Digital Forensics, from floppies to the Cloud. Can Darwin win the game of digital evolution?
|
|
- Lawrence Little
- 5 years ago
- Views:
Transcription
1 @kerouanton #ISC2CongressEMEA Digital Forensics, from floppies to the Cloud Can Darwin win the game of digital evolution?
2 Digital Sherlock in a nutshell SOME BASICS
3 Types of digital forensics Investigations Criminal Police Incident Management Breach analysis Data recovery Legal archives
4 Typical forensic workflow
5 From theory to reality SEIZING EVIDENCE
6 The Theory
7 The Reality
8 Diversity
9 Home-made NAS for P2P sharing
10 Physical size vs Logical Size
11 Inventory complexity EVIDENCE COLLECTION
12 Extracting physical media
13 Apple annoyances
14 A typical issue
15 Moore s Law, best ennemy! Major issue with disk size : million of porn files - 18 Tb of disks Several months analysis Very complex case Can quickly become unmanageable.
16 Media gathering Issues Physical Size Logical Size Quantity Diversity Micro-SD cards Terabytes low storage price 10s of formats
17 Another typical issue
18 Cellphone investigation? Priceless! CELL PHONES
19 The cables nightmare
20 Very expensive kits...
21 Police Loves Hard Cases FIELD KITS
22 DNA Field Kit
23 Drone Field Kit
24 GSM Relay Field Kit
25 Cell-phones Field Kit
26 Disk imaging Field Kits
27 All-In-One Field Kit
28
29
30 Seriously, Who can afford this?
31 Mindboggling Parallelization IN THE LAB
32
33
34
35
36 Evidence storage
37 FILE CARVING
38 So many filesystems
39 800 file formats, and more Most forensics tools use the same API for file rendering
40 The time issue 1. Automated Acquisition Takes Hours 2. Automated Carving Takes Hours, Sometimes Days 3. Manual analysis Takes Hours, Days, sometimes Weeks 4. Reporting Takes Days
41 Dealing with NEW «CHALLENGES»
42 Disk Encryption
43 Secure Remote Wiping
44 Tails, TOR and the Darknet
45 What NSA thinks of TOR
46 Darknet Forensics?
47 Embedded devices nightmare
48 Smartphone Encryption
49 IP Box : bruteforcing the PIN
50 imessage, WhatsApp etc.
51 Escaping investigation
52 The Answer about Life, Universe, and Everything 42 = GAMA? (...including Forensics!)
53 Introducing «GAMA»
54 Introducing «GAMA»
55
56
57 icloud
58 Subpoenas
59 Territoriality issues Three possible options 1. Cybercrime agreement (EU, USA, ) helps action on third-party country, but only if we are sure the data are physically stored on the agreeing country. Received directly, must be validated by legal prosecutor. 1. Official request : Commission Rogatoire Internationale (CRI). Takes between 6 and 12 months often too late (if log retention < 6 mois). 2. CRI + backup request. Issues with IP timeout validity, and other proof of evidence elements. The cantonal prosecutor asks Federal Justice Department, who asks OFA in Washington D.C. «Instant» data, further legalizing of obtained evidence. Still not an obligation (for GAMA ) to giveaway data, based on cultural and legal differences amonst countries.
60
61
62
63 Cryptowars - Cloud
64 Cryptowars - Mobile
65 GAMA s Forensic Tools TOWARDS NEW FORENSICS
66
67 Rekall Open Source Python Forensics Framework Virtual Machine Live Forensics Filesystem, Memory, Registy, Processes Multi-OS (Linux, Windows, OSX ) Able to investigate on nested VMs!
68 GRR (Google Rapid Response) Open Source, multiplatform Distributed Forensics Management uses Rekall and more. «Cloud-by-design» Can handle large cases and live investigations ( servers!) Scheduling, and much more features.
69 Final slides TO CONCLUDE
70 Let s recap! Legacy Forensics tools are no longer efficient. Evidence is no longer on Disks, and increasingly in RAM. Evidence is now in virtualized U.S. Clouds (GAMA ). New forensics tools are run by GAMA for their own forensic needs, & cyberattack mitigation. Virtualization and RAM forensics Nested VMs forensics GAMA can collaborate or not, to provide evidence.
71 Fearing the future? GAMA Supremacy, even on Law Enforcement (Cryptowars), is a new interesting challenge. That will lead to the evolution of Legal Arsenal in most countries : To force evidence disclosure by GAMA, To insert backdoors & crypto / key escrow. IS THAT WHAT WE, AS CITIZENS OR COMPANIES, REALLY WANT?
72 Thank #ISC2CongressEMEA By Bruno Kerouanton / éé.net
Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James
Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future
More informationCOMPUTER HACKING Forensic Investigator
COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach
More informationThe data controller is MKCM Software, LLC, contact
PRIVACY POLICY Effective date November 2018 Please read this Privacy Policy carefully to understand our policies and practices regarding your Personal Data (as defined below) and how we will treat it.
More informationGetting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions
Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across
More informationSyllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview
Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and
More informationCLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa
CLOUD FORENSICS : AN OVERVIEW Kumiko Ogawa What is Cloud Forensics Forensic Science - Application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system.
More informationRunning Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University
Running Head: IPHONE FORENSICS 1 iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University IPHONE FORENSICS 2 Abstract With an ever-growing evolution on technology,
More information(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania
(Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,
More informationGetting the best digital evidence is what matters XRY extracts more data faster, with full integrity
Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationData Breach Preparation and Response. April 21, 2017
Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis
More informationGetting the best digital evidence is what matters XRY extracts more data faster, with full integrity
Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without
More informationMobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014
Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationMacintosh Forensic Survival Course
Macintosh Forensic Survival Course Duration: 5 days/level Date: On demand Venue: On demand Language: English Seat availability: On demand (recommended no more than 12) Learning Objectives: Macintosh Forensic
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationHACKING PARIS 2014 EXTREME FORENSICS RELOADES 2Q /2014
HACKING PARIS 2014 EXTREME FORENSICS RELOADES 2Q /2014 Alvaro Alexander Soto Digital Forensics Lab Director HTCIA/ICFP/ACM/IEEE/ACIS/ISSA asoto@asoto.com INTENDED AUDIENCE Forensic lab directors / analysts
More informationCyber Attack: Is Your Business at Risk?
15 July 2017 Cyber Attack: Is Your Business at Risk? Stanley Wong Regional Head of Financial Lines, Asia Pacific Agenda Some common misconceptions by SMEs around cyber protection Cyber Claims and Industry
More informationRenovating your storage infrastructure for Cloud era
Renovating your storage infrastructure for Cloud era Nguyen Phuc Cuong Software Defined Storage Country Sales Leader Copyright IBM Corporation 2016 2 Business SLAs Challenging Traditional Storage Approaches
More informationINTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach
INTERPOL s Role and Efforts in Combating Cybercrime Dr. Madan M. Oberoi Director Cyber Innovation and Outreach What does INTERPOL do? VISION Connecting police for a safer world MISSION Preventing and
More informationComputer forensics Aiman Al-Refaei
Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationFIRST RESPONDER FORENSICS
FIRST RESPONDER FORENSICS or Can I Pull the Plug Now? Mick Walsh Special Agent United States Secret Service Miami Electronic Crimes Task Force THE U.S. SECRET SERVICE Created in 1865 at the end of the
More informationGDPR: A technical perspective from Arkivum
GDPR: A technical perspective from Arkivum Under the GDPR, you have a general obligation to implement technical and organisational measures to show that you have considered and integrated data protection
More informationIncident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles
Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of
More informationGlobal Cybercrime Certification
Global Cybercrime Certification Yves Vandermeer ECTEG chair yves.vandermeer@ Way to a new IT crime ecosystem Standard Operation Procedures and Education docs ACPO - Good Practice Guide For Digital Evidence
More informationRekall Forensic. We can remember it for you wholesale! Michael Cohen Google Inc.
Rekall Forensic We can remember it for you wholesale! Michael Cohen Google Inc. scudette@gmail.com Rekall in a nutshell Rekall started life as Memory Forensic tool with a focus on Speed Reliability - supports
More informationFull Disk Encryption. Larry Carson, Associate Director, Information Security Management
Full Disk Encryption Larry Carson, Associate Director, Information Security Management What Security Really Looks Like at UBC News-worthy Security Incidents VGH Loss of 450 medical records via Resident
More information1:2 Standalone USB 2.0 Flash Drive Duplicator and Eraser - Flash Drive Copier
1:2 Standalone USB 2.0 Flash Drive Duplicator and Eraser - Flash Drive Copier Product ID: USBDUP12 The USBDUP12 Standalone Flash Drive Duplicator/Eraser offers a quick and easy solution for cloning a USB
More informationArchiving to The Cloud?
Why Archiving to The Cloud might prove more problematic than first envisioned. Archiving to The Cloud? White paper on Things to consider when archiving to The Cloud. Ray Quattromini MD Fortuna Power Systems
More informationProject CyberSouth Cooperation on cybercrime in the Southern Neighbourhood
Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project concept 1 Version 1 July 2017 Project title / number (2017/DG1/JP/3692): CyberSouth Cooperation on cybercrime in the Southern
More informationΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES
ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection
More informationA forensically robust method for acquisition of icloud data. Kurt Oestreicher Champlain College
A forensically robust method for acquisition of icloud data Kurt Oestreicher Champlain College Background Data stored on cloud services increasingly important to forensic investigations As of June 2013:
More informationWhen facing legal disputes, can you quickly retrieve s as evidence?
When facing legal disputes, can you quickly retrieve emails as evidence? The Importance of Email Backup Emails serve as an important communication method between enterprises, and it's crucial to properly
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationPlan a Pragmatic Approach to the new EU Data Privacy Regulation
AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General
More informationConvergence of Information and Physical Security
Convergence of Information and Physical Security 11th AMC Conference on Securely Connecting Communities for Improved Health The Friday Center Chapel Hill, NC Session Objectives Describe the cross-disciplinary
More informationOverview on the Project achievements
Overview on the Project achievements Closing Conference, Tbilisi, Georgia 14 May 2010 Cristina Schulman Council of Europe Strasbourg, France Tel +33-3-8841-2103 cristina.schulman@coe.int www.coe.int/cybercrime-georgia
More informationService layering. Integrating Samba with existing DNS infrastructure. SambaXP 2018 June 6th/7th 2018 Pieter Hollants
Service layering Integrating Samba with existing DNS infrastructure SambaXP 2018 June 6th/7th 2018 Pieter Hollants Pieter who? Frankfurt, Germany-based developer (Python, C, ) but also... 3y IT support
More informationLCU Privacy Breach Response Plan
LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard
More informationData Integrity in Stateful Services. Percona Live, Santa Clara, 2017
Data Integrity in Stateful Services Percona Live, Santa Clara, 2017 Data Integrity Bringing Sexy Back Protect the Data. -Every DBA who doesn t want to be fired Breaking Integrity Down Physical Integrity
More informationEU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?
EU GDPR and Email The EU General Data Protection Regulation (GDPR) is the new legal framework governing the use of the personal data of European Union (EU) citizens across all EU markets. It replaces existing
More informationHacking and Cyber Espionage
Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge
More informationGeneral Data Protection Regulation Frequently Asked Questions (FAQ) General Questions
General Data Protection Regulation Frequently Asked Questions (FAQ) This document addresses some of the frequently asked questions regarding the General Data Protection Regulation (GDPR), which goes into
More informationCOMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs
COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline
More informationGeneral Data Protection Regulation
General Data Protection Regulation Workshare Ltd ( Workshare ) is a service provider with customers in many countries and takes the protection of customers data very seriously. In order to provide an enhanced
More informationPRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.
PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy
More informationThe UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC
The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime
More informationData Protection and GDPR
Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have
More informationEuropol Unclassified Basic Protection Level. Council Working Party on Information Exchange and Data Protection (DAPIX) Friends of Presidency
Council Working Party on Information Exchange and Data Protection (DAPIX) Friends of Presidency The Hague, 11 May 2017 EDOC# 895573v8 Data categories to be retained for law enforcement purposes DAPIX Friends
More informationBYOD: A Risk analysis grid for large corporates Corix Partners
BYOD: A Risk analysis grid for large corporates 2013 Corix Partners 1 BYOD: A complex topic for large corporates A large proportion of staff bring personal devices to the office everyday, and use them
More informationCybercrime Capacity Building a cooperative process
Cybercrime Capacity Building a cooperative process Making the UK and Europe a safer place to live and work online Canterbury, 12 January 2018 Nikon FE2 produced from 1983 to 1987 still working and useable
More informationWhat is a computer? Units of Measurement. - A machine that: - Counts.
What is a computer? - A machine that: - Counts. - Does Arithmetic (Addition, Subtraction, Multiplication, and Division) in binary system. - Stores numbers. - Retrieves numbers. Units of Measurement - The
More informationPolice Technical Approach to Cyber Threats
Police Technical Approach to Cyber Threats Jumpei Kawahara Director of High-Tech Crime Technology Division, National Police Agency, Japan 1 Overview (cases) Current Situation 140000 140,000 120000 100000
More information2017 Resource Allocations Competition Results
2017 Resource Allocations Competition Results Table of Contents Executive Summary...3 Computational Resources...5 CPU Allocations...5 GPU Allocations...6 Cloud Allocations...6 Storage Resources...6 Acceptance
More informationCloud Computing. UCD IT Services Experience
Cloud Computing UCD IT Services Experience Background - UCD IT Services Central IT provider for University College Dublin 23,000 Full Time Students 7,000 Researchers 5,000 Staff Background - UCD IT Services
More informationDigital Forensics as a Big Data Challenge
Digital Forensics as a Big Data Challenge Bruxelles, October 23rd 2013 Alessandro Guarino CEO, StudioAG Slide 1 of 20 Digital Forensics 1 DFRWS definition 2001 Digital Forensics is the use of scientifically
More informationISACA National Cyber Security Conference 8 December 2017, National Bank of Romania
C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber
More informationVEMBU VS VEEAM Why Vembu is Better. VEMBU TECHNOLOGIES
VEMBU VS VEEAM Why is Better VEMBU TECHNOLOGIES vs About Technologies is a well known technology innovator in offering Backup & Disaster Recovery () product targeted at IT-Administrators in large, medium
More informationUNODC tackling cybercrime in support of a safe and secure AP-IS
UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway
More informationHow To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik
Using SwiftStack Storage as a Long Term Archive for Rubrik Introduction 3 Solution Architecture 5 Example Design 5 Multi Region Cluster 6 Network Design 6 Minimum Supported Versions and Solution Limits
More informationInformation Security BYOD Procedure
Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More informationSPANNING BACKUP for Salesforce. Customer Managed Encryption Keys
SPANNING BACKUP for Salesforce Customer Managed Encryption Keys Table of Contents Welcome 3 Why should you self-manage your Encryption Keys? 3 How do Customer Managed Encryption Keys work? 4 Configuring
More informationSECURITY STATE OF THE INDUSTRY
SECURITY STATE OF THE INDUSTRY An Interview with Stephen Treglia JD, HCISPP, HIPAA Compliance Officer, Investigations Section, Absolute OVERVIEW The health sector is rapidly adopting new technologies,
More informationDIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING
17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion
More informationBeyond BYOD Mobility, Cloud and the Internet of Everything
Beyond BYOD Mobility, Cloud and the Internet of Everything COCCOC-2002 Donald Gunn, Program Manager Cisco IT Agenda Changing Environment Devices Security Support Cloud & Apps Questions COCCOC-2002 2015
More informationLearning IOS Forensics PDF
Learning IOS Forensics PDF A practical hands-on guide to acquire and analyze ios devices with the latest forensic techniques and toolsabout This BookPerform logical, physical, and file system acquisition
More informationThese views are mine alone and don t reflect those of my employer
These views are mine alone and don t reflect those of my employer You are compromised - Player (1) Insert coin - If? When? Why? login: root Password: ********** Welcome back, root. root@localhost:~# _
More informationBackup, Disaster Recovery: Defining & Managing Your Risk. Dave Kinsey - 5/9/17
Backup, Disaster Recovery: Defining & Managing Your Risk Dave Kinsey - 5/9/17 Smart Business... also, generally a Compliance Requirement Shareholders generally do and absolutely should care that backup
More informationSSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia
SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing
More informationCOE589: Digital Forensics
COE589: Digital Forensics Research in Digital Forensics Dr. Ahmad Almulhem KFUPM - Fall 2012 (T121) COE589 - Ahmad Almulhem 1 Outline Re-Visit to Course Syllabus What is (not) Research? Research Agenda
More informationData Integrity in Stateful Services. Velocity, China, 2016
Data Integrity in Stateful Services Velocity, China, 2016 Data Integrity Bringing Sexy Back Protect the Data. -Every DBA who doesn t want to be fired Breaking Integrity Down Physical Integrity - Help,
More informationBaseline Information Security and Privacy Requirements for Suppliers
Baseline Information Security and Privacy Requirements for Suppliers INSTRUCTION 1/00021-2849 Uen Rev H Ericsson AB 2017 All rights reserved. The information in this document is the property of Ericsson.
More informationHuman factor in CyberSecurity
Human factor in CyberSecurity how to minimize it and save the money Dmytro Petrashchuk Chief Technology Officer Dmitriy_Petrashchuk@bms-consulting.com About Ukraine Location: Eastern Europe Population:
More informationOVERCOMING ios DATA PROTECTION TO RE-ENABLE
OVERCOMING ios DATA PROTECTION TO RE-ENABLE iphone FORENSICS ANDREY BELENKO CHIEF SECURITY RESEARCHER ELCOMSOFT CO. LTD Copyright (c) 2011 ElcomSoft Co.Ltd. CONTENTS Summary 3 iphone Forensics Before ios
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationComprehensive Study on Cybercrime
Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited
More informationLaw Enforcement Solutions
Law Enforcement Solutions DISCOVER ALEN Delivering revolutionary, next-generation cloud solutions for law enforcement. We are a leading provider of cloud solutions for federal, state, and local law enforcement
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationPROJECT RESULTS Summary
Project funded by the European Union Operational Programme Technical Assistance for Institutional Building - TAIB 2012 www.fighting-occ.mk Strengthening the National Capacities for the Fight Against Organised
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationUlster University Standard Cover Sheet
Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information
More informationGeneral Data Protection Regulation (GDPR) The impact of doing business in Asia
SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer
More informationCOMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9
COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9 Course Code: 3401 Prepare for the CHFI certification while learning advanced forensics investigation techniques. EC-Council released the most advanced computer
More informationSmartphone Forensics Moves Pretty Fast. If you don t Stay Current, You ll Miss Evidence
Bueller Bueller Smartphone Forensics Moves Pretty Fast. If you don t Stay Current, You ll Miss Evidence Hank Mahalik heather@smarterforensics.com Twitter: @HeatherMahalik http://smarterforensics.com 3
More informationIncident Response Data Acquisition Guidelines for Investigation Purposes 1
Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response
More informationRekall. Rekall Agent - OSDFCon Forensics. We will remember it for you wholesale! Michael Cohen
Agent - OSDFCon 2017 We will remember it for you wholesale! Michael Cohen mic@rekall-innovations.com is an open source project released under the GPL. It is not an official Google product, and does not
More informationC HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
More informationSERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE. Joey Lau 9 November 2017
SERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE Joey Lau 9 November 2017 jlau@infoxchange.org 1 Technology for social justice www.infoxchange.org Sign up for your $5000 Azure
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationMaitri Studio GDPR Compliance Policy
Maitri Studio Limited Maitri Studio GDPR Compliance Policy Statement of policy and procedures to bring Maitri Studio into compliance with the GDPR Geoffrey Moore and Claire Ferry (Company Directors) 4-23-2018
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationGuide to Computer Forensics and Investigations Fourth Edition. Chapter 2 Understanding Computer Investigations
Guide to Computer Forensics and Investigations Fourth Edition Chapter 2 Understanding Computer Investigations Objectives Explain how to prepare a computer investigation Apply a systematic approach to an
More informationMasters of Computer Application (MCA) Entrance 2012 Computer Knowledge Paper I 1. All of the following are examples of real security and privacy
Masters of Computer Application (MCA) Entrance 2012 Computer Knowledge Paper I 1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity
More information50 TB. Traditional Storage + Data Protection Architecture. StorSimple Cloud-integrated Storage. Traditional CapEx: $375K Support: $75K per Year
Compelling Economics: Traditional Storage vs. StorSimple Traditional Storage + Data Protection Architecture StorSimple Cloud-integrated Storage Servers Servers Primary Volume Disk Array ($100K; Double
More informationCNPD Course: Data Protection Basics
CNPD Course: Data Protection Basics Presentation of Luxembourg s data protection authority Esch-sur-Alzette Dani Jeitz 7-8 February 2018 Service juridique Programme 1. Introduction 2. Basic knowledge 3.
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationSystemic Analyser in Network Threats
Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication
More information