+ All Categories
Home > Documents > COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction...

COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction...

Date post: 20-Dec-2015
Category:
View: 218 times
Download: 4 times
Share this document with a friend
50
COS/PSA 413 COS/PSA 413 DAY 1
Transcript
Page 1: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

COS/PSA 413COS/PSA 413

DAY 1

Page 2: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 2

AgendaAgenda

• Roll Call

• Introduction

• WebCT Overview

• Syllabus Review

• Introduction to eMarketing

Page 3: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 3

INSTRUCTORINSTRUCTOR

• Tony Gauvin, Assistant Professor of E-Commerce

• Contact info– 216 Nadeau

[email protected]– (207) 834-7519 or ext 7519– WebCT (Tony Gauvin)

Page 4: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 4

Instructional PhilosophyInstructional Philosophy

• Out-Come based education

• Would rather discuss than lecture– Requires student preparation

• Hate grading assignments– Especially LATE assignments

• Use class interaction, assignments, quizzes and projects to determine if outcomes are met.

Page 5: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 5

COS 413 Survival PrimerCOS 413 Survival Primer

• Read Material BEFORE the class discussion• Check WebCT Often• Use the additional resources identified in syllabus• ASK questions about what you didn’t understand in readings• DON’T do assignments and projects at last minute.• REVEIW lectures and notes• Seek HELP if you are having difficulties• OFFER feedback and suggestions to the instructor in a

constructive manner

Page 6: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 6

Computer AccountsComputer Accounts

• Computer login – Sys admin

• Pete Cyr (x7547) or Art Drolet (x7809) – Applications

• MSDN Academic Alliance– Free Stuff – See Dr Ray Albert

• Access Cards– $10 deposit– See Lisa Fournier

Page 7: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 7

WebCTWebCT• http://webct.umfk.maine.edu• Login

– First name. Last Name– John Doe John.Doe– Initial password is webct

• Help with WebCT available from Blake Library staff• All quizzes and assignments will be administered from WebCT

Page 8: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 8

Syllabus reviewSyllabus review

• Requirements

• Grading

• Course outline

• Special Notes

• Subject to change

Page 9: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Guide to Computer Forensics and Forensics and Investigations, Investigations, Second EditionSecond Edition

Chapter 1Computer Forensics and

Investigations as a Profession

Page 10: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 10

ObjectivesObjectives

• Understand computer forensics

• Prepare for computer investigations

• Understand enforcement agency investigations

• Understand corporate investigations

• Maintain professional conduct

Page 11: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 11

Understanding Computer Forensics Understanding Computer Forensics

• Computer forensics involves obtaining and analyzing digital information for use as evidence in civil, criminal, or administrative cases

• The Fourth Amendment to the U.S. Constitution protects everyone’s rights to be secure in their person, residence, and property from search and seizure

Page 12: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 12

Understanding Computer Forensics Understanding Computer Forensics (continued)(continued)

• When preparing to search for evidence in a criminal case, include the suspect’s computer and its components in the search warrant

Page 13: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 13

Computer Forensics Versus Other Computer Forensics Versus Other Related DisciplinesRelated Disciplines

• Involves scientifically examining and analyzing data from computer storage media so that the data can be used as evidence in court

• Investigating computers includes:– Securely collecting computer data– Examining suspect data to determine details such as

origin and content– Presenting computer-based information to courts– Applying laws to computer practice

Page 14: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 14

Computer Forensics Versus Other Computer Forensics Versus Other Related Disciplines (continued)Related Disciplines (continued)

• Network forensics uses log files to determine:– When users logged on or last used their logon IDs– Which URLs a user accessed– How he or she logged on to the network– From what location

• Computer investigations functions – Vulnerability assessment and risk management– Network intrusion detection and incident response– Computer investigations

Page 15: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 15

Computer Forensics Versus Other Computer Forensics Versus Other Related Disciplines (continued)Related Disciplines (continued)

Page 16: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 16

Computer Forensics Versus Other Computer Forensics Versus Other Related Disciplines (continued)Related Disciplines (continued)

• Vulnerability assessment and risk management– Test and verify the integrity of standalone

workstations and network servers– Physical security of systems and the security of

operating systems (OSs) and applications– Test for known vulnerabilities of OSs– Launch attacks on the network, workstations, and

servers to assess vulnerabilities

Page 17: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 17

Computer Forensics Versus Other Computer Forensics Versus Other Related Disciplines (continued)Related Disciplines (continued)

• Network intrusion detection and incident response functions: – Detect intruder attacks using automated tools and

monitoring network firewall logs manually– Track, locate, and identify the intruder and deny

further access to the network– Collect evidence for civil or criminal litigation against

the intruders

Page 18: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 18

Computer Forensics Versus Other Computer Forensics Versus Other Related Disciplines (continued)Related Disciplines (continued)

• Computer investigation functions

– Manage investigations and conduct forensic analysis of systems

– Draw on resources from those involved in vulnerability assessment, risk management, and network intrusion detection and incident response

– Resolve or terminate all case investigations

Page 19: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 19

A Brief History of Computer ForensicsA Brief History of Computer Forensics

• Well-known crimes―one-half cent

• By the early 1990s, specialized tools for computer forensics were available

• ASR Data created the tool Expert Witness for the Macintosh– Recover deleted files and file fragments

• EnCase

• iLook

Page 20: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 20

Developing Computer Forensics Developing Computer Forensics ResourcesResources

• Ask for help– Computer Technology Investigators Northwest

(CTIN) – High Technology Crime Investigation Association

(HTCIA) – LISTSERV– Majordomo

Page 21: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 21

Preparing For Computer InvestigationsPreparing For Computer Investigations

• Computer investigations and forensics

• Public investigations– Government agencies responsible for criminal

investigations and prosecution

Page 22: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 22

Preparing For Computer Investigations Preparing For Computer Investigations (continued)(continued)

• Private or corporate investigations – Criminal cases– Government agencies– Private or corporate investigations– Private companies– Non-enforcement government agencies– Lawyers

Page 23: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 23

Preparing For Computer Investigations Preparing For Computer Investigations (continued)(continued)

Page 24: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 24

Understanding Enforcement Agency Understanding Enforcement Agency InvestigationsInvestigations

• Understand:– Local city, county, state or province, and federal laws

on computer-related crimes– Legal processes and how to build a criminal case

Page 25: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 25

Understanding Enforcement Agency Understanding Enforcement Agency Investigations (continued)Investigations (continued)

• States have added specific language to their criminal codes to define crimes that involve computers

• Until 1993, laws defining computer crimes did not exist

Page 26: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 26

Following the Legal ProcessFollowing the Legal Process

• A criminal case follows three stages: – Complaint

• Someone files a complaint

– Investigation• A specialist investigates the complaint

– Prosecution • Prosecutor collects evidence and builds a case

Page 27: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 27

Following the Legal Process Following the Legal Process (continued)(continued)

Page 28: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 28

Following the Legal Process Following the Legal Process (continued)(continued)

• Levels of law enforcement expertise:– Level 1 (street police officer)

• Acquiring and seizing digital evidence– Level 2 (detective)

• Managing high-tech investigations• Teaching the investigator what to ask for• Understanding computer terminology• What can and cannot be retrieved from digital

evidence– Level 3: (computer forensics expert)

• Specialist training in retrieving digital evidence

Page 29: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 29

Following the Legal Process Following the Legal Process (continued)(continued)

Page 30: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 30

Understanding Corporate Understanding Corporate InvestigationsInvestigations

• Business must continue with minimal interruption from your investigation

• Corporate computer crimes: – E-mail harassment– Falsification of data– Gender and age discrimination– Embezzlement– Sabotage– Industrial espionage

Page 31: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 31

Establishing Company PoliciesEstablishing Company Policies

• Company policies avoid litigation

• Policies provide:– Rules for using company computers and networks– Line of authority for internal investigations

• Who has the legal right to initiate an investigation

• Who can take possession of evidence

• Who can have access to evidence

Page 32: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 32

Displaying Warning BannersDisplaying Warning Banners

• Avoid litigation displaying a warning banner on computer screens

• A banner:– Informs user that the organization can inspect

computer systems and network traffic at will – Voids right of privacy– Establishes authority to conduct an investigation

Page 33: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 33

Displaying Warning Banners Displaying Warning Banners (continued)(continued)

Page 34: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 34

Displaying Warning Banners Displaying Warning Banners (continued)(continued)

• Types of warning banners: – For internal employee access (intranet Web page

access) – External visitor accesses (Internet Web page

access)

Page 35: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 35

Displaying Warning Banners Displaying Warning Banners (continued)(continued)

• Examples of warning banners:– Access to this system and network is restricted– Use of this system and network is for official

business only– Systems and networks are subject to monitoring at

any time by the owner– Using this system implies consent to monitoring by

the owner– Unauthorized or illegal users of this system or

network will be subject to discipline or prosecution

Page 36: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 36

Displaying Warning Banners Displaying Warning Banners (continued)(continued)

• A for-profit organization banner – This system is the property of Company X– This system is for authorized use only– Unauthorized access is a violation of law and

violators will be prosecuted– All activity, software, network traffic, and

communications are subject to monitoring

Page 37: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 37

Designating an Authorized RequesterDesignating an Authorized Requester

• Establish a line of authority • Specify an authorized requester who has the power

to conduct investigations• Groups who can request investigations:

– Corporate Security Investigations– Corporate Ethics Office– Corporate Equal Employment Opportunity Office– Internal Auditing– The general counsel or legal department

Page 38: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 38

Conducting Security InvestigationsConducting Security Investigations

• Public investigations search for evidence to support criminal allegations

• Private investigations search for evidence to support allegations of abuse of a company’s assets and criminal complaints

Page 39: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 39

Conducting Security Investigations Conducting Security Investigations (continued)(continued)

• Situations in the enterprise environment:– Abuse or misuse of corporate assets– E-mail abuse– Internet abuse

Page 40: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 40

Conducting Security Investigations Conducting Security Investigations (continued)(continued)

Page 41: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 41

Conducting Security Investigations Conducting Security Investigations (continued)(continued)

• Employee abuse of computer privileges– Employee company startup– Porn site– Malicious e-mail

Page 42: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 42

Distinguishing Personal and Company Distinguishing Personal and Company PropertyProperty

• PDAs and personal notebook computers

• Employee hooks up his PDA device to his company computer

• Company gives PDA to employee as bonus

Page 43: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 43

Maintaining Professional Conduct Maintaining Professional Conduct

• Professional conduct determines credibility– Ethics– Morals– Standards of behavior– Maintain objectivity and confidentiality– Enrich technical knowledge– Conduct with integrity

Page 44: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 44

Maintaining Professional Conduct Maintaining Professional Conduct (continued)(continued)

• Maintaining objectivity– Sustain unbiased opinions of your cases

• Avoid making conclusions about the findings until all reasonable leads have been exhausted

• Considered all the available facts

• Ignore external biases to maintain the integrity of the fact-finding in all investigations

• Keep the case confidential

Page 45: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 45

Maintaining Professional Conduct Maintaining Professional Conduct (continued)(continued)

• Stay current with the latest technical changes in computer hardware and software, networking, and forensic tools

• Learn about the latest investigation techniques that can be applied to the case

• Record fact-finding methods in a journal– Include dates and important details that serve as

memory triggers– Develop a routine of regularly reviewing the journal

to keep past achievements fresh

Page 46: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 46

Maintaining Professional Conduct Maintaining Professional Conduct (continued)(continued)

• Attend workshops, conferences, and vendor-specific courses conducted by software manufacturers

• Monitor the latest book releases and read as much as possible about computer investigations and forensics

Page 47: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 47

SummarySummary

• Computer forensics: systematic accumulation of digital evidence in an investigation

• Differs from network forensics, data recovery, and disaster recovery in scope, technique, and objective

• Laws relating to digital evidence were established in the late 1960s

• To be successful, you must be familiar with more than one computing platform

Page 48: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 48

Summary (continued)Summary (continued)

• To supplement your knowledge, develop and maintain contact with computer, network, and investigative professionals

• Public investigations typically require a search warrant before the digital evidence is seized

• The Fourth Amendment applies to governmental searches and seizures

• During public investigations, you search for evidence to support criminal allegations

Page 49: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 49

Summary (continued)Summary (continued)

• During private investigations, search for evidence to support allegations of abuse of a company or person’s assets and, in some cases, criminal complaints

• Silver-platter doctrine: handing the results of private investigations over to the authorities because of indications of criminal activity

• Forensics investigators must maintain an impeccable reputation to protect credibility

Page 50: COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.

Guide to Computer Forensics and Investigations, 2e 50

Summary (continued)Summary (continued)

• Most information is stored on hard disks, floppy disks, and CD-ROMs in a nonvolatile manner

• Peripheral components (video adapter cards, sound cards, mice, keyboards, NICs) attach to mainboard via an expansion slot or port

• All peripherals must have a unique IRQ and I/O address to communicate with the processor

• Hardware information can be gathered from computer manuals, BIOS, or other OSs


Recommended