27
Computer Forensics in a LAN Environment Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds The industry has, at long last, accepted Computer Security as a key component of any organization’s operating and strategic plan. There can be no doubt that preventing unwanted access to systems, files and the computer environment is a good thing. Furthermore, the accurate and data storage, retrieval and processing is crucial for success. But what happens if somewhere, somehow a chink in the armor is revealed. Do you have the procedures in place to identify that an “event” has occurred, how you can prevent future occurrences and how the situation was caused. Tracking the source of the problem and in some cases, establishing corrective measures and providing reliable and usable evidence for legal proceedings (if necessary) can pose a new challenge. Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use in apprehending and prosecuting security violators. The first part of this session will identify some of key elements in building an effective Computer Forensics program within the Computer Security practice area. Many areas will be covered including procedures, career issues, legal processes and financial justification. The second part will focus on specific ways to configure clients and servers in a LAN environment to facilitate forensic data collection and establish proper evidence collection procedures. Platforms covered will include: Novell and Windows/NT servers; DOS, Windows 3.x, 95, 98 and NT clients. Attendees will review a checklist of parameters to specify and methods to use that maximize data collection and preservation. Speaker Biography Mr. Corby is CEO and Consulting Director for M Corby & Associates, Inc. a US Consultancy founded in 1989. He has been an IT Professional for over 30 years specializing in systems technology management and computer security. As a Technology Specialist, Systems Manager and CIO for large international corporations, and as Consulting Director of hundreds of Systems and Technology projects for several diverse companies, he has put many theories and creative ideas into practice. Prior to his term as the Consulting Director for M Corby & Associates, Inc., he was practice director for the IT Consulting Practice of Ernst & Young, CIO for a division of Ashland Oil and the Bain & Company Consulting Group. He is a Certified Information Systems Security Professional (CISSP) and Certified Computer Professional (CCP). In 1994, the Computer Security Institute awarded Mike the Lifetime Achievement Award. Speaker Contact Info: Michael J. Corby, CCP, CISSP 255 Park Avenue Worcester, MA 01609 Phone (508) 792-4320 Fax: (508) 792-4327 E-Mail: [email protected]

Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Computer Forensics in a LAN EnvironmentMichael J. Corby, CCP, CISSP

M Corby & Associates, Inc.

Audience: Security Knowledgeable with varying backgrounds

The industry has, at long last, accepted Computer Security as a key component of anyorganization’s operating and strategic plan. There can be no doubt that preventing unwantedaccess to systems, files and the computer environment is a good thing. Furthermore, theaccurate and data storage, retrieval and processing is crucial for success. But what happens ifsomewhere, somehow a chink in the armor is revealed. Do you have the procedures in place toidentify that an “event” has occurred, how you can prevent future occurrences and how thesituation was caused. Tracking the source of the problem and in some cases, establishingcorrective measures and providing reliable and usable evidence for legal proceedings (ifnecessary) can pose a new challenge. Computer forensics is a new specialty that can identifythe proper procedures for collecting evidence in a manner suitable for use in apprehending andprosecuting security violators.

The first part of this session will identify some of key elements in building an effectiveComputer Forensics program within the Computer Security practice area. Many areas will becovered including procedures, career issues, legal processes and financial justification.

The second part will focus on specific ways to configure clients and servers in a LANenvironment to facilitate forensic data collection and establish proper evidence collectionprocedures. Platforms covered will include: Novell and Windows/NT servers; DOS, Windows3.x, 95, 98 and NT clients. Attendees will review a checklist of parameters to specify andmethods to use that maximize data collection and preservation.

Speaker Biography

Mr. Corby is CEO and Consulting Director for M Corby & Associates, Inc. a US Consultancyfounded in 1989. He has been an IT Professional for over 30 years specializing in systemstechnology management and computer security. As a Technology Specialist, Systems Managerand CIO for large international corporations, and as Consulting Director of hundreds ofSystems and Technology projects for several diverse companies, he has put many theories andcreative ideas into practice. Prior to his term as the Consulting Director for M Corby &Associates, Inc., he was practice director for the IT Consulting Practice of Ernst & Young, CIOfor a division of Ashland Oil and the Bain & Company Consulting Group. He is a CertifiedInformation Systems Security Professional (CISSP) and Certified Computer Professional(CCP). In 1994, the Computer Security Institute awarded Mike the Lifetime AchievementAward.

Speaker Contact Info:Michael J. Corby, CCP, CISSP255 Park AvenueWorcester, MA 01609Phone (508) 792-4320Fax: (508) 792-4327

E-Mail: [email protected]

Page 2: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Introduction to ComputerIntroduction to ComputerForensicsForensics

Michael J. Corby, CISSPM Corby & Associates, Inc. USA

Page 3: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

AbstractAbstractl The industry, at long last, accepted Computer Security as a key component

of any organization’s operating and strategic plan. There can be no doubtthat preventing unwanted access to systems, files and the computerenvironment is a good thing. Furthermore, accurate data storage, retrievaland processing is crucial for success. But, what happens if somewhere,somehow, a chink in the armor is revealed. Do you have the procedures inplace to identify that an “event” has occurred, determine how you canprevent future occurrences and how the situation was caused? Trackingthe source of the problem and in some cases, establishing correctivemeasures and providing reliable and usable evidence for legal proceedings(if necessary), can pose a new challenge to the security professional.Computer forensics is a new specialty that can identify the properprocedures for collecting evidence in a manner suitable for use inapprehending and prosecuting security violators.

l This session will identify some of the key elements in building aneffective Computer Forensics program within the Computer Securitypractice area. Many areas will be covered, including procedures, careerissues, legal processes and financial jurisdiction.

Page 4: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

About the Speaker:About the Speaker:l Mr. Corby is Consulting Director for M Corby & Associates, Inc., an

Information Technology Consulting organization founded in 1989. Hehas over 30 years of experience in Systems Operations, TechnologyManagement, Application Design and Strategic Planning. Hisorganization specialized in Computer Security, Effective ISManagement and developing crisp, responsive IS Strategies. He hasmanaged numerous projects including several with over 100participants that lasted for up to four years. Previously CIO for Bain &Company and the Riley Stoker division of Ashland Oil, he also wasDirector of Technology consulting for Ernst & Young (formerlyArthur Young & Co.), and held management and technical positionswith Thom McAn shoes and State Mutual (Allmerica) insurance. Heis a Certified Computer Professional and Certified InformationSystems Security Professional. Mike was the first-ever recipient of theCSI lifetime achievement award, and has spoken at conferencesthroughout the US, Canada, Mexico and Great Britain.

Page 5: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

ObjectivesObjectives

l After this workshop, you should:– understand where computer forensics can be

applied

– understand the scope and relevance of computerforensics

– learn some techniques for computer forensics

– build a strategy for incorporating computerforensics into your computer security practice

Page 6: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

AgendaAgendal Introduction

l Event identification

l Prevention/Mitigation

l Elements of Forensics

l Financial Implications

l Career Issues

l Platform Specifics

l Summary - Q/A

Page 7: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

IntroductionIntroduction

l What is computer forensics anyway?The application of computer investigationsand analysis techniques in the interests ofdetermining potential legal evidence.Computer specialists can draw on an arrayof methods for discovering deleted,encrypted, or damaged file information(Robbins, 1997).

Page 8: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Event IdentificationEvent Identification

l Human Behavior– blackmail

– extortion

– disgruntled employee

– obtuse behavior

– “dropping the dime”

– sabotage/corporate espionage

Page 9: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Event Identification (2)Event Identification (2)

l Physical Behavior– flood, fire, earthquake, etc.

– mechanical failures

– physical access prohibited

– theft/damage

Page 10: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Event Identification (3)Event Identification (3)

l Organizational Issues– operating system upgrade

– new hardware

– new software

Page 11: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Event Identification (4)Event Identification (4)

l Operational Issues– disk failure

– backup

– virus

– accidental deletions (oops!)

– overwrite

Page 12: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Prevention/MitigationPrevention/Mitigation

l Procedural

l Disaster recovery plan

l planning by project manager

l purchasing hardware & software (datasecurity)

Page 13: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Indirect Results of theseIndirect Results of theseEventsEvents

l Loss of service

l Discontinuity of reporting

l Profit loss

Page 14: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Elements of ForensicsElements of Forensics

l Recovery– evidence preservation

– damage control

– system restoration

l Causation (problem source)

l Proof– evidence analysis

Page 15: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Objectives of ForensicsObjectives of Forensics

l Prove it in court (legal)

l Prove it to prevent future incidents(business)

Page 16: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Financial ImplicationsFinancial Implications

l Insurance for theft/loss

l E & O (???)

l Purchase of extra hardware for incidentpotential and response

l Risk to business

l Cost of prosecution

l Loss/new business (e.g., no controls = loss ofclientele and sound controls = increase inclientele)

Page 17: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Career IssuesCareer Issues

l Types of careers– forensic consultant

– legal aid

– computer crime expert/investigator/attorney

– government agent (High Tech Unit, AG, FBI)

Page 18: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Career Issues (2)Career Issues (2)

l Drawbacks– education

– unknown factor (industry lacking knowledgeabout this area)

– no uniform standards to establish expert statusl experts necessary for court cases to offer opinions

l must have ability to explain process in NON-TECHNICAL MANNER

– TIME AND LABOR INTENSIVE!!!

Page 19: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Q & AQ & A

Page 20: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

SummarySummary

l Computer Forensics is an importantelement of any Security Program.

l Problem recovery may be quicker ifreactive, but may not yield stability.

l Weigh the importance of 3 factors:– Restoration

– Prevention

– Prosecution

l As with anything else: Stay Current!

Page 21: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Platform Architecture IPlatform Architecture I

Windows NT

Page 22: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Platform Architecture IIPlatform Architecture II

Windows 95/98

Page 23: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Platform Architecture IIIPlatform Architecture III

DOS/Windows 3.1x

Page 24: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Comments and ObservationsComments and Observations

Page 25: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Bibliography of ReferencesBibliography of Referencesl Burton, R.F. (1996). “Searching for Fraud Behind the Screens,” The White

Paper, Vol.. 10 (2), The Association for Certified Fraud Examiners

l Forgione, D. (1994). “Recovering “Lost” Evidence from a Microcomputer,”The White Paper, Vol.. 8(3), The Association for Certified Fraud Examiners

l Clede, Bill (1993). Investigating Computer Crime is Every Department’sConcern, Law and Order, July 1993. Available for FTP at:ourworld.compuserve.com/homepages/billc/compcrim.htm

l Conly, C.H. & McEwen, J.T. (1990). Computer Crime: The New CrimeScene. NIJ Reports No. 218, National Institute of Justice, Office of JusticePrograms, U.S. Department of Justice

l Farwell, W. L. (1997). “Stand-alone PC Examinations: Some Basic ForensicGuidelines,” High Technology Crime Investigation Association Newsletter,New England Chapter, Vole. 2(1).

Page 26: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

Bibliography (2)Bibliography (2)

l Howell, F.J., Spernow, W. and Farwell, W.L. (1998). “ComputerSearch & Seizure and Computer Forensics,” HTCIA TrainingSeminar in Boston, MA, April 1998.

l Robbins, J. (1998). An Explanation of Computer Forensics byJudd Robbins. Available at knock-knock.com

l Rosenblatt, K.S. (1995). High Technology Crime: InvestigatingCases Involving Computers. San Jose: KSK Publications

Page 27: Computer Forensics in a LAN Environment - NIST · Computer forensics is a new specialty that can identify the proper procedures for collecting evidence in a manner suitable for use

If You Would Like More:If You Would Like More:

Michael J. Corby, CCP, CISSPM Corby & Associates, Inc.255 Park Avenue, 8th Floor

Worcester, MA 01609-1946 U.S.A.Phone: 1 (508) 792-4320

Fax: 1 (508) 792-4327Web: www.mcorby.com

E-Mail: [email protected] or [email protected]