If you are having trouble viewing this email, click here to view this online

 

VOLUME 42

   ISSUE 42

22 January 2015

Article of the Month  Around the World

Computer forensics for dummies

 

Living and Working in a Recorded World

Ever since the World Wide Web (WWW) dropped into our lives in 1991, rapid growth has taken place in the personal, professional, and criminal use of computers, the Internet, e-mail, wireless tech toys, and social networks. These devices create and capture greater amounts of digital details that are stored in more places than most people realize. You have less chance of destroying detail-trails perfectly than of committing the perfect crime. Like the fingerprint left on the seat adjustment of a car used in a crime, a rogue digital fingerprint always lives on to tell the tale

 

What is Computer Forensics?

Computer Forensics is the science of obtaining, preserving, and documenting evidence from digital electronic storage devices, such as computers, PDAs, digital cameras, mobile phones, and various memory storage devices. All must be done in a manner designed to preserve the probative value of the evidence and to assure its admissibility in a legal proceeding.


You can think of it as the science of forensics applied in a digital environment. But where a traditional forensics specialist might collect and preserve fingerprints or other physical evidence, the computer forensics specialist collects and preserves digital evidence.


This collection of digital evidence must be done through carefully prescribed and recognized procedures so that the probative value of digital evidence is preserved to ensure its admissibility in a legal proceeding. As traditional forensics may involve people with different specialties, computer forensics similarly involves a multitude of professional specialties working together to gather, preserve and analyze digital evidence.

Why do individuals and organizations need to pay attention to computer forensics?

Nowadays, more and more people are using computers and devices with computing capability. For example, one can send and receive e-mail messages from handheld devices (such as mobile phones, or PDAs), participate in online computer games simultaneously with other game players over digital networks, or manage their finances over the Internet.

Today, many business and personal transactions are conducted electronically:
• Business professionals regularly negotiate deals by e-mail.
• People store their personal address books and calendars on desktop computers or PDAs.
• People regularly use the Internet for business and pleasure.


According to a University of California study, 93% of all information generated during 1999 was generated in digital form, on computers; only 7% of information originated in other media, such as paper2. Moreover, a significant percentage of computer-created documents might never be printed on paper. Many messages and documents are exchanged over the Internet and are read on the computer screen but are not printed out.

Basic Process of Computer Forensics

Identification phase

Which profile detection, system monitoring, audit analysis were performed.
Preservation phase
This phase is involving tasks such as setting up a proper case management and ensuring an acceptable chain of custody. This phase is crucial so as to ensure that the data collected is free from contamination.

Collection

The relevant data are being collected based on the approved methods utilizing various recovery techniques. Following this phase are two crucial phases, namely, Examination phase and Analysis phase. In these two phases, tasks such as evidence tracing, evidence validation, recovery of hidden/encrypted data, data mining, timeline were performed.

Presentation.
Tasks related to this phase are documentation, expert testimony.
.

By Ravindu Meegasmulla

Ravindu has completed Masters in Digital Forensics and Cybercrime Analysis from Staffordshire University United kingdom. Currently he is working as Intern - Information Security Engineer at Sri Lanka CERT|CC

 

 

1.http://antivirus.about.com/od/securitytips/tp/
  socialengineeringexcuses.htm
  
  
  
  
  
  
  
  
  
  
   
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
 

 
  
  8 smart devices at risk
  

“..The explosion of “smart” devices in the Internet of Things (IoT) or, as some are now putting it, the Internet of Everything (IoE), is bringing unprecedented convenience to consumers. But, as is the case with anything connected to the Internet, it also brings risks...”

  How hackers use employees to break through security walls
  

'..No one wants to think about the idea of their company's customer data, infrastructure, IP or network security as the full-time target for hired-gun hackers, government spies or crime syndicates around the world.

Unfortunately, it's true. Your most vulnerable point of attack is often the people you trust the most: your employees....'

Why Commercial Clouds are More Secure than Federal Data Centers

   

  

'...Ever since the Office of Management and Budget issued its cloud first strategy in 2010, the security of cloud offerings has been a major concern for federal IT managers. It is the primary reason the largest share of cloud expenditures in government has been on private clouds. ...'

WHY DOES CENTCOM EVEN HAVE A TWITTER ACCOUNT?

  

'...The hackers left a post on Pastebin, which said, “In the name of Allah, the Most Gracious, the Most Merciful, the CyberCaliphate under the auspices of ISIS continues its CyberJihad.” It’s unclear if the group has any official ties to the terrorist organization known variously as ISIL, ISIS and the Islamic State, or if it is made up of jihadist sympathizers—or, perhaps, just random hackers....'

Social Engineering: The Basics

'...You've got all the bells and whistles when it comes to network firewalls and your building's security has a state-of-the-art access system. You've invested in the technology. But a social engineering attack could bypass all those defenses....’

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in December 2014
 
  
  Fake
 Hacked
  Other
   
 Statistics - Sri Lanka CERT|CC

THE HACKING OF CENTRAL COMMAND

'....The Twitter and YouTube accounts of U.S. Central Command were apparently hacked on Monday just as President Obama was delivering a speech on new cyber-security proposals. Just after noon, individuals claiming to represent the Islamic State warned U.S. soldiers, "We are coming. Watch your back." The hackers posted documents that purported to show the email addresses and phone numbers for high-ranking U.S. military officers stationed overseas, as well as Pentagon documents labeled "scenarios" for China and North Korea....'

WATCHDOG WANTS TO KNOW IF DOD HAS ACTUALLY SAVED MONEY BY JUMPING TO THE CLOUD

'...Last month, the Defense Department inspector general published a hard-hitting report questioning the structure and execution of the department’s cloud computing strategy.

Now, auditors are putting DOD technology officials on notice that they’re already beginning another probe of the agency’s cloud efforts.....
'

Cybercrime's cost to business

'...hey say "crime pays" -- but we can be certain the paychecks for cybercrime come right out of the pockets of every business with a digital footprint.

In March, Juniper Networks and RAND Corporation released Hackonomics: A First-of-Its-Kind Economic Analysis of the Cyber Black Markets; its conclusion that the "Cyber Black Market" is more profitable than the global illegal drug trade led us to examine the cost of the cyber black market on businesses......'

BIPARTISAN PROPOSAL WOULD BAN INTERNET TAXES FOREVER

 

 

'.....A bipartisan group of House lawmakers are reviving legislation that would permanently extend a ban on taxing Internet access, signaling that efforts to pass a separate bill to widen online sales taxes may continue to face resistance in the lower chamber......'

Google releases Chrome Remote Desktop app for iOS

 

 

'....iOS users will now be able to use Google's Chrome Remote Desktop app to access their desktop PCs remotely from their Apple devices.

The iOS version of the app follows its release on the Android Google Play Store in April last year, and requires users to have iOS 7.0 or later. It is compatible with iPhone, iPad, and iPod touch.....'

 
Notice Board
  Training and Awareness Programmes - January 2015
  
DateEventVenue
- 22nd January-24th January 2015 SQL Training Programme Supported by Oracle Academy National Institute of Education
- 19th January-22nd January 2015 Training on “Nenasa” Education contend development ICT Laboratory Ministry of Education

Brought to you by: