Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.

Slides:



Advertisements
Similar presentations
BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
Advertisements

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
COEN 252 Computer Forensics
System Design System Design - Mr. Ahmad Al-Ghoul System Analysis and Design.
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
ACCIDENT INVESTIGATION
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Guide to Computer Forensics and Investigations, Second Edition
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Chapter 10: Authentication Guide to Computer Network Security.
Guide to Computer Forensics and Investigations, Second Edition
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
What is FORENSICS? Why do we need Network Forensics?
California Department of Corrections Crime Scene and Evidence Preservation 1 5/17/00.
Digital Crime Scene Investigative Process
COEN 252 Computer Forensics Collecting Network-based Evidence.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
QUALITY OF EVIDENCE FRCC Compliance Workshop September/October 2008.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Forensic Science: Fundamentals & Investigations, Chapter 16 1 Chapter 16 Tool Marks By the end of this chapter you will be able to: o Describe the three.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
1 PRESENTATION OF EVIDENCE Learning Domain PURPOSE FOR THE RULES OF EVIDENCE Protect the jury from seeing or hearing evidence that is: (w/b p. 1-3)
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
AJ 104 Crime Scene Evidence, Experiments, and Models.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Thomas Schwarz, S.J. SCU Comp. Eng COEN 252 Collection of Evidence.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
HOW A COMPUTER PROCESSES DATA. What is hardware? Hardware is the electric, electronic and mechanical equipment that makes up a computer What is software?
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Security Keeping you and your computer safe in the digital world.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Chapter 7: Investigating Theft Acts
Forensic and Investigative Accounting
Chapter 13 The IT Professional
Guide to Computer Forensics and Investigations Fifth Edition
Packaging Evidence Essential Question: How do we demonstrate the proper techniques for collecting and packaging physical evidence found at the crime scene?
Chapter Sixteen Rules of Evidence  .
Computer Forensics Discovery and recovery of digital evidence
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
G061 - Network Security.
Evidence Collection, Tagging and Storage
CIS101B Week 4 Class 1 Chapter 12 Security 12.1 through 12.6
Presentation transcript:

Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki

Forensics Forensics – What is it? Main concerns –Investigating and analyzing computer systems used in violation of laws –Investigating computer systems for compliance with company policies –Investigating computers systems that have been attacked. (part of incident response)

Forensics and Laws Forensics deals with legal concerns more than most other IT related duties. Evidence must be collected if you want to take legal action. Computers and networks is troubling with evidence as it is hard to “sense” and hard to prove. In fact it’s generally considered “hearsay” evidence

Random Thought Unlike many other areas of security which can mix and match. Forensics should always be done by a dedicated forensics person. Forensics is a structured PROCESS for data and evidence collection and should always be done by someone who specifically focuses on these processes and proceedures

Standards for Evidence For evidence to be considered credible it generally must be –Sufficient – convincing on it’s own –Competent – legally allowed and “reliable” –Relevant – must be material to the case and have bearing on the matter in question (more)

Types of Evidence Some evidence is “stronger” than others. There are a few types of evidence Direct Evidence - supports the truth of an assertion – example a witness who testifies they were present with and saw when a hacker broke into something. Circumstantial Evidence – indirectly proves a fact, may back up another fact that is used to prove an something. Real Evidence – tangible evidence that proves or disproves a fact. (ex fingerprints) (more)

Types of Evidence –Documentary Evidence – printouts, manuals, records etc. Most type of computer evidence is of this type –Demonstrative Evidence – a model or display used to aid the jury in understanding that an event occurred.

3 rules of evidence 1.Best Evidence rule – courts prefer the original evidence, rather than copies. 2.Exclusionary rule – evidence illegally seized cannot be used. If evidence is collected in violation of the Electronics Communication Privacy Act. It will be excluded… that means a company MUST have a policy and employees understand that they are being monitored if a company wants to use computer evidence against them. 3.Hearsay – hearsay is second hand evidence, not gathered from the personal knowledge of a witness. Computer generated evidence is hearsay evidence

Evidence Collection Evidence should be collected in a way that is reliable and doesn’t compromise the evidence itself! Sometimes when you notice a break in you have to weigh the costs of “stopping” the activity (turning off server) against keeping it running? Why? Anybody? (more)

Evidence Collection Steps in collecting evidence on a machine 1.Dump system memory 2.Power down system 3.Do a bit level image of the machine, using an stand alone machine (not the machine in question) 4.Analyze the image (more)

Evidence Collection When imaging a hard drive you should make at least 3 copies The original drive AND a 1 copy of the original should be stored away The 2 nd copy should be used for file authentication The 3 rd should be the drive you analyze You should never use the tools on the computer in question, you should use a clean “forensics station” to analyze the hard drives. (why?) You should always record the checksums of all the files on the computer before analysis (do example). See related next slide (tripwire) (more)

Tripwire screen shot

Evidence Collection Evidence should be marked when collected –Investigator, case number, date, time, location, description A log book of evidence should be maintained There should be a witness to verify evidence collection

Evidence Protection You must protect the evidence physically from damage and tampering –Protect from heat/cold –Vibration –Magnetic fields –If a device can receive electronic signals.. Shield the device

Transporting evidence Log all times someone removes evidence Be careful when transporting

Storing Evidence Store evidence in a locked away and monitored/guarded area.

Chain of Custody Once collected you must protect evidence from tampering. Chain of Custody shows who obtained evidence, where it was stored, and how had access to it. Record each item Record who collected it and where, when Description of evidence Tagged and sealed Obtain signature from anyone accepting evidence Provide signatures and seals whenever evidence is opened Provide controls against tampering while in storage

Conducting the investigation Have a formal procedure before hand! Have a professional do the analysis Take pictures before hand Use a forensics station or a live CD for analysis (what is a live CD?) Image the hard drives multiple times with a bit level method, work only on a copy Label hard drive and store in anti-static bag Before doing any analysis, do a checksum on all files and store that info. (why?) Keep a log of what you did and why, be able to explain and justify any actions taken.

File Deletion Terms When a user deletes a file, it’s not actually removed (unless using a highly secure OS) Some important terms relating to this are Free space – the space a file takes up that is still available after deletion (before something else uses it) Slack space – When file space is allocated, it is done in fixed sized blocks. A file will not actually use all this space. The unused area of a file even when in use is called the slack space. Information may be hidden in this space. (see visualization) (more)

Slack Space Hackers can hide data in the slack space to avoid detection

Chapter 20 – Review Questions Q. What is the concept of best evidence Q. When you want to do forensics on a computer, you should make a copy of the hard drive. What type of copy should you make? Q. What is the MINIMUM number of copies you should make of the original hard drive

Chapter 20 – Review Questions Q. Put these step of analysis in the correct order A.Analyze the Drive B.Power down the system C.Dump Memory D.Image the hard drive Q. Why do you run checksums/hashes on the original files before analysis? Q. Why should someone witness you as you collect the evidence? Q. What is the difference between “free space” and “slack space”