CF Unit 2
CF Unit 2
Data Recovery
Computers systems may crash. Files may be accidentally deleted.
Disks may accidentally be reformatted. Computer viruses may corrupt
files. Files may be accidentally overwritten. Disgruntled employees
may try to destroy your files. All of these can lead to the loss of your
critical data. You may think it's lost for- ever, but you should employ
the latest tools and techniques to recover your data. In many
instances, the data cannot be found using the limited software tools
available to most users. The advanced tools that you utilize should
allow us to find your files and restore them for your use. In those
instances where the files have been irreparably damaged, your
computer forensics expertise should allow you to recover even the
smallest remaining fragments.
Back up Obstacles
The back-up window is the period of time when back-ups can be run.
The back-up window is generally timed to occur during nonproduction
periods when network bandwidth and CPU utilization are low.
3. The available throughput of the tape device onto which the data is
moved
OFFLINE BACKUP affects data accessibility. The time that the host is
offline for data backup must be minimized. This requires extremely
high- speed, continuous parallel backup of the raw image of the data.
LIVE BACKUPS allow data access during the backup process but affect
performance. Many database vendors offer live back-up features. The
downside to the live backup is that it puts a tremendous burden on
the host.
The complex systems that have evolved over the past 30 years must
be monitored, managed, controlled, and optimized. Backups often
take place while an application is running. Application changes take
place on the fly, under the watchful eye of the change-control police.
FAILURES:
Disk storage is more reliable than ever, but hardware failures are still
possible. A simple mistake can be made by an application
programmer, system programmer, or operations person. Logic errors
in programs or application of the wrong update at the wrong time can
result in a system crash or, worse. Disasters do really occur! Floods,
tornadoes, earthquakes, tsunamis, and even terrorism can do strike.
We must be ready.
If all of the resources (image copies and logs) are available at recovery
time, these preparations certainly allow for a standard recovery.
Finding out at recovery time that some critical resource is missing can
be disastrous!
Automated Recovery
Data integrity and your business relay on building recovery job control
language (JCL). In the event of a disaster, the Information
Management System (IMS) recovery control (RECON) data sets must
be modified in preparation for the recovery.
Take Back-ups
The first step to a successful recovery is the backup of your data. Your
goal in backing up data is to do so quickly, efficiently, and usually with
minimal impact to your customers. You might need only very brief
outages to take instant copies of your data, or you might have
intelligent storage devices that allow you to take a snapshot of your
data. Both methods call for tools to assist in the management of
resources.
Collection Options
Once a compromise has been detected, you have two options:
Obstacles
Computer transactions are fast, they can be conducted from
anywhere, can be encrypted or anonymous, and have no intrinsic
identifying features such as handwriting and signatures to identify
those responsible
Any paper trail of computer records they may leave can be easily
modified or destroyed, or may be only temporary.
Auditing programs may automatically destroy the records left when
computer transactions are finished with them.
Types of Evidence
Using the preceding five rules, we can derive some basic dos and
don’ts:
Account for any changes and keep detailed logs of your actions:
Sometimes evidence alteration is unavoidable. In these cases, it is
absolutely essential that the nature, extent, and reasons for the
changes be documented.
Do not exceed your knowledge: If you ever find yourself ―out of your
depth,‖ either go and learn more before continuing (if time is
available) or find someone who knows the territory.
Follow your local security policy: If you fail to comply with your
company’s security policy, you may find yourself with some
difficulties.
Work fast: The faster you work, the less likely the data is going to
change. Volatile evidence may vanish entirely if you don’t collect it in
time. If multiple systems are involved, work parallel.
Don’t run any programs on the affected system: The attacker may
have left trojaned programs and libraries on the system; you may
inadvertently trigger something that could change or destroy the
evidence you’re looking for.
Volatile Evidence
Always try to collect the most volatile evidence first.
An example an order of volatility would be:
General Procedure
When collecting and analyzing evidence, there is a general four-step
procedure you should follow.
Logs and Logging: You should run some kind of system logging
function. It is important to keep these logs secure and to back them
up periodically. Messages and logs from programs can be used to
show what damage an attacker did.
Methods of Collection
There are two basic forms of collection: freezing the scene and
honey potting.
Freezing the Scene
Honeypotting
Artifacts (Objects)
Find the Evidence: Use a checklist. Not only does it help you to
collect evidence, but it also can be used to double-check that
everything you are looking for is there.
Find the Relevant Data: Once you’ve found the evidence, you must
figure out what part of it is relevant to the case.
Collect the Evidence: Collect the evidence using the appropriate tools
for the job.
You want to be able to prove that you did not alter any of the
evidence after the computer came into your possession. Since 1989,
law enforcement and military agencies have used a 32- bit
mathematical process to do the authentication process.
Legal Requirements
This system is for the use of authorized users only. Individuals using
this computer system without authority, or in excess of their authority,
are subject to having all of their activities on this system monitored and
recorded by system personnel.
In the course of monitoring individuals improperly using this system, or
in the course of system maintenance, the activities of authorized users
may also be monitored.
Anyone using this system expressly consents to such monitoring and is
advised that if such monitoring reveals possible evidence of criminal
activity, system personnel may provide the evidence of such monitoring
to law enforcement officials.
The investigation team will need to bring certain tools with them to the incident
site. They will need a copy of their incident-handling procedure, an evidence
collection notebook, and evidence identification tags.
Who initially reported the suspected incident along with time, date, and
circumstances surrounding the suspected incident?
Details of the initial assessment leading to the formal investigation.
Names of all persons conducting the investigation.
The case number of the incident.
Reasons for the investigation.
A list of all computer systems included in the investigation, along with
complete system specifications. Also include identification tag numbers
assigned to the systems or individual parts of the system.
Network diagrams.
Applications running on the computer systems previously listed.
Once all evidence is collected and logged, it can be securely transported to the
forensics lab. A detailed description of how data was transported and who
was responsible for the transport, along with date, time, and route, should be
included in the log. It is required that the evidence be transported under
dual control.