+ All Categories
Home > Documents > IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensics and information security (CC BY-SA) IT-forensics and ...

Date post: 30-Jan-2017
Category:
Upload: lyhanh
View: 218 times
Download: 1 times
Share this document with a friend
35
För utveckling av verksamhet, produkter och livskvalitet. IT-forensics and information security (CC BY-SA) IT-forensics and information security (CC BY-SA)
Transcript
Page 1: IT-forensics and information security (CC BY-SA) IT-forensics and ...

För utveckling av verksamhet, produkter och livskvalitet.

IT-forensics and information security

(CC BY-SA)

IT-forensics and information security

(CC BY-SA)

Page 2: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Locards kontamineringsprincip

Page 3: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Locards kontamineringsprincip

Page 4: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Locards kontamineringsprincip

Page 5: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Exempel

• Du träffar på en påslagen dator. • Ska du ta med den påslagen?• Ska du stänga ner den via operativsystemet?

• Båda metoderna kontaminerar.

Page 6: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensikern

Page 7: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensikern

Teknik -specialist

Page 8: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensikern

Teknik -specialist

Analytiker

Page 9: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensikern

Teknik -specialist

Analytiker

Juridisktkunnig

Page 10: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensikern

Teknik -specialist

Analytiker

Juridisktkunnig

Page 11: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensiska uppdrag

Page 12: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensiska uppdrag

Preventivteknik

Page 13: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensiska uppdrag

Preventivteknik Policy

Page 14: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensiska uppdrag

Strategi

Preventivteknik Policy

Page 15: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensiska uppdrag

Strategi

Preventivteknik Policy

Page 16: IT-forensics and information security (CC BY-SA) IT-forensics and ...

IT-forensik och informationssäkerhet, 120/180 hp

Page 17: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Methods

• Blended learning• Flipped classroom• Peer interaction• Hands on, lab intensive

Page 18: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Administration ofComputer Systems

• Computer fundamentals• Computer components• Installing OS• Configuring/ hardening• Troubleshooting

• Based on ”Cisco IT Essentials”• Practical test• Report• Presentation

Page 19: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Administration ofOperating Systems

• Linux fundamentals• Set up a typical linux environment, LAMP, mail

server, DNS• Practical test

Page 20: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Digital Storage Data Extraction

• Basics of evidence handling• Basics of data extraction from different media

types• Understanding of how to prevent data extraction• Understanding of limitations• Capability to make ”back of the envelope”

calculations

Page 21: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Advanced IT-Forensic Tools 1

• How to work with typical IT-forensic suites• Data extraction• Search, Mining, Recover, Windows specifics…

• Focus on EnCase / EnCE certification• Practical hands on ”live” case with role play

• Student selling exam drafts• Missing person scenario• Illegal surveilance

Page 22: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Advanced IT-Forensic Tools 2

• Focus on embedded systems• How to hack a modern car• Border scan protocol (JTAG)• Identifying data manipulation• Data extraction & mining

• Seminars, reading scientific papers• Paper• Workshop/ mini conference

Page 23: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Advanced IT-Forensic Tools 3

• Project based training• Standard cases• Two teams, alternating red/blue operation

• Create a case• Swap cases• Try to analyze• Report

• Increasing difficulty

Page 24: IT-forensics and information security (CC BY-SA) IT-forensics and ...

SCADA

• Industrial systems• Embedded systems• Security/ safety/ reliability• Real hands on project, risk analysis, modelling the

problem, creating a solution, reporting.• Water supply/ waste water handeling/ water

power plant• Note: half a year after the students analyzed

risks with water supply there was a major lyedischarge in the drinking water system.

Page 25: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Thesis work

• 20 weeks – C level• 10 weeks – B level

Page 26: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Optimizing using Triage

(CC BY 2.0) U.S. Army

Page 27: IT-forensics and information security (CC BY-SA) IT-forensics and ...

OSS vs. proprietary solutions

Copy left. Copy right.

(CC BY 2.0) cheetah100

Page 28: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Portabel UPS

Page 29: IT-forensics and information security (CC BY-SA) IT-forensics and ...

RAM contaminationduring data extraction

(CC BY-SA 2.0) Daniel Dionne

Page 30: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Identification ofTrueCrypt-containers

Page 31: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Wardriving

• Mapping of three major cities• Focus on the WPS bug (121231)• Image not related

Page 32: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Pen-test of medium sized ISP

Page 33: IT-forensics and information security (CC BY-SA) IT-forensics and ...

Collaboration

• Program comity• Thesis topics• Thesis supervision• Project topics• Guest lectures

Page 34: IT-forensics and information security (CC BY-SA) IT-forensics and ...

UT-EXPO

• 30/5 - 1/6


Recommended