Presentation is loading. Please wait.

Presentation is loading. Please wait.

© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...

Similar presentations


Presentation on theme: "© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance..."— Presentation transcript:

1 © Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance...

2 © Sapphire 2006 Or do you.......? of circumstances. opportunity n., pl., -ties. A favourable or advantageous circumstance or combination of circumstances. chance n. The unknown and unpredictable element in happenings that seems to have no assignable cause. Test

3 © Sapphire 2006 Opportunity A brief guide to: What, when, why and how. You only get one opportunity!

4 © Sapphire 2006 Digital Forensics The process of deriving evidence from digital media Requires that the data is shown to be reliably obtained –Is not changed in any way –Is complete –Can be repeated And very importantly, that it can be understood. Digital forensics – first steps

5 © Sapphire 2006 SOURCES OF COMPUTER EVIDENCE Personal Computers Server Computers Removable media Automatically-produced log files Evidence Types

6 © Sapphire 2006 BASIC PRINCIPLES OF COMPUTER FORENSICS The forensic examination of the contents of a computer is a skilled job and special procedures, techniques and tools are required to ensure that any information that is retrieved can be presented as evidence in a Court of Law. Evidential Integrity Requires that the material being examined is not changed in any way. What is examined must be an exact copy of the original. Continuity of Evidence Refers to the means used to vouch for the actions that have taken place regarding the item under examination. This covers the seizure, handling and storage of equipment and copies of the data. Never forget.............

7 © Sapphire 2006 Incident Response Teams First steps

8 © Sapphire 2006 Key roles and responsibilities What technical skills are required What training is required Management

9 © Sapphire 2006 Key roles and responsibilities Officer In charge Forensic Investigators and Auditors Independence Working within the law and your policies Roles & Responsibiities

10 © Sapphire 2006 What training will be needed? Product Training Incident Response Techniques Health and Safety Computer Misuse Act and relevant law Internal Policies...more…more…more… Training

11 © Sapphire 2006 Current Practice ACPO Guidelines

12 © Sapphire 2006 THE PRINCIPLES OF COMPUTER-BASED EVIDENCE (ACPO)‏ Principle 1 No action taken should change data held on a computer or other media which may subsequently be relied upon in Court. Principle 2 In exceptional circumstances where a person finds it necessary to access original data held on a target computer, that person must be competent to do so and to give evidence explaining the relevance and implications of their actions. ACPO Guidelines

13 © Sapphire 2006 THE PRINCIPLES OF COMPUTER-BASED EVIDENCE (ACPO)‏ Principle 3 An audit trail or other record of all processes applied to computer-based evidence should be created and preserved. An independent third party should be able to examine those processes and obtain the same result. Principle 4 The Officer in charge of the case is responsible for ensuring that the law and these principles are adhered to. This applies to the possession of, and access to, information contained in a computer. They must be satisfied that anyone accessing the computer, or any use of a copying device, complies with these laws and principles. ACPO Guidelines

14 © Sapphire 2006 Search and Seizure Secure the evidence

15 © Sapphire 2006 Pre-seizure planning What you will need Who should be on your response team Step by step computer incident response procedure Incident response

16 © Sapphire 2006 PRE-SEARCH PREPARATION The forensic unit – i.e. the imaging / investigation hw and sw An adequate toolkit – screwdrivers, pliers Plenty of Stationery Digital camera Disk boxes Mobile telephone Blank floppy disks / CDs A torch Data Cables of every variety Network Card Power extensions Pre search preparation

17 © Sapphire 2006 EVIDENCE PROCESS Identify What sources are available? Seize ‘Bag and Tag’ Best Evidence Transport Safely and responsibly take the best evidence to a secure location Receive Accept responsibility for the evidence Store Ensure securely held free from risk of contamination Evidence process

18 © Sapphire 2006 EVIDENCE PROCESS Preserve Take a reliable copy of the evidence Reserve Put the original Best Evidence source in a secure place Analyse Investigate the evidence on the preserved copy Produce Identify the exhibits that establish facts Testify Create a statement and go to court Evidence process

19 © Sapphire 2006 On Site Server room challenges

20 © Sapphire 2006 ON SITE Machines switched on and operating Clearly transferring data receiving incriminating data receiving exonerating data receiving routine data may be overwriting evidence on the disk may be overwriting evidence in memory On-site Seizure

21 © Sapphire 2006 MACHINES WHICH ARE SWITCHED ON Secure the area and log your actions On-site Seizure

22 © Sapphire 2006 MACHINES WHICH ARE SWITCHED OFF Be satisfied that the computer is actually switched off - not in hibernate mode - not running a blank screensaver. On-site Seizure

23 © Sapphire 2006 ESSENTIAL KIT Integrated (imaging) Solution: EnCase – now up to version 6.8 FTK – Access Data Third Party Plug-ins: QuickView ACDSee WinRar IrfanView KaZAlyser NetAnalysis PDA Seizure Email Examiner Forensic Tools

24 © Sapphire 2006 Legal Issues Points to consider

25 © Sapphire 2006 THE LAW AND COMPUTERS Computer Misuse Act 1990 Data Protection Act 1998 Laws of Pornography –Obscene Publications Act 1959 –Protection of Children Act 1978 –Criminal Justice Act 1988 –Sexual Offences Act 2003 Laws of ‘Harm’ –Theft Act 1968 / 1978 –Offences Against the Person Act 1861 Your policies & the law

26 © Sapphire 2006 Advice to Beginners There are some very powerful tools available. But with great power comes great responsibility, and as a potential forensics investigator, it is your responsibility to learn how to use the tools properly. Simple mistakes and good intentions can completely destroy digital evidence. It is strongly recommended that aspiring investigators learn about digital forensics, and practice on controlled systems before attempting to collect evidence from a real system. Summary

27 © Sapphire 2006 Questions? Questions

28 © Sapphire 2006 Offices in the: North, Scotland & London, David Horn david.horn@sapphire.net 0845 58 27001 Contact Details


Download ppt "© Sapphire 2006 Computer Misuse in the Workplace You only get one chance..... David Horn You only get one chance..."

Similar presentations


Ads by Google