COS/PSA 413 Day 6. Agenda Questions? Assignment 2 Due Lab 1 Write-ups Corrected –1 A, 1 B, 2 C’s and 1 F Lab 2 Write-ups Due tomorrow –Pay more attention.

Post on 20-Dec-2015

213 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

Transcript

COS/PSA 413

Day 6

Agenda• Questions?• Assignment 2 Due • Lab 1 Write-ups Corrected

– 1 A, 1 B, 2 C’s and 1 F • Lab 2 Write-ups Due tomorrow

– Pay more attention to detail, answer the question!• Lab tomorrow at N105

– Using Linux tools– Project 4-2, Project 4-5 – Individual labs, no teams required

• http://www.lowfatlinux.com/

• Discussion on The Investigator’s Office and Laboratory – Chapter 5 in 1e and Chapter 3 in 2e

The Investigator’s Office and Laboratory

Chapter 5

Learning Objectives

•Understand Forensic Lab Certification Requirements•Determine the Physical Layout of a Computer Forensics Lab•Select a Basic Forensic Workstation•Build a Business Case for Developing a Forensics Lab•Create a Forensic Boot Floppy•Retrieve Evidence Data Using a Remote Network Connection

Understand Forensic Lab Certification Requirements

American Society of Crime Laboratory Directors (ASCLD) – A national society that sets the standards, management, and audit process for labs used in crime analysis including computing-forensics labs used by the police, FBI, and similar organizations.

Understand Forensic Lab Certification Requirements

Identify the duties of the lab manager and staff:

-Set up the guidelines for managing cases.

-Promote group consensus for decision making.

-Establish and promote quality assurance.

-Create and monitor lab policies.

-Evaluate hardware and software needs.

-Balance costs and needs.

Understand Forensic Lab Certification Requirements

Uniform Crime Report – Information collected at the federal, state, and local levels to determine the types and frequencies of crime committed.

Federal Reports

http://www.fbi.gov/ucr/ucr.htm

Regional Summaries

http://fisher.lib.virginia.edu/crime

Understand Forensic Lab Certification Requirements

Understand Forensic Lab Certification Requirements

Acquiring Certification and Training

International Association of Computer Investigative Specialists (IACIS) – One of the oldest professional computing-forensics organizations, IACIS was created by police officers who wanted to formalize credentials in computing investigations. IACIS restricts membership to only sworn law enforcement personnel or government employees working as computer forensic examiners.

High Tech Crime Network (HTCN) – A national organization that provides certification for computer crime investigators and computing-forensics technicians.

Understand Forensic Lab Certification Requirements

Certified Electronic Evidence Collection Specialist (CEECS) – A certificate awarded by IACIS upon completion of a written exam.

Certified Forensics Computer Examiners (CFCE) – A certification awarded by the IACIS upon completion of the correspondence portion of testing.

Understand Forensic Lab Certification Requirements

Certified Computer Crime Investigator, Basic Level

-Candidates have two years of law-enforcement or corporate-investigative experience or a bachelor’s degree and one year of investigative experience.

-Eighteen months of the candidate's experience directly relates to the investigation of computer-related incidents or crimes.

-Candidates have successfully completed 40 hours of training from an approved agency, organization, or training company.

-Candidates must provide documentation of at least 10 cases in which they participated.

Understand Forensic Lab Certification Requirements

Certified Computer Crime Investigator, Advanced Level

-Have three years of investigative experience in any area or a bachelors degree and two years experience.

-Four years of direct experience with the investigation of computer crimes.

-Complete 80 hours of related training from an approved source.

-Candidates served as lead investigator in at least 20 cases during the past three years and were involved with at least 40 cases as a lead investigator, supervisor, or in a supportive capacity.

Understand Forensic Lab Certification Requirements

Certified Computer Forensic Technician, Basic Level A certificate awarded by the HTCN upon successful completion of their requirements. Same requirements for Certified Computer Crime Investigator, Basic Level, but all experience must be related to computer forensics.

Certified Computer Forensic Technician, Advanced Level – A certificate awarded by the HTCN upon successful completion of their requirements. Same requirements for Certified Computer Crime Investigator, Advanced Level, but all experience must be related to computer forensics.

Understand Forensic Lab Certification Requirements

EnCE – Certification program sponsored by Guidance Software. EnCE certification is open to both the public and private sector, and is specific to the use and mastery of EnCase computer forensic analysis.

Understand Forensic Lab Certification Requirements

Other Training and Certifications

-High Technology Crime Investigations Association (HTCIA)

-SysAdmin, Audit, Network, Security Institute (SANS)

-Computer Technology Investigators Northwest (CTIN)

-New Technologies, Inc. (NTI)

-National Cybercrime Training Partnership (NCTP)

-National White Collar Crime Center (NW3C)

Determine the Physical Layout of a Computer Forensics Lab

Secure Facility – A facility that can be locked and provides limited access to the contents.

TEMPEST – An unclassified term that refers to facilities that have been hardened so that electrical signals from computers, the computer network, and telephone systems cannot be easily monitored or accessed by someone from outside the facility.

Determine the Physical Layout of a Computer Forensics Lab

Identify Security Need Requirements

-Small room with true floor to ceiling walls.

-Door access with a locking mechanism, which can be either a regular lock or combination lock; the key or combination must be limited to you and your manager.

-Secure container such as a safe or file cabinet with a quality padlock that prevents the drawers from opening.

-Visitors log listing all persons who have accessed your lab.

Determine the Physical Layout of a Computer Forensics Lab

Ergonomics – The study of designing equipment to meet the human need for comfort while allowing for productivity.

Determine the Physical Layout of a Computer Forensics Lab

Determine the Physical Layout of a Computer Forensics Lab

Determine the Physical Layout of a Computer Forensics Lab

Environmental Conditions

-How large is the room, and how much air moves through it per minute?

-Can the room handle the increased heat generated by the workstation?

-What is the maximum number of workstations the room can handle?

-How many computers will be located in this room?

-Can the room handle a small RAID server’s heat output?

Determine the Physical Layout of a Computer Forensics Lab

Recommended Eyestrain Considerations

-Chair height needs to bring the eye level to monitor.

-Ensure proper distance from monitor.

-Place material to be viewed while looking at the monitor at the same level as the monitor.

-Use zoom when reading small font.

-Make sure monitor is clear of glare. Use a filter screen if necessary.

-Use lighting.

-Eliminate direct light on the computer monitor.

Determine the Physical Layout of a Computer Forensics Lab

Continued...

-Have regular eye exams and if necessary, buy a pair of prescription glasses.

-Take breaks often and let your eyes focus at distant objects.

Determine the Physical Layout of a Computer Forensics Lab

Structural Design Considerations

- Ensure the lab is a secure room.

-Use heavy construction materials if possible.

-Look for large opens in walls, ceilings, and floors.

-Avoid windows in lab exterior.

-Verify computer systems are facing away from any internal or external windows.

Determine the Physical Layout of a Computer Forensics Lab

Electrical Needs

-Ensure enough amperage is supplied to the lab.

-Organize outlets for easy access.

-Install an Uninterruptible Power Supply (UPS) for important computer systems.

Determine the Physical Layout of a Computer Forensics Lab

Communications

-Dedicated ISDN is preferred for computer network and voice communications.

-Dial-up Internet Access should also be available.

-Do not keep forensic workstations attached to the Internet.

-Consider installing a dedicated network for the computer forensics computers.

Determine the Physical Layout of a Computer Forensics Lab

Fire-Suppression Systems

-If necessary, install a dry chemical fire-suppression system.

-Verify lab has a sprinkler system installed.

-Install dry chemical fire extinguishers.

Determine the Physical Layout of a Computer Forensics Lab

Determine the Physical Layout of a Computer Forensics Lab

Evidence Locker Recommendations

-The evidence locker should be located in a restricted area that is only accessible to lab personnel.

-The number of people authorized to open the evidence container should be kept to a minimum.

-All evidence containers should remain locked when they are not under the supervision of an authorized person.

Determine the Physical Layout of a Computer Forensics Lab

Evidence Locker Combination Recommendations

-Provide the same level of security for the combination as the content of the container.

-Destroy any previous combinations after setting up a new combination.

-Allow only authorized personnel to change lock combinations.

-Change the lock combinations every six months and when an authorized person leaves the organization.

Determine the Physical Layout of a Computer Forensics Lab

Evidence Locker Padlock Recommendations

-Appoint a key custodian responsible for distributing keys.

-Stamp sequential numbers on each duplicate key.

-Maintain a registry listing the assigned key.

-Conduct a monthly audit to ensure no keys were lost.

-Take an inventory of all keys.

-Leave the keys in the lab.

-Change locks and keys annually.

-Do not use a master key for several locks.

Determine the Physical Layout of a Computer Forensics Lab

Facility Maintenance

-Repair any damages immediately.

-Consider anti-static pads.

-Maintain two separate trash containers.

Determine the Physical Layout of a Computer Forensics Lab

Physical Security Needs

-Maintain a sign-in for all visitors.

-Hire a security guard, if necessary.

Determine the Physical Layout of a Computer Forensics Lab

Auditing a Computer Forensics Lab

-Inspect the ceiling, floor, roof, and exterior walls.

-Inspect doors to make sure they close and lock correctly.

-Check the locks to see if they are damaged or need to be replaced.

-Review the visitors log.

-Review the logs for evidence containers.

-Secure any evidence at the end of the workday that is not being processed.

Determine the Physical Layout of a Computer Forensics Lab

Determine the Physical Layout of a Computer Forensics Lab

Determine the Physical Layout of a Computer Forensics Lab

Selecting a Base Forensic Workstation

Special Interest Groups (SIG) – Associated with various operating systems, these groups maintain Listservs and may hold meetings to exchange information about current and legacy operating systems.

Selecting a Base Forensic Workstation

Consider stocking the following hardware peripherals:

-40-pin 18-inch and 36-inch IDE cables, both ATA-33 and ATA-100 or faster.

-Ribbon cables for floppy disks.

-Extra SCSI cards.

-Graphics cards, PSI and AGP.

-Extra power cords.

-A variety of hard disk drives.

-Laptop hard drive connectors.

-Computer handheld tools such as screwdrivers and pliers.

Selecting a Base Forensic Workstation

Maintain Operating System and Application Inventories

-Office XP, 2000, 97, 95

-Quicken

-Programming language applications such as Visual Studio

-Specialized viewers such as QuickView and ACDC

-Corel Office Suite

-StarOffice/OpenOffice

-Peachtree accounting applications

Selecting a Base Forensic Workstation

Configuration Management – The process of keeping track of all upgrades and patches you apply to your computer operating system and application software.

Risk Management – Involves determining how much risk is acceptable for any process or operation, such as replacing equipment.

Building a Business Case for Developing a Forensic Lab

Business Case – Justification to upper management or a lender for purchasing new equipment, software, or other tools when upgrading your facility.

Creating a Forensic Boot Floppy

Assemble the following tools:

-Disk editor installed on your computer

-A blank floppy disk that has been formatted

-MS-DOS operating system

-Computer that can boot to a true MS-DOS level

-Forensic acquisition tool such as DriveSpy

-Write-blocking tool to protect the evidence

Creating a Forensic Boot Floppy

Creating a Forensic Boot Floppy

Creating a Forensic Boot Floppy

Creating a Forensic Boot Floppy

Creating a Forensic Boot Floppy

Creating a Forensic Boot Floppy

Creating a Forensic Boot Floppy

Creating a Forensic Boot Floppy

Retrieving Evidence Data Using a Remote Network Connection

Common Tools

-SnapBack

-EnCase

Chapter Summary

-A computing-forensics lab is where you conduct investigations, store evidence, and perform most work. A variety of computing-forensics hardware and software is needed.

-Be sure to keep your skills up to date with plenty of training. Plenty of schools and companies provide specific training for computing-forensics.

-Your lab must be physically secure so that evidence is not lost, corrupted, or destroyed. Be sure to take ergonomics into consideration.

-Before you set up a computing-forensics lab, create a business case. Justify acquiring new and better resources.

Chapter Summary

-Creating a bootable forensic disk is necessary to make sure you do not contaminate digital evidence. Be sure the boot floppy disk does not alter any files on the suspect computer system.

-If you are working on a LAN, you can retrieve evidence across the network if necessary.

top related