1 / 70

COS 413

COS 413 . DAY 2. Agenda. Questions? Assignment 1 due next class Finish Discussion on Preparing for Computing Investigations Begin Discussion on Understanding Computer Investigations Tomorrow Lab will be in OMS Room 120 Pick a lab partner (PSA/COS teams) You will need 4 1.44 floppies

Download Presentation

COS 413

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COS 413 DAY 2

  2. Agenda • Questions? • Assignment 1 due next class • Finish Discussion on Preparing for Computing Investigations • Begin Discussion on Understanding Computer Investigations • Tomorrow Lab will be in OMS Room 120 • Pick a lab partner (PSA/COS teams) • You will need 4 1.44 floppies • Hands-on Projects (page 66) Projects 2-1 and 2-2 • Lab write-up due in before next lab (One grade per team)

  3. Public Service Announcement • From Steve Worona [sworona@EDUCAUSE.EDU] • From 1-2pm Eastern Time this Thursday, September 15, I'll have the pleasure of hosting David Post on EDUCAUSE Live! David has been an ICPL participant since we began the program in 1996, speaking on the general topic of Internet governance. On Thursday, his topic will be "Whose Law? The Problem of 'Jurisdiction' on the Internet". Here's the abstract: • The question "What law am I obligated to obey?" is a fundamental one in any legal system and one that every lawyer should be able to answer for his or her client. It is, though, deceptively complex-even in the non-Internet context. David Post will try to make some sense of this question as applied to activity on the Internet, both by presenting a very general framework for thinking about "jurisdictional" questions and by analyzing a number of recent cases raising specific jurisdictional issues. • There's no charge for the Webcast, but registration is required at <http://www.educause.edu/live0518>. • EDUCAUSE Live! is open to all; feel free to pass the word. All EDUCAUSE Live! events are archived for future access.

  4. Preparing For Computer Investigations (continued)

  5. Understanding Enforcement Agency Investigations • Understand: • Local city, county, state or province, and federal laws on computer-related crimes • Legal processes and how to build a criminal case

  6. Understanding Enforcement Agency Investigations (continued) • States have added specific language to their criminal codes to define crimes that involve computers • Until 1993, laws defining computer crimes did not exist

  7. Following the Legal Process • A criminal case follows three stages: • Complaint • Someone files a complaint • Investigation • A specialist investigates the complaint • Prosecution • Prosecutor collects evidence and builds a case

  8. Following the Legal Process (continued)

  9. Following the Legal Process (continued) • Levels of law enforcement expertise: • Level 1 (street police officer) • Acquiring and seizing digital evidence • Level 2 (detective) • Managing high-tech investigations • Teaching the investigator what to ask for • Understanding computer terminology • What can and cannot be retrieved from digital evidence • Level 3: (computer forensics expert) • Specialist training in retrieving digital evidence

  10. Following the Legal Process (continued)

  11. Understanding Corporate Investigations • Business must continue with minimal interruption from your investigation • Corporate computer crimes: • E-mail harassment • Falsification of data • Gender and age discrimination • Embezzlement • Sabotage • Industrial espionage

  12. Establishing Company Policies • Company policies avoid litigation • Policies provide: • Rules for using company computers and networks • Line of authorityfor internal investigations • Who has the legal right to initiate an investigation • Who can take possession of evidence • Who can have access to evidence

  13. Displaying Warning Banners • Avoid litigation displaying a warning banner on computer screens • A banner: • Informs user that the organization can inspect computer systems and network traffic at will • Voids right of privacy • Establishes authority to conduct an investigation

  14. Displaying Warning Banners (continued)

  15. Displaying Warning Banners (continued) • Types of warning banners: • For internal employee access (intranet Web page access) • External visitor accesses (Internet Web page access)

  16. Displaying Warning Banners (continued) • Examples of warning banners: • Access to this system and network is restricted • Use of this system and network is for official business only • Systems and networks are subject to monitoring at any time by the owner • Using this system implies consent to monitoring by the owner • Unauthorized or illegal users of this system or network will be subject to discipline or prosecution

  17. Displaying Warning Banners (continued) • A for-profit organization banner • This system is the property of Company X • This system is for authorized use only • Unauthorized access is a violation of law and violators will be prosecuted • All activity, software, network traffic, and communications are subject to monitoring

  18. Designating an Authorized Requester • Establish a line of authority • Specify anauthorized requesterwho has the power to conduct investigations • Groups who can request investigations: • Corporate Security Investigations • Corporate Ethics Office • Corporate Equal Employment Opportunity Office • Internal Auditing • The general counsel or legal department

  19. Conducting Security Investigations • Public investigations search for evidence to support criminal allegations • Private investigations search for evidence to support allegations of abuse of a company’s assets and criminal complaints

  20. Conducting Security Investigations (continued) • Situations in the enterprise environment: • Abuse or misuse of corporate assets • E-mail abuse • Internet abuse

  21. Conducting Security Investigations (continued)

  22. Conducting Security Investigations (continued) • Employee abuse of computer privileges • Employee company startup • Porn site • Malicious e-mail

  23. Distinguishing Personal and Company Property • PDAs and personal notebook computers • Employee hooks up his PDA device to his company computer • Company gives PDA to employee as bonus

  24. Maintaining Professional Conduct • Professional conductdetermines credibility • Ethics • Morals • Standards of behavior • Maintain objectivity and confidentiality • Enrich technical knowledge • Conduct with integrity

  25. Maintaining Professional Conduct (continued) • Maintaining objectivity • Sustain unbiased opinions of your cases • Avoid making conclusions about the findings until all reasonable leads have been exhausted • Considered all the available facts • Ignore external biases to maintain the integrity of the fact-finding in all investigations • Keep the case confidential

  26. Maintaining Professional Conduct (continued) • Stay current with the latest technical changes in computer hardware and software, networking, and forensic tools • Learn about the latest investigation techniques that can be applied to the case • Record fact-finding methods in a journal • Include dates and important details that serve as memory triggers • Develop a routine of regularly reviewing the journal to keep past achievements fresh

  27. Maintaining Professional Conduct (continued) • Attend workshops, conferences, and vendor-specific courses conducted by software manufacturers • Monitor the latest book releases and read as much as possible about computer investigations and forensics

  28. Summary • Computer forensics: systematic accumulation of digital evidence in an investigation • Differs from network forensics, data recovery, and disaster recovery in scope, technique, and objective • Laws relating to digital evidence were established in the late 1960s • To be successful, you must be familiar with more than one computing platform

  29. Summary (continued) • To supplement your knowledge, develop and maintain contact with computer, network, and investigative professionals • Public investigations typically require a search warrant before the digital evidence is seized • The Fourth Amendment applies to governmental searches and seizures • During public investigations, you search for evidence to support criminal allegations

  30. Summary (continued) • During private investigations, search for evidence to support allegations of abuse of a company or person’s assets and, in some cases, criminal complaints • Silver-platter doctrine: handing the results of private investigations over to the authorities because of indications of criminal activity • Forensics investigators must maintain an impeccable reputation to protect credibility

  31. Summary (continued) • Most information is stored on hard disks, floppy disks, and CD-ROMs in a nonvolatile manner • Peripheral components (video adapter cards, sound cards, mice, keyboards, NICs) attach to mainboard via an expansion slot or port • All peripherals must have a unique IRQ and I/O address to communicate with the processor • Hardware information can be gathered from computer manuals, BIOS, or other OSs

  32. Guide to Computer Forensics and Investigations Chapter 2 Understanding Computer Investigation

  33. Objectives • Prepare a case • Begin an investigation • Understand computer forensics workstations and software

  34. Objectives (continued) • Conduct an investigation • Complete a case • Critique a case

  35. Preparing a Computer Investigation • Role of computer forensics professional: gather evidence to prove a suspect committed a crime or violated a company policy • Collect evidence that can be offered in court or at a corporate inquiry • Investigate the suspect’s computer • Preserve the evidence on a different computer

  36. Preparing a Computer Investigation(continued) • Follow an accepted procedure to prepare a case • Chain of custody • Route the evidence takes from the time you find it until the case is closed or goes to court

  37. Examining a Computer Crime • Computers can contain information that helps law enforcement determine: • Chain of events leading to a crime • Evidence that can lead to a conviction • Law enforcement officers should follow proper procedure when acquiring the evidence • Digital evidence can be easily altered by an overeager investigator

  38. Examining a Computer Crime (continued)

  39. Examining a Company Policy Violation • Employees misusing resources can cost companies millions of dollars • Misuse includes: • Surfing the Internet • Sending personal e-mails • Using company computers for personal tasks

  40. Taking a Systematic Approach • Steps for problem solving: • Make an initial assessment about the type of case you are investigating • Determine a preliminary design or approach to the case • Create a detailed design • Determine the resources you need • Obtain and copy an evidence disk drive

  41. Taking a Systematic Approach(continued) • Steps for problem solving (continued): • Identify the risks • Mitigate or minimize the risks • Test the design • Analyze and recover the digital evidence • Investigate the data you recovered • Complete the case report • Critique the case

  42. Assessing the Case • Systematically outline the case details: • Situation • Nature of the case • Specifics about the case • Type of evidence • OS • Known disk format • Location of evidence

  43. Assessing the Case (continued) • Based on case details, you can determine the case requirements: • Type of evidence • Computer forensics tools • Special OSs

  44. Planning your Investigation • A basic investigation plan should include the following activities: • Acquire the evidence • Complete an evidence form and establish a chain of custody • Transport evidence to a computer forensics lab • Secure evidence in an approved secure container

  45. Planning your Investigation(continued) • A basic investigation plan (continued): • Prepare a forensics workstation • Obtain the evidence from the secure container • Make a forensic copy of the evidence • Return the evidence to the secure container • Process the copied evidence with computer forensics tools

  46. Planning your Investigation(continued) • An evidence custody formhelps you document what has been done with the original evidence and its forensics copies • There are two types: • Single-evidence form • Multi-evidence form

  47. Planning your Investigation(continued)

  48. Planning your Investigation(continued)

  49. Securing your Evidence • Use evidence bags to secure and catalog the evidence • Use computer safe products • Antistatic bags • Antistatic pads • Use well-padded containers

  50. Securing your Evidence (continued) • Use evidence tape to seal all openings • Floppy disk or CD drives • Power supply electrical cord • Write your initials on tape to prove that evidence has not been tampered • Consider computer-specific temperature and humidity ranges

More Related