Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Data Storage & Security Dr Alastair F. Brown Head of Computing MRC Human Genetics Unit MRC Institute of Genetics and Molecular Medicine The University.
Chapter 16: Recovery System
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
File Management Systems
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
Security Awareness: Applying Practical Security in Your World
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
DATABASE SECURITY By Oscar Suciadi CS 157B Prof. Sin-Min Lee.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
What does “secure” mean? Protecting Valuables
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
CH2 System models.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Network security Network security. Look at the surroundings before you leap.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Systems Management Server 2.0: Backup and Recovery Overview SMS Recovery Web Site location: Updated.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Chap1: Is there a Security Problem in Computing?.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Install, configure and test ICT Networks
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
TOPSpro Special Topics I: Database Managemen t. Agenda for Module I: Database Management  TOPSpro Backup/Restore Wizard  TOPS-TOPS Import/Export Wizard.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
IT Vocabulary Basics Review Sit at tables. Need pencil/pen.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
File-System Management
Chapter 7. Identifying Assets and Activities to Be Protected
Maintaining Windows Server 2008 File Services
Controlling Computer-Based Information Systems, Part II
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
UNIT 19 Data Security 2.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
12: Security The Security Problem Authentication Program Threats
Chapter 2: Operating-System Structures
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Security.
Introduction to Operating Systems
Operating System Concepts
Operating System Concepts
Chapter 2: Operating-System Structures
Presentation transcript:

Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators, and law enforcement agencies. Evidor Features: 1) search text on hard disks and retrieves the context of keyword occurrences on computer. 2)divide space and so-called slack space. it will even find data from files that have been deleted, if physically still existing. Note: The evidor cannot access remote networked hard disks.

Evidor Services: 1)convenient way for any investigator to find and collect digital evidence on computer. 2)Evidor most handy in civil: It means if one party wants to test the computers of the other party. 3)Evidor also can be use on site for electronic discovery. 4)Evidor produces reliable, replicable, neutral and simple results. IT Security: The main goal of security to protect computers from external environments. The environments means: _Unauthorized access. _Intentional (malicious) modification or destruction. _Accidental introduction of inconsistency. _Threats.

The following are forms of malicious access: _Unauthorized reading of data or theft of information. _Unauthorized modification of data. _Unauthorized destruction of data. _Preventing legitimate use of the system. Types of threats: 1)Interruption: _An asset of the system is destroyed of becomes unavailable unusable. _Destruction of hardware. _Cutting of communication line. _Disabling the file management system. 2)Modification: _An unauthorized party not only gains access but alters with an asset. _Changing values in a data file.

Continue about modification: _Altering program so that it performs differently. _Modifying the content of messages being transmitted in a network. 3)Interception: _An unauthorized party gains access to an asset. _Wiretapping to capture data in a network. _Copying of files or programs. 4)Fabrication: _ An unauthorized party insert countefeit (not real) objects into the system. _Insertion of spurious (false) messages in a network. _Addition of records to a file. Note: The assets mean hardware,software,data and communication lines and networks.

Securing systems: Method of improving system security is to scan the system periodically for security holes done when the computer relatively unused. We will show famous software about securing systems, it is firewall. Firewall: _A firewall is a computer or router that sits between the trusted and the untrusted. _A mechanism that allows only certain traffic between trusted and untrusted systems. _Often applied to a way to keep unwanted internet traffic a way from a system. _A firewall can separate a network into multiple domains. _Example: Acommon implementation has: _The internet as the untrusted domain. _A semitrusted and semisecure network called demilitarized zone as another domain. _Company computers as the third domain

Continue example: _Connections are allowed from internet to DMZ computers. _Connections are allowed from company computers to internet _Connections are not allowed from internet or DMZ computers to company computers. _Optionally, controlled communications may allowed between DMZ and one or more company computers. Example: A web server on DMZ may need to query a database server on company network. Note: Evidor also has good tool for proving presence or absence of confidential data on computer.

Davory: _It means how we can recover and backup our data. _We will talk at details about two parts. Recovery: _Files and data are kept in main memory and on disk. _Therefore care must be taken to ensure that system failure does not result in lost of data in data in consistency. Consistency Checking: _Part of directory information (such as files names in the directory) is kept in main memory or cache to speed up access. _Directory information in main memory is more up to date than one on disk. _If a computer crashes, the table of opened with the changes in the directories of opened files will be lost. _This will leaves the file system in an inconsistent state: _The actual state of some files in not as described in the directory structure. _So a special program (consistency checker) is run at reboot time to check for and correct disk inconsistencies.

Continue about davory: Backup and restore: _Because disks sometimes fail, care must be taken to ensure that the data are not lost forever. _So system programs can be used to backup data from disk to another storage device such as floppy disk, tapes or optical disk. _Recovery from the loss of an individual file or an entire disk may be then a matter of restoring the data from backup. _To minimize the copying needed we can use information each file directory entry. Example: If the backup program knows when the last backup of a file was done and the file last write date in the directory indicates that the has not changed since that data then the file does not need to be copied again.

Continue about backup: Example of backup schedule: _Day 1: Copy all files from disk to backup medium. _Day 2: Copy all files changed since day 1 to another medium. _Day 3: Copy all files changed since day 2 to another medium. _And so on till Day N (the larger N is the more tapes or disks needed). Note: Do not reuse backup medium so many times because they could wear out.