Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.

Slides:



Advertisements
Similar presentations
Computer Forensics.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Computer Forensics.
Chapter 13: Advanced Security and Beyond
Guide to Computer Forensics and Investigations, Second Edition
Effective Discovery Techniques In Computer Crime Cases.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
BACS 371 Computer Forensics
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
Guide to Computer Forensics and Investigations Third Edition
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Chapter 14: Computer and Network Forensics
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Capturing Computer Evidence Extracting Information.
Guide to Computer Forensics and Investigations, Second Edition
Hands-on: Capturing an Image with AccessData FTK Imager
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Guide to Computer Forensics and Investigations, Second Edition
Phases of Computer Forensics 1 Computer Forensics BACS Management Information Systems for the Information Age 5e, Haag, Cummings, McCubbrey, 2005,
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Computer Related Evidence & What is this computer geek going to do now that I have done all the hard work?
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Forensics
Digital Crime Scene Investigative Process
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
& Selected Topics: Digital Forensics Part I: Computer Forensics Chapter 2 Understanding Computer Investigation Xinwen Fu.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Computer Forensics Kelsey Bretz. Overview Introduction What happens when a file is deleted Typical Computer Forensic Investigations Who uses Computer.
Electronic Evidence Seizure
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
PhD Oral Exam Presentation
Chapter 3 First Response.
Computer Forensics 1 1.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
Presentation transcript:

Computer Forensics Peter Caggiano

Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How to enter the field Questions?

Background Stockton College BS Computer Science Minor in Mathematics The George Washington University MS Computer Science Concentrations: Information Assurance Computer Forensics

Work Experience PG Lewis & Associates Corporate Forensics and Data Recovery Department of State Computer Investigations and Forensics Nuclear Regulatory Commission Office of the Inspector General

Computer Forensics Computer forensics is the discipline of acquiring, preserving, identifying and examining digital media The application of computer science and mathematics to the reliable and unbiased collection, analysis, interpretation and presentation of digital evidence.

What Is Computer Forensics? Is often more of an art, than a science. Follows clear, well-defined methodologies. Uses the same basic techniques as other forensics areas.

What Forensics Can Do High tech investigations Incident response recovery and analysis Document and file discovery Data collecting While still preserving MAC times Other volatile data

What Forensics Can Do Uncover and document evidence and leads Corroborate other evidence Assist in showing patterns of events Connect computers and people Reveal an end-to-end path of events leading to a compromise attempt, successful or not Extract data that may be hidden, deleted or otherwise not directly available

What Forensics Can’t Do Create evidence Tie the suspect to the incident Only system or profile Prove innocence or guilt Be instantaneous

Goals Details of investigation will depend on the circumstances and goals, but the steps are always the same. Goals: Support Law Enforcement To determine the root case of an event to prevent re- occurrence Re-construct the series of events surrounding the incident Assist in more types of investigations than just digital

Evidence All forms of digital media Hard drives CD’s Floppy disks USB drives Flash memory Tape drives Cameras Etc.

Evidence Categories Beyond Hard Drives Logs Managing devices Hosts/systems Servers Interviews Involved personnel Business and technical managers Device configuration files Network maps Event observation timelines Notes Meetings Passwords Response team notes and observations

Types of Forensics Traditional vs. Incident Response

Basic Methodology Identification Preparation Approach strategy Preservation Collection Examination Analysis Presentation Returning evidence

Traditional Forensics Referred to as ‘Dead’ Forensics Analysis done in a ‘Post Mortem’ state After the system has lost power Two basic rules Harm Nothing Preserve Everything

Harm Nothing Writeblocker (Hardware, Firmware, Software) Preserves the integrity of the original evidence Work of a ‘Forensic Image’ of original evidence, never original evidence Don’t handle original evidence longer than it needs to be

Forensic Image An exact, bit by bit copy of a piece of media without altering the original data. Includes slack space, unallocated, and hidden partitions. Preserves MAC times An exact “snapshot” of the hard drive at that given time

Writeblockers Hardware Only true hardware writeblocker is the Floppy tab Firmware Intermediate device between the evidence and the system Intercepts the write signal from the system and prevents any alteration of data Software Secure Linux environment Connecting file systems as ‘Read Only’ to the system HFS partition connected to a Windows system

Preserve Everything Contact system administrators Data can be on remote servers Image entire disks not just volumes Physical vs. Logical layer Image all peripheral media

Common tools MacForensicsLab FTK EnCase iLook Pro Discover Many specialized tools

Incident Response Also known as Live Forensics Growing field because of the expanding roll of networks Vital to preserve volatile data Unlike Traditional Forensics, original evidence must be altered To retrieve needed data, must use the system in question

What Incident Response Can Do Show a path that the intruder took over the network Reveal intermediate intrusions Preserve data that would be lost during Tradition Forensic Investigations Create leads to expand investigation

What Incident Response Can’t Do Solve the case alone Traditional Forensics is still needed Tie the suspect to the attack Only system Create data that is not present

Collecting the evidence Information gathering Volatile memory and configurations Enumerating Files or ambient data Compromised system Attack system Log entries in intermediate devices

What to look for Footprinting Files or ambient data on attack computer and log entries in intermediate devices Probing for weaknesses Files or ambient data on attack computer Log entries Intermediate devices Compromised system

Tools Mostly open source tools Helix Live Linux environment and response suite Backtrack Network mapping and penetration (if needed) Custom batch and script files

Big Picture Use all the data collected to tie all the events together in support of the overall investigation.

Future Problems Large data sets Steganography Cell phones PDA’s Encryption

How to enter the field Law Enforcement Mostly point and click Don’t always understand the technical side Technical Don’t understand the entire scope of the investigation Understands the ‘behind the scene’ actions of the tools

Forensic Analyst Requires Knowledge of Computer Hardware and Software Operating Systems File Systems Special “Forensics” Hardware and Software Networks General technical support

Preparation from Stockton Technical support Programming Computer security basics Analytical approach Networks Sound fundamentals

Preparation from GW SFS Scholarship Hands on forensic practical In-depth computer security Network security practices Hacking

SFS Scholarship Roughly 15 schools nationwide Pay for up to 2 years of school Pay you to go to school NSA Center of Excellence Concentrate in all areas of computer security Not all centers are scholarship schools In return: 1 to 1 Years of education to government employment

Questions?

Contact Information Peter Caggiano