Top Banner
INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]
27

INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Jan 08, 2018

Download

Documents

Buck Matthews

Outline…. Computer Forensics Forensic Expert. Goals of Comp. Forensics Forensics Procedure Key Principal of Forensics Problems. Forensic Tools. Demonstration of Tools
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

INFORMATION SECURITY

[1st International Conference on

Management of Technology and Information Security ( ICMIS-2010 )]

Page 2: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

An Examination into Computer Forensic Tools

Lokendra Kumar TiwariDepartment of Electronics & Comm. AllD. Univ.

& Arun Kumar Singh

Department of CSED, MNNIT Allahabad

Page 3: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Outline….

• Computer Forensics• Forensic Expert.• Goals of Comp. Forensics• Forensics Procedure• Key Principal of Forensics• Problems.• Forensic Tools.• Demonstration of Tools

Page 4: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

COMPUTER FORENSICS Forensics is not by itself a science

(‘‘forensic: of, used in, courts of law’’— Concise Oxford Dictionary).

Page 5: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Forensics ???Forensic means to apply a discipline, any

discipline, to the law. It is the job of forensics to inform the court.

So, you can be a computer scientist, and if you apply computer science to inform the court, you are a forensic computer scientist.

Page 6: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Contd…

• A key skill in forensic computer science is the challenge that lies in ‘‘informing the court’’

• This requires specialized expertise and training in a range of computing and non-computing skills—legal knowledge, evidence management, data storage and retrieval, and not least, courtroom presentation.

Page 7: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Forensic Expert: The forensic expert is a person who has the knowledge of

Provisions of Indian Evidence Act,

Code of Criminal Procedure,

Indian Penal Code,

Constitution of India and Constitution of other countries,

and also other related statutes.

forensic expert has to assist the court hence he must have knowledge of any technology (say computer science)

Page 8: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

The primary goals of the computer forensic analysis process are:  To help participants determine what undesirable

events occurred, any.

To gather, process, store, and preserve evidence to support the prosecution of the culprit(s), if desired.

To use that knowledge to prevent future occurrences. (Detection & prevention).

Page 9: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Forensics Procedure

Identification.

Collection & Preservation. (Chain of custody)

Analysis

Production

Page 10: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Computer forensic analysis within the forensic tradition.

Alphonse Bertillon- [freezing the scene]: in 1879 introduce a methodical way of documenting the scene by photographing, for example, bodies, items, footprints, bloodstains in situ with relative measurements of location, position, and size Bertillon is thus the first known forensic photographer.

Bertillonage : system of identifying individuals over 200 separate body measurements, was in use till 1910 and was only rendered obsolete by the discovery that fingerprints were unique.

Page 11: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Key Principal of Forensics

• Edmond Locard articulated one of the forensic science’s key rules, known as Locard’s Exchange Principle.

• “The principle states that when two items or persons come into contact, there will be an exchange of physical traces. Something is brought, and something is taken away, so that suspects can be tied to a crime scene by detecting these traces”.

Page 12: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Stakeholders:• National security

• Custom & Excise

• Law enforcement agents• Businesses (embezzlement, industrial espionage,

stealing confidential information, and racial or sexual harassment).

• Corporate crime [according to report the accountants and auditors for Enron not only used e-mail to communicate but also subsequently deleted these e-mails]

Page 13: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Problems In Indian Context.No Standard for Computer Forensic is yet

developed.

No Guidelines for Companies dealing with electronic data, during disputes.

No recognition to any of the forensics tool.

Issues related to anti-forensics are not talked about. ………………

Page 14: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Over All Scenario

To date, computer forensics has been primarily driven by vendors and applied technologies with very little consideration being given to establishing a sound theoretical foundation

The national and international judiciary has already begun to question the ‘‘scientific’’ validity of many of the ad hoc procedures and methodologies and is demanding proof of some sort of theoretical foundation and scientific rigor.

Page 15: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

CONTD..

Commercial software tools are also a problem because software developers need to protect their code to prevent competitors from stealing their product.

However, since most of the code is not made public, it is very difficult for the developers to verify error rates of the software, and so reliability of performance is still questionable.

Page 16: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

CONTD..The specialized tools used by a computer forensic expert are viewed as intolerably expensive by many corporations, and as a result many corporations simply choose not to invest any meaningful money into computer forensics. This trend amplifies cyber crime rates

Open source software’s were also not been tested or verified for the effectiveness to serve the above purposes (Open for research)

Page 17: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Legal AspectsThe growing demand for security and certainty in cyber space leads to more stringent laws.

The violation and maintaining of these laws (cyber laws) must be distinguished from classical criminal activities and criminal law enforcement.

The dynamics between these different forms of law violation and law enforcement is important and shall be addressed.

Page 18: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Government Initiative• Proposed amendment in IT ACT 2000. “70A. (1) The Indian Computer Emergency Response Team (CERT-In)

shall serve as the national nodal agency in respect of Critical Information Infrastructure for coordinating all actions relating to information security practices, procedures, guidelines, incident prevention, response and report.

(2) For the purposes of sub-section (1), the Director of the Indian Computer Emergency Response Team may call for information pertaining to cyber security from the service providers, intermediaries or any other person.

………………..• National E-Governance Plan 2007.

Page 19: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Computer Forensic is the need of an Hour….

Data Protection

Privacy

E-governance

E-commerce.

COMPUTER FORENSICS

Page 20: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Computer Forensic ToolsForensic Tool Kit:

FTK is developed by Access Data Corporation (USA); it enables law enforcement and corporate security professionals to perform complete and in-depth computer forensic analysis.

Main Window of FTK

Page 21: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Contd…

ENCASE FORENSIC:  

Encase Forensic developed by Guidance Software USA is the industry standard in computer forensic investigation technology. With an intuitive Graphical User Interface (GUI), superior analytics, enhanced email/Internet support and a powerful scripting engine, EnCase provides investigators with a single robust tool, capable of conducting large-scale and very complex investigations from beginning to end.

Main Window of Encase

Page 22: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Contd..Cyber Check Suites:

The IT Act 2000 is India's first attempt to combat cyber crime. To assist in the enforcement of the IT Act, the Department of Information Technology, Ministry of Communications and Information Technology, has setup a Technical Resource Centre for Cyber Forensics at C-DAC, Thiruvananthapuram.

Cyber Check is a forensic analysis tool developed by C-DAC Thiruvanathapuram,

Probe Window of Cyber Check Suite

Page 23: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Comparison between Encase Version 6.0, FTK, and Cyber Check Suite.

Page 24: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Conclusion

• Encase Forensic is very useful forensic solution but it lacks following important feature:

• In Encase forensic there is no password cracking/recovery facility. So if during investigation process the examiner detected any password protected files then he had to rely on third party tools.

Page 25: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

Recovery of Deleted E-mail

Demonstration

Page 26: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

References• Computer forensics by Michael Sheetz published by John

Wiley and Sons

• Cyber crime Impact in the new millennium by R.C Mishra.

• Roadmap for digital forensic Research [Report From the First Digital Forensic Research Workshop]

• Forensic Corpora: A Challenge for Forensic Research Simson L. Garfinkel April 10, 2007

• Computer and Intrusion Forensics by Mohay,Anderson Collie,Devel Published by Artech House.

Page 27: INFORMATION SECURITY [1 st International Conference on Management of Technology and Information Security ( ICMIS-2010 )]

THANKS