforcement Expertise for a Police (CTIN) Level 1 (street police officer) Acquiring and seizing digital evidence Level 2 (detective) Managing high-tech investigations Teaching the investigator what to ask for Understanding computer terminology What can and cannot be retrieved from digital evidence Level 3: (computer forensics expert) Specialist training in retrieving digital evidence Computer Technology Investigators Network http://www.ctin.org/ 91.580.203 Dr. Xinwen Fu

Typical Affidavit of Search Warrant for Seizing Evidence 91.580.203 Dr. Xinwen Fu

Outline Understand computer forensics Prepare for computer investigations Understand enforcement agency investigations Understand corporate investigations Maintain professional conduct 91.580.203 Dr. Xinwen Fu

Understanding Corporate Investigations Business must continue with minimal interruption from your investigation Investigation is secondary to stopping the violation and minimizing the damage or loss to the business Can Microsoft shutdown their servers for forensics purposes? 91.580.203 Dr. Xinwen Fu

Establishing Company Policies Company policies are built in order to avoid litigation Without defined policies, a business risks exposing itself to litigation by current or former employees Policies provide: Rules for using company computers and networks 91.580.203 Dr. Xinwen Fu

Displaying Policy Warning Banners Avoid litigation displaying a warning banner on computer screens A banner: Informs users that the organization can inspect computer systems and network traffic at will Voids right of privacy Establishes authority to conduct an investigation 91.580.203 Dr. Xinwen Fu

Displaying Warning Banners (continued) 91.580.203 Dr. Xinwen Fu

Displaying Warning Banners (continued) Types of warning banners: For internal employee access (intranet Web page access) External visitor accesses (Internet Web page access) 91.580.203 Dr. Xinwen Fu

Displaying Warning Banners (continued) Examples of warning banners: Access to this system and network is restricted Use of this system and network is for official business only Systems and networks are subject to monitoring at any time by the owner Using this system implies consent to monitoring by the owner Unauthorized or illegal users of this system or network will be subject to discipline or prosecution 91.580.203 Dr. Xinwen Fu

Banner Example in Reality Recall: why do we need policies and warning banners? Courts have ruled that company-owned equipment does not contain any “personal information” Without them, your authority to inspect might conflict with the user's expectation of privacy, and a court might have to determine the issue of authority to inspect 91.580.203 Dr. Xinwen Fu

Mercury.cs.uml.edu Banner 91.580.203 Dr. Xinwen Fu

Texas A&M CS Department Banner 91.580.203 Dr. Xinwen Fu

SSHD Banner By default sshd server turns off this feature Login as root user; then create your login banner file Edit /etc/ssh/sshd-banner Edit /etc/sshd/sshd_config and add Banner /etc/ssh/sshd-banner Save file and restart the sshd server /etc/init.d/sshd restart 91.580.203 Dr. Xinwen Fu http://www.cyberciti.biz/tips/how-to-force-sshd-server-to-display-login-banner-before-login-change-the-ssh-server-sshd-login-banner.html

Linux Console Login Banner File /etc/issue, default information Fedora Core release 3 (Heidelberg) Kernel \r on an \m \r – OS release such as “Kernel 2.6.17” \m – Machine such as “i686” 91.580.203 Dr. Xinwen Fu

Windows XP Logon Warning Message Click Start/Control Panel Double-click Administrative Tools / Local Security Policies / Security Options Set Interactive Logon: Message text for users attempting to log on Set Interactive Logon: Message title for users attempting to log on Logoff/Logon to test 91.580.203 Dr. Xinwen Fu http://www.ciac.org/ciac/bulletins/j-043.shtml http://www.windowsnetworking.com/kbase/WindowsTips/Windows2000/RegistryTips/Miscellaneous/LogonBanner-DisplayingWarningMessage.html

Designating an Authorized Requester Not everyone should be an investigator Establish a line of authority Specify an authorized requester who has the power to conduct investigations Groups who can request investigations: Corporate Security Investigations Corporate Ethics Office Corporate Equal Employment Opportunity Office Internal Auditing The general counsel or legal department 91.580.203 Dr. Xinwen Fu

Conducting Security Investigations Public investigations search for evidence to support criminal allegations Private investigations search for evidence to support allegations of abuse of a company’s assets and criminal complaints Abuse or misuse of corporate assets E-mail abuse/Malicious e-mail Excessive private Internet abuse Employee company startup Porn site 91.580.203 Dr. Xinwen Fu

Employee Abuse of Computer Privilege 91.580.203 Dr. Xinwen Fu

Distinguishing Personal and Company Property PDAs and personal notebook computers Employee hooks up his PDA device to his company computer Company gives PDA to employee as bonus What is your opinion of company policies on those items? 91.580.203 Dr. Xinwen Fu

Outline Understand computer forensics Prepare for computer investigations Understand enforcement agency investigations Understand corporate investigations Maintain professional conduct 91.580.203 Dr. Xinwen Fu

Maintaining Professional Conduct Professional conduct determines credibility Ethics Morals Standards of behavior Conduct with integrity Maintain objectivity and confidentiality Enrich technical knowledge 91.580.203 Dr. Xinwen Fu

Maintaining Objectivity Sustain unbiased opinions of your cases Avoid making conclusions about the findings until all reasonable leads have been exhausted you considered all the available facts Ignore external biases to maintain the integrity of the fact-finding in all investigations 91.580.203 Dr. Xinwen Fu

Keep the Case Confidential Until you are designated as a witness or required to release a report at the direction of the attorney or court 91.580.203 Dr. Xinwen Fu

Enrich Technical Knowledge Stay current with the latest technical changes in computer hardware and software, networking, and forensic tools Learn about the latest investigation techniques that can be applied to the case Record fact-finding methods in a journal Include dates and important details that serve as memory triggers Develop a routine of regularly reviewing the journal to keep past achievements fresh 91.580.203 Dr. Xinwen Fu

Enrich Technical Knowledge (continued) Attend workshops, conferences, and vendor-specific courses conducted by software manufacturers Monitor the latest book releases and read as much as possible about computer investigations and forensics Computer Technology Investigators Northwest (CTIN) High Technology Crime Investigation Association (HTCIA) LISTSERV or Majordomo: mailing lists Certificate: EC-Council - CHFI Computer Hacking Forensic Investigator 91.580.203 Dr. Xinwen Fu