COMPUTER FORENSICS Aug. 11, 2000 for Cambridge, Massachusetts.

Slides:



Advertisements
Similar presentations
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Advertisements

COEN 252 Computer Forensics
Tan COMPUTER FORENSICS.
Evidence Collection & Admissibility Computer Forensics BACS 371.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
Guide to Computer Forensics and Investigations, Second Edition
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
PMI Inventory Tracker™
Chapter 14: Computer and Network Forensics
What is Computer Forensics? (Some definitions) “ The process of identifying, preserving, analyzing and presenting digital evidence in a manner that is.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Guide to Computer Forensics and Investigations, Second Edition
Incident Response Updated 03/20/2015
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Guide to Computer Forensics and Investigations, Second Edition
Digital Forensics Survey of Information Assurance.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
COEN 252 Computer Forensics
What is FORENSICS? Why do we need Network Forensics?
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
1 Forensics: The use of science and technology to investigate and establish facts in criminal or civil courts of law. Computer Forensics: Commonly defined.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Digital Crime Scene Investigative Process
COEN 252 Computer Forensics Collecting Network-based Evidence.
FORENSIC ACCOUNTING - BA124 – Spring 2015 Today’s Topics n Concealment Investigation Methods.
CS526: Information Security Chris Clifton December 4, 2003 Forensics.
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
COEN 250 Computer Forensics Windows Life Analysis.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 Nov 1, 2005 Computer Forensics (Lab 2 Related)
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
COEN 250 Computer Forensics Windows Life Analysis.
AJ 104 Crime Scene Evidence, Experiments, and Models.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
The FBI Approach to Computer Investigations FBI Houston Cyber Division
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Cell Phone Forensics Investigator - ICFECI
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Application of data mining to computer forensics
CompTIA Security+ Study Guide (SY0-401)
Criminal Prosecutors with Computer Forensics
Guide to Computer Forensics and Investigations Fifth Edition
Introduction to Computer Forensics
Guide to Computer Forensics and Investigations Third Edition
Introduction to Computer Forensics
Digital Forensics CJ
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
CIS101B Week 4 Class 1 Chapter 12 Security 12.1 through 12.6
Presentation transcript:

COMPUTER FORENSICS Aug. 11, 2000 for Cambridge, Massachusetts

COMPUTER FORENSICS CAN BE MANY THINGS  Corporate or University internal investigation  FBI or (unlikely) Sheriff investigation  Computer Security Research  Post Mortem or Damage Assessment  Child Pornography  Fraud  Espionage & Treason  Corporate or University Policy Violation  Honey-pots Computer Forensics ultimately support or refute a case someone cares to make.

FORENSICS IS A FOUR STEP PROCESS  Acquisition  Identification  Evaluation  Presentation RCMP Technical Security Branch - Computer Forensics: An Approach to Evidence in Cyberspace (RCMP GRC Publications) by Special Agent Mark M. Pollitt, Federal Bureau of Investigation, Baltimore, Maryland (4/96)

PRESENTATION – Starting at the End  Many findings will not be evaluated to be worthy of presentation as evidence.  Many findings will need to withstand rigorous examination by another expert witness.  The evaluator of evidence may be expected to defend their methods of handling the evidence being presented.  The Chain of Custody may be challenged.

EVALUATION – What the Lawyers Do  This is what lawyers (or those concerned with the case) do. Basically, determine relevance.  Presentation of findings is key in this phase.  Findings submitted for evaluation as evidence will not only be evaluated for content but for “chain of custody” problems.

IDENTIFICATION – Technical Analysis  Physical Context  Logical Context  Presentation/Use Context  Opinion to support relevance of findings  Handling and labeling of objects submitted for forensic analysis is key.  Following a documented procedure is key.

FBI List of Computer Forensic Services  Content (what type of data)  Comparison (against known data)  Transaction (sequence)  Extraction (of data)  Deleted Data Files (recovery)  Format Conversion  Keyword Searching  Password (decryption)  Limited Source Code (analysis or compare)  Storage Media (many types)

THE EVIDENCE LOCKER  Restricted Access and Low Traffic, Camera Monitored Storage.  Video Surveillance & Long Play Video Recorders  Baggies for screws and label everything!  Sign In/Out for Chain of Custody

ACQUISITION – What Are the Goals?  Track or Observe a Live Intruder?  Assess Extent of Live Intrusion?  Preserve “Evidence” for Court?  Close the Holes and Evict the Unwanted Guest?  Support for Sheriff, State Police or FBI Arrest?  Support for Court Ordered Subpoena?

GROUND ZERO – WHAT TO DO  do not start looking through files  start a journal with the date and time, keep detailed notes  unplug the system from the network if possible  do not back the system up with dump or other backup utilities  if possible without rebooting, make two byte by byte copies of the physical disk  capture network info  capture process listings and open files  capture configuration information to disk and notes  collate mail, DNS and other network service logs to support host data  capture exhaustive external TCP and UDP port scans of the host  contact security department or CERT/management/police or FBI  if possible freeze the system such that the current memory, swap files, and even CPU registers are saved or documented  short-term storage  packaging/labeling  shipping

ADDITIONAL RESOURCES  RCMP Article on the Forensic Process. grc.gc.ca/tsb/pubs/bulletins/bull41_3.htmhttp:// grc.gc.ca/tsb/pubs/bulletins/bull41_3.htm  Lance Spitzner’s Page: Forensic Analysis, Building Honeypots  Fish.com Security’s Forensic Page: The Coroner’s Toolkit (Unix), Computer Forensic Class Handouts.  The Forensic Toolkit (NT).  Long Play Video Recorders.  FBI Handbook of Forensic Services.  Solaris Fingerprint Database for cryptographic comparison of system binaries.  Inspecting Your Solaris System and Network Logs for Evidence of Intrusion. improvement/implementations/i htmlhttp:// improvement/implementations/i html

Thank you … … very much, MIT!