Computer Forensics: ISACA-VA, in Conjunction With Canaudit, Inc. and The Richmond Police Academy
Computer Forensics: ISACA-VA, in Conjunction With Canaudit, Inc. and The Richmond Police Academy
Computer Forensics
Overview: The need for agencies and businesses to become more efficient and integrated with one another, as
well as the home user, has given way to a new type of criminal, the cyber-criminal. It is no longer a matter of will your organization be comprised (hacked)? but, rather, when? Todays battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you. This course will give participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute. Many of todays top tools of the forensic trade will be demonstrated during this course, including software, hardware and specialized techniques.
Tuesday and Wednesday, March 22 & 23, 2005 2 days (16 CPEs and or 16 hours in-service training) 8:00 a.m. to 5:00 p.m., Sign-in and continental breakfast begin at 7:15 a.m. Richmond Police Academy- Virginia Union University 1202 W. Graham Road, Richmond, VA 23220
Location:
Price includes continental breakfast, lunch and refreshments throughout the day
Registration:
Please e-mail or call Butch Johnstone at [email protected] / (804) 786-3979 Richmond or (540) 561-6656 Roanoke to reserve your spot today. Space is limited - Be sure to Register Early! All payments must be received by March 8, 2008 to ensure your spot for the course. Registration forms are available on the web at www.isaca-va.org/. Checks should be made payable to ISACA and mailed to the following address: ISACA VA Attn: Butch Johnstone Dept. of Criminal Justice Services 3743 Round Hill Ave NW Roanoke, VA 24012
Payment:
Accommodations:
Hotel information can be provided upon request.
The Commonwealth of Virginia, Department of Criminal Justice Services, awards Law Enforcement In-service Training Hours. Instructions for obtaining the in-service credits will be available at the seminar.
Canaudit, Inc. is registered with the National Association of State Boards of Accountancy (NASBA), as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be addressed to the National Registry of CPE Sponsors, 150 Fourth Avenue North, Suite 700, Nashville, TN 37219-2417. NASBA phone number: 615.880.4200 Web site: www.nasba.org
SEMINAR OUTLINE
I II
INTRODUCTION Computer Crime in the news UNDERSTANDING COMPUTER FORENSICS What is computer forensics? Terminology How it applies to you Information Warfare Hackers, Crackers & Cyberterrorists Networking basics Communications Devices Identifying your vulnerabilities TRACKING THE CULPRIT Need for thorough documentation What do you have to work with? Written Policies Technical Policies Permissions Billing statements System, application, & device logs Monitoring suspects Employer rights Employee rights Internet tracking Email tracking Identifying a culprits tracks and signature
Creating a profile
IV
VI
III
TOOLS OF THE TRADE Software monitoring tools O/S first Key loggers System trackers Software recovery tools Data Integrity Recovery/search Data wiping Software imaging tools Hardware monitoring tools Cameras Key loggers Recording devices Password crackers Sniffers Encryption Intrusion detection tools PRESERVING EVIDENCE Securing the crime scene Backing up original data Disk imaging Securing your data Public/Private Key Tokens Permissions Seals Validation / Authentication Kerberos Digital Certificates Biometrics
EVIDENCE ANALYSIS The many forms of digital evidence General guidelines for analyzing evidence What to look for Data classification Data reconstruction Need for cooperation of agencies & departments COMPUTER FORENSICS AND THE LAW Investigative procedures Required search & seizure procedures Your companys ethics Reconstructing the crime Computer fraud & abuse act Electronic communications & privacy act Case studies & cybercrimes Presentation of evidence CHECKLISTS & RESOURCES Computer forensic checklists & resources Computer forensic resources
VII
VIII
Chris Schroeder
(Home Base: Simi Valley, California)
Chris Schroeder, CISM is Senior Manager, Technical Audit & Security Services with Canaudit and a team leader of the Canaudit Penetration Team and Lightning Strike Force. He is internationally recognized as an expert in the Windows NT and 2000 environments. Chris is a published author on many security-related topics, including network security. He has an impressive track record in his chosen specialties of network penetration and vulnerability assessment, operating systems audits, network audits, and forensic investigations. Since joining Canaudit, Chris has developed new audit and security techniques that have enabled Canaudit to become one of the preeminent audit consulting and security firms in the United States. His pioneering work in wireless LAN security has set the standard for others to follow. As a former United States Marine, Chris has a unique insight when performing physical security audits. In fact, Chris, along with Canaudits President - Gordon Smith, has written a physical security guide which is available at the Canaudit website www.canaudit.com. In addition to physical security, Chris has performed many forensic audits and has been studying the legalities of the Patriot Act. As an experienced seminar leader and conference speaker, Chris draws on his vast experience with network security, penetration audits, and electronic commerce to easily translate complex technical issues into language readily understood by participants at all levels. Because of his experience in web designing and extranet security consulting, Chris skillfully assists Canaudit clients with e-commerce applications and implementation of e-business solutions. Chris is not only a highly proficient instructor, but he has also developed several Canaudit courses. His latest contribution, Control and Security of Web Applications is one of Canaudits most popular courses. Chris enjoys the security field, particularly the rapidly changing environment and the challenges it poses. He is constantly adapting and testing new security exploits in his efforts to further the audit and security professional body of knowledge.
Chris Schroeder