DOC PREVIEW
UTD CS 4398 - Lecture #6 Forensics Services

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsOutlineReview of Lecture #5Lecture 5: Types of Computer Forensics SystemsCyber CrimeCyber DetectiveRisk ManagementForensic ServicesInvestigative services examplesProcess Improvement: ToolsConclusionLinksDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #6Forensics ServicesSeptember 10, 2007OutlineCyber crimeCyber detectiveRisk ManagementInvestigative servicesProcess improvementConclusionLinksAppendix: Malicious Code DetectionReview of Lecture #5Lectures 5-Types of Computer Forensics Systems-Objective: Identify issues in corporate planning for computer forensicsTools for Digital ForensicsAssignment #1Lab TourLecture 5: Types of Computer Forensics SystemsInternet Security SystemsIntrusion Detection SystemsFirewall Security SystemsStorage Area Network Security SystemsNetwork disaster recovery systemsPublic key infrastructure systemsWireless network security systemsSatellite encryption security systemsInstant Messaging Security SystemsNet privacy systemsIdentity management security systemsIdentify theft prevention systemsBiometric security systemsHomeland security systemsCyber CrimeFinancial FraudSabotage of Data or NetworksTheft of Proprietary InformationSystem Penetration from the outside and denial of serviceUnauthorized access by insiders and employee misuse of Internet access privileges: Insider threatMalicious code (e.g., Virus)Cyber DetectiveForensics investigators -detect the extent f security breach, -recover lost data, -determine how an intruder got past the security mechanisms, -and possibly identify the culpritLegal issues-Admissibility of digital evidence in court-Laws lag technology-Theft: A person must permanently deprive the victim of property: does this apply to cyber theft?Risk ManagementRisk management -is the human activity which integrates recognition of risk, risk assessment, developing strategies to manage it, and mitigation of risk using managerial resources.-The strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk.-http://en.wikipedia.org/wiki/Risk_managementRisk management for Computer Forensics-Effective IT and staff policies-Use of state of the art Vendor tools-Effective proceduresForensic ServicesForensics Incident ResponseEvidence CollectionForensic AnalysisExpert witnessForensic litigation and insurance claims supportTrainingProcess improvementInvestigative services examplesIntrusion detection service-Installing technical safeguards to spot network intruders or detect denial of service attacks at e-commerce serversDigital evidence collection-Identify all devices that may contain evidence-Quarantine all in-house computers-Court orders to preserver and collect evidenceProcess Improvement: ToolsDig –x/nslookupWhoisPingTracerouteFingerAnonymous surfingUSENETNeed to integrate the processesConclusionPart I has provided an overview of computer forensics and discussed technologies, systems and servicesThere are two major aspects: one is detect that a problem has occurred and the other is finding out who did itTechnology and legal aspects: both work togetherShould a corporation outsource the forensics services or carry it out in-houseEvidence collected must be stored in a secure place – security techniques include encryptionMust manage and mitigate risksLinkshttp://www.compforensics.com/http://www.computer-forensic.com/faqs.htmlhttp://www.cfsiusa.com/-Dallas, TXhttp://www.evestigate.com/http://www.digitaldataforensics.com/http://www.databankservices.com/-Austin,


View Full Document

UTD CS 4398 - Lecture #6 Forensics Services

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Lecture #6 Forensics Services
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #6 Forensics Services and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #6 Forensics Services 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?