introduction

33
INTRODUCTION Patrick Norman

Upload: jadyn

Post on 25-Feb-2016

26 views

Category:

Documents


1 download

DESCRIPTION

INTRODUCTION. Patrick Norman. World Trends. Smart World Smart Grids (Power, etc.) Mobile Integration between physical and digital world. IT Threats. DDoS attacks Fraud Phishing Attacks Spoofing Talk more about other attacks and threats. Forensics Investigators. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: INTRODUCTION

INTRODUCTION

Patrick Norman

Page 2: INTRODUCTION

World Trends

• Smart World – Smart Grids (Power, etc.)– Mobile – Integration between

physical and digital world

Page 3: INTRODUCTION

IT Threats

• DDoS attacks• Fraud• Phishing Attacks• Spoofing• Talk more about other

attacks and threats

Page 4: INTRODUCTION

Forensics Investigators

Main responsibilities (Job activities)

• Attempting to uncover the trace of an attacker to identify him

• Uncovering IT System security threats

• Testifying in court against convicts

• Add slideshow of Department of Justice documents

Page 5: INTRODUCTION

Importance of Computer Forensics Systems

How can Computer Forensics Systems improve security

• Better identification of system threats to improve protective measures

• Catching cyber criminals will have a better effect than regular criminals because they have bots automatically generating threats (FIX THIS)

Page 6: INTRODUCTION

Simulation

Page 7: INTRODUCTION

Background of Simulation

• Statistical Modelling– Idea

• Software– Arena – Custom code

Page 8: INTRODUCTION

Simulation

• Why do we simulate?– An Improved tool

• When do we simulate?– Before and after an event

• Can we rely on it?– 70-90%

Page 9: INTRODUCTION

Simulation

• Inputs– Random Number generators

• Outputs• How to interpret results

Page 10: INTRODUCTION

SDLC and Simulation

Page 11: INTRODUCTION

Statistical Modelling

• When should this be used?• Key success components

Page 12: INTRODUCTION

Software

• Monte Carlo– Off-the-shelf– Advantages

• Network Modelling– Off-the-shelf– Advantages

• Custom Code

Page 13: INTRODUCTION

Computer Forensics

Page 14: INTRODUCTION

Mobile Forensics

• Outsell PCs

• Harder to investigate• Newly acquired need to investigate• Data paths• Numerous Manufacturers

• NIST

Page 15: INTRODUCTION

Tools & Techniques

• SIMbrush

• MOBILedit!

• TULP 2G

Page 16: INTRODUCTION

Weaknesses

Page 17: INTRODUCTION

Network Forensics

• “Network forensics is the science that deals with capture, recording, and analysis of network traffic for detecting intrusions and investigating them.”

Page 18: INTRODUCTION

Tools & Techniques

Page 19: INTRODUCTION

Weaknesses

Page 20: INTRODUCTION

Database Forensics

Page 21: INTRODUCTION

Tools & Techniques

• SQL Server Management Studio Express• SQL CMD• Windows Forensic Tool Chest• NetCat• WinHex

Page 22: INTRODUCTION

Challenges

• Encryption

• Use as Evidence

• Evolving Technology

Page 23: INTRODUCTION

Application

Page 24: INTRODUCTION

Step 1: Observation

Page 25: INTRODUCTION

Observation

• Actual Observation– On the shop floor

• Historic– Statistics– Distribution

• Diagrams– System Architecture

Page 26: INTRODUCTION

Observation

Develop the Equation

BASIS FOR ENTIRE MODEL

Page 27: INTRODUCTION

Step Two

Develop the Model

Page 28: INTRODUCTION

Models

• Network Models– Processes– Data flow– Queues

Page 29: INTRODUCTION

Models

• Monte Carlo– Deterministic– Largely Random

Page 30: INTRODUCTION

Model

• Objective– Gain Knowledge– Matching real and simulated– Now Let’s break it

Page 31: INTRODUCTION

Step 3

Analyze and Fix

Page 32: INTRODUCTION

Analysis

• Multiple Iterations• Compare Expected and Actual Results• Compare Actual and Historic Results

Page 33: INTRODUCTION

Benefits to UNIWO

• Security of IT systems– Pre and post simulation will allow us to identify

threats earlier• Stability– Probability of having an unexpected system

shutdown is decreased significantly• Simulation added to computer forensics will

improve chances for catching cybercriminals by identifying their patterns