it-forensics and information security - owaspfeb 28, 2013  · • security/ safety/ reliability •...

35
För utveckling av verksamhet, produkter och livskvalitet. IT-forensics and information security (CC BY-SA) IT-forensics and information security (CC BY-SA)

Upload: others

Post on 28-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

För utveckling av verksamhet, produkter och livskvalitet.

IT-forensics and information security

(CC BY-SA)

IT-forensics and information security

(CC BY-SA)

Page 2: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Locards kontamineringsprincip

Page 3: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Locards kontamineringsprincip

Page 4: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Locards kontamineringsprincip

Page 5: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Exempel

• Du träffar på en påslagen dator. • Ska du ta med den påslagen?• Ska du stänga ner den via operativsystemet?

• Båda metoderna kontaminerar.

Page 6: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensikern

Page 7: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensikern

Teknik -specialist

Page 8: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensikern

Teknik -specialist

Analytiker

Page 9: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensikern

Teknik -specialist

Analytiker

Juridisktkunnig

Page 10: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensikern

Teknik -specialist

Analytiker

Juridisktkunnig

Page 11: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensiska uppdrag

Page 12: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensiska uppdrag

Preventivteknik

Page 13: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensiska uppdrag

Preventivteknik Policy

Page 14: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensiska uppdrag

Strategi

Preventivteknik Policy

Page 15: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensiska uppdrag

Strategi

Preventivteknik Policy

Page 16: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

IT-forensik och informationssäkerhet, 120/180 hp

Page 17: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Methods

• Blended learning• Flipped classroom• Peer interaction• Hands on, lab intensive

Page 18: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Administration ofComputer Systems

• Computer fundamentals• Computer components• Installing OS• Configuring/ hardening• Troubleshooting

• Based on ”Cisco IT Essentials”• Practical test• Report• Presentation

Page 19: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Administration ofOperating Systems

• Linux fundamentals• Set up a typical linux environment, LAMP, mail

server, DNS• Practical test

Page 20: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Digital Storage Data Extraction

• Basics of evidence handling• Basics of data extraction from different media

types• Understanding of how to prevent data extraction• Understanding of limitations• Capability to make ”back of the envelope”

calculations

Page 21: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Advanced IT-Forensic Tools 1

• How to work with typical IT-forensic suites• Data extraction• Search, Mining, Recover, Windows specifics…

• Focus on EnCase / EnCE certification• Practical hands on ”live” case with role play

• Student selling exam drafts• Missing person scenario• Illegal surveilance

Page 22: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Advanced IT-Forensic Tools 2

• Focus on embedded systems• How to hack a modern car• Border scan protocol (JTAG)• Identifying data manipulation• Data extraction & mining

• Seminars, reading scientific papers• Paper• Workshop/ mini conference

Page 23: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Advanced IT-Forensic Tools 3

• Project based training• Standard cases• Two teams, alternating red/blue operation

• Create a case• Swap cases• Try to analyze• Report

• Increasing difficulty

Page 24: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

SCADA

• Industrial systems• Embedded systems• Security/ safety/ reliability• Real hands on project, risk analysis, modelling the

problem, creating a solution, reporting.• Water supply/ waste water handeling/ water

power plant• Note: half a year after the students analyzed

risks with water supply there was a major lyedischarge in the drinking water system.

Page 25: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Thesis work

• 20 weeks – C level• 10 weeks – B level

Page 26: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Optimizing using Triage

(CC BY 2.0) U.S. Army

Page 27: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

OSS vs. proprietary solutions

Copy left. Copy right.

(CC BY 2.0) cheetah100

Page 28: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Portabel UPS

Page 29: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

RAM contaminationduring data extraction

(CC BY-SA 2.0) Daniel Dionne

Page 30: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Identification ofTrueCrypt-containers

Page 31: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Wardriving

• Mapping of three major cities• Focus on the WPS bug (121231)• Image not related

Page 32: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Pen-test of medium sized ISP

Page 33: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

Collaboration

• Program comity• Thesis topics• Thesis supervision• Project topics• Guest lectures

Page 34: IT-forensics and information security - OWASPFeb 28, 2013  · • Security/ safety/ reliability • Real hands on project, risk analysis, modelling the problem, creating a solution,

UT-EXPO

• 30/5 - 1/6