IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability •...
Transcript of IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability •...
![Page 1: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/1.jpg)
För utveckling av verksamhet, produkter och livskvalitet.
IT-forensics and information security
(CC BY-SA)
IT-forensics and information security
(CC BY-SA)
![Page 2: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/2.jpg)
Locards kontamineringsprincip
![Page 3: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/3.jpg)
Locards kontamineringsprincip
![Page 4: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/4.jpg)
Locards kontamineringsprincip
![Page 5: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/5.jpg)
Exempel
• Du träffar på en påslagen dator. • Ska du ta med den påslagen?• Ska du stänga ner den via operativsystemet?
• Båda metoderna kontaminerar.
![Page 6: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/6.jpg)
IT-forensikern
![Page 7: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/7.jpg)
IT-forensikern
Teknik -specialist
![Page 8: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/8.jpg)
IT-forensikern
Teknik -specialist
Analytiker
![Page 9: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/9.jpg)
IT-forensikern
Teknik -specialist
Analytiker
Juridisktkunnig
![Page 10: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/10.jpg)
IT-forensikern
Teknik -specialist
Analytiker
Juridisktkunnig
![Page 11: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/11.jpg)
IT-forensiska uppdrag
![Page 12: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/12.jpg)
IT-forensiska uppdrag
Preventivteknik
![Page 13: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/13.jpg)
IT-forensiska uppdrag
Preventivteknik Policy
![Page 14: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/14.jpg)
IT-forensiska uppdrag
Strategi
Preventivteknik Policy
![Page 15: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/15.jpg)
IT-forensiska uppdrag
Strategi
Preventivteknik Policy
![Page 16: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/16.jpg)
IT-forensik och informationssäkerhet, 120/180 hp
![Page 17: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/17.jpg)
Methods
• Blended learning• Flipped classroom• Peer interaction• Hands on, lab intensive
![Page 18: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/18.jpg)
Administration ofComputer Systems
• Computer fundamentals• Computer components• Installing OS• Configuring/ hardening• Troubleshooting
• Based on ”Cisco IT Essentials”• Practical test• Report• Presentation
![Page 19: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/19.jpg)
Administration ofOperating Systems
• Linux fundamentals• Set up a typical linux environment, LAMP, mail
server, DNS• Practical test
![Page 20: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/20.jpg)
Digital Storage Data Extraction
• Basics of evidence handling• Basics of data extraction from different media
types• Understanding of how to prevent data extraction• Understanding of limitations• Capability to make ”back of the envelope”
calculations
![Page 21: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/21.jpg)
Advanced IT-Forensic Tools 1
• How to work with typical IT-forensic suites• Data extraction• Search, Mining, Recover, Windows specifics…
• Focus on EnCase / EnCE certification• Practical hands on ”live” case with role play
• Student selling exam drafts• Missing person scenario• Illegal surveilance
![Page 22: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/22.jpg)
Advanced IT-Forensic Tools 2
• Focus on embedded systems• How to hack a modern car• Border scan protocol (JTAG)• Identifying data manipulation• Data extraction & mining
• Seminars, reading scientific papers• Paper• Workshop/ mini conference
![Page 23: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/23.jpg)
Advanced IT-Forensic Tools 3
• Project based training• Standard cases• Two teams, alternating red/blue operation
• Create a case• Swap cases• Try to analyze• Report
• Increasing difficulty
![Page 24: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/24.jpg)
SCADA
• Industrial systems• Embedded systems• Security/ safety/ reliability• Real hands on project, risk analysis, modelling the
problem, creating a solution, reporting.• Water supply/ waste water handeling/ water
power plant• Note: half a year after the students analyzed
risks with water supply there was a major lyedischarge in the drinking water system.
![Page 25: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/25.jpg)
Thesis work
• 20 weeks – C level• 10 weeks – B level
![Page 26: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/26.jpg)
Optimizing using Triage
(CC BY 2.0) U.S. Army
![Page 27: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/27.jpg)
OSS vs. proprietary solutions
Copy left. Copy right.
(CC BY 2.0) cheetah100
![Page 28: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/28.jpg)
Portabel UPS
![Page 29: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/29.jpg)
RAM contaminationduring data extraction
(CC BY-SA 2.0) Daniel Dionne
![Page 30: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/30.jpg)
Identification ofTrueCrypt-containers
![Page 31: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/31.jpg)
Wardriving
• Mapping of three major cities• Focus on the WPS bug (121231)• Image not related
![Page 32: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/32.jpg)
Pen-test of medium sized ISP
![Page 33: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/33.jpg)
Collaboration
• Program comity• Thesis topics• Thesis supervision• Project topics• Guest lectures
![Page 34: IT-forensics and information security - OWASPFeb 28, 2013 · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,](https://reader033.fdocuments.in/reader033/viewer/2022052002/6015a71e94d45042b5755a30/html5/thumbnails/34.jpg)
UT-EXPO
• 30/5 - 1/6