SlideShare a Scribd company logo
1 of 27
Download to read offline
sigurnost
integrirana




              Digital Forensics Education

                       Damir Delija,
                       Irena Kukina

                       Bratislava , 23.9.2012. god.
Content                                        2


 Digital forensics education and training
 Relevant IT related knowledge and skills
 Sources of knowledge and skills for digital
 forensics
Why education for digital
forensic ?                                          3


 Without training and education there is no
 effective use of digital forensics tools and
 methodology of digital forensics

 The ability to use different tools does not mean
 the ability to work reliably, especially from
 legal point of view

 With HW and SW training there is a need for
 additional education and continuous
 improvements and keeping up
Who needs digital forensics (1)                         4


             Police, prosecution, judiciary ...
             People there have to understand digital forensics




Digital Forensics Education
Who needs digital forensic (2)   5


 IT business is
 looking for all
 kind of digital
 forensics
 knowledge and
 practice
Who needs digital forensics (3)                           6


 Academy needs people who can teach existing digital
 forensics and who can develop and evaluate new digital
 forensics techniques
Who needs digital forensics (4)   7


   Policy-makers and
decision-makers in all
involved organizations
need to understand
meaning            and
importance of digital
forensics and related
strategic issues like
permanent      training
and education
Digital forensics path                                       8

  Basic educaion and training
   •    Professionall, technical, legal

  Keeping updated
   •    Keeping up tehnology
   •    Deeper specialisation
   •    Keeping up with global trends
   •    Permannet roles, role rotations and duty rotations
   •    Career path as part of skills improvement


  Profesionall and technical certifications
   •    Proof of ability and qualifications


  Continuous education and knowledge transfer
       Part of the job basics and ethics
Knowledge Sources                                                              9


 Academy – long term things
   •   educational programs based on the recognized forensic curriculums
   •   seminars, technology, research, think-thank
   •   long-term projects and research that can not be carried out elsewhere
 Vendors – targeted training / professional training
   •   HW / SW vendors with product trainings




   •   Education for certain forensic and other products, skills
   •   General training and education based on certified training material
Knowledge Sources                                                   10


 Internal, the "knowledge" of the organization -
 continuous internal education
   •   Analytics, information about events as sources
   •   flow of information and use the information as a knowledge


 Internet
   •   Digital forensic online resources


 Other
   •   Conferences, trends local and global
Education and news                                              11


 Digital Forensics follows the development of computer
 technology and science, also it follows the evolution of
 computer crime
 New things are coming ....
 Problem – how to keep up
 Solution – continuous education, but how do it ?
 Who is trainer and who is trainee, how training is done ?
 Who is initiating a training / education ?
 Where are knowledge sources ?
 How long it will to fulfill training, how to measure success
   • Who train trainers,

   • Who evaluate results (and on which basis),

   • who evaluate achieved knowledge

 How expensive is new knowledge and how
 expensive it to be “in dark”
IT areas of expertise                                    12


 Operating systems
  •   windows, linux, mac, unix,
 Hardware
  •   intel, mobile devices, sparc, powerpc, scada,
      embedded systems
 Applications
  •   sw which users use, even without their knowledge
  •   in broadest sense, even malware
 Networking, network services and
 infrastructure
  •   tcp/ip v4, v6 ...
  •   industrial networking protocols
Operating systems - desktops   13

  Windows ~ 75%
  Linux  ~ 3%
  Mac    ~ 12%




Windows XP      (35.21%)
Windows 7       (31.21%)
Windows Vista   (11.27%)
Mac OS X         (7.31%)
iOS              (3.38%)
Android Linux     (1.30%)
GNU/Linux        (1.11%)
MS Windows   14
MS Windows                                                                     15

•   win 3.11
•   win nt, win 95, win 98,
•   win2000
•   win XP, win 2003
•   vista
•   win 7, windows 2008
•   win 8
•   windows mobile, windows ce

Each windows version something new, different
   and undocumented, a bit of nightmare
•   directory structure
•   where are OS files, registry, configuration files
•   HW platforms change (intel, alpha, powerpc, arm)
•   File systems (FATxx, NFTS, exFAT)
•   and all other artifacts recycle bin, print spooler, backup, index, mail,
    vss, browser ...

    •
UNIX            16




server OS

rarely or
expertly user
OS
Linux – UNIX derivate                         17


 Linux distributions – incredible number of
 versions, sometimes important differences
 OS with various applications
 Can be for
  •   Servers
  •   Users (desktops etc)
 Can be used on
  •   Mobile devices
  •   All HW platforms supported
  •   Embedded devices
  •   Robots
  •   And surely I’ve forget something
Apple Mac                                       18


 Evolution like windows
  •   os 1 .... os 10.x


 Different HW
  •   personal machines, servers
  •   mobile devices –today mostly


 OS versions
  •   FS system differences
  •   OS differences path from mac to unix ..
  •   how data is stored in SQL and PLists
Mobile devices                                  19

 It’s almost self-contained devices
 Basically today - smartphones
      •   apple ios,
      •   android,
      •   windows


 and GPS, tablets, old mobiles and many
 other things
 Various vendors (wars)
 Various OS (private and open source)
 Various FS, encryption, etc
 More exception than rules
 Forensic tools not too compatible ... (wars)
Smartphones trends   20

 USA, 2011
 Today almost
 same
Mobile devices - Android OS                       21

 Android biggest one on the market
 Version are different, artifacts and tools too
 Android versions




                    Android versions - 2011
Network and net services                       22


 It is a special part of digital forensics –
 network forensics
 TCP/IP v4, v6
 Legacy networking protocols (IBM SNA)
 Wireless forensics
 Broadband 3G / 4G
 Malware analyses
Applications and programs                                   23


 Email clients (outlook, webmail)
 Email servers (exchange)
 Chat, messengers, voip (skype)
 web browsers
   •   Internet Explorer
   •   Mozilla
   •   Opera
   •   Chrome



 Forensic artifacts depends on OS, version, configuration
 Which tools can access this artifacts in forensically
 sound way
What is our mission                                   24


 Continuous digital forensics training to meet
 our customer needs
 Education is customer oriented, based on
 tools and tasks
    At user premises, in our training center or any
    appropriate location


 Consulting in various issues related to digital
 forensics
What is important                                25


  Continious learning in
 • Tools developement
 • Evolution of computer related crime
 • IT evolution

  Feedback from real world what is missing and
  what needs improvements

  Keep up with tehnology

  Keep up with digital forensics methodology
  Keep up with legal issues

  Certifications
Conclusion                                                  26


 Knowledge is expensive, but ignorance is even
 more expensive (trivia, but true)
 There must be system of continuous training
  •   internal resources are often overlooked and left to
      fade away
 Digital forensics is more important
  •   It is part of critical infrastructure defense
 Because of limited resources
  •   Cooperation (very, very hard to achieve)
  •   As simple as possible internal organization
  •   Career path benefits
Questions                            27




            damir.delija@insig2.hr
            irena.kukina@insig2.hr

More Related Content

What's hot

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...FORnSECSolutions
 
Cell Phone Forensics Research
Cell Phone Forensics ResearchCell Phone Forensics Research
Cell Phone Forensics ResearchHouston Rickard
 
LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...locloud
 

What's hot (6)

Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
Cell Phone Forensics Research
Cell Phone Forensics ResearchCell Phone Forensics Research
Cell Phone Forensics Research
 
LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...LoCloud Collections: set up your own digital library, museum or archive in th...
LoCloud Collections: set up your own digital library, museum or archive in th...
 

Viewers also liked

3 Mercado De La ComunicacióN
3  Mercado De La ComunicacióN3  Mercado De La ComunicacióN
3 Mercado De La ComunicacióNjesustimoteo
 
Tienes un plan, ¡emprende! - José Luis López
Tienes un plan, ¡emprende! - José Luis LópezTienes un plan, ¡emprende! - José Luis López
Tienes un plan, ¡emprende! - José Luis Lópezhttp://joseluislopez.me/
 
Zen media presentación servicios
Zen media presentación serviciosZen media presentación servicios
Zen media presentación serviciosZen Media
 
Taming the Commute Beast
Taming the Commute BeastTaming the Commute Beast
Taming the Commute Beastgueste5a828
 
MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...
MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...
MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...Gabriel Lucchesi
 
Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...
Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...
Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...Paula Peters
 
Plantilla para evaluar recursos digitales
Plantilla para evaluar recursos digitalesPlantilla para evaluar recursos digitales
Plantilla para evaluar recursos digitalesjavier454
 
Marketing Digital
Marketing DigitalMarketing Digital
Marketing DigitalJErickPPTs
 
Herramientas para comunidades part2
Herramientas para comunidades   part2Herramientas para comunidades   part2
Herramientas para comunidades part2Patricia Linares
 
External relations overview presentation
External relations overview presentationExternal relations overview presentation
External relations overview presentationCSaC
 
Robustel r3000
Robustel r3000Robustel r3000
Robustel r3000Robustel
 
3.21.13 Webinar: Investigative Face Recognition For Law Enforcement
3.21.13 Webinar: Investigative Face Recognition For Law Enforcement3.21.13 Webinar: Investigative Face Recognition For Law Enforcement
3.21.13 Webinar: Investigative Face Recognition For Law EnforcementAnimetrics
 
Haz la Transición! Monachil. Make the transition! Monachil (Granada)
Haz la Transición! Monachil. Make the transition! Monachil (Granada)Haz la Transición! Monachil. Make the transition! Monachil (Granada)
Haz la Transición! Monachil. Make the transition! Monachil (Granada)carolinapera
 
Fisica do Violino (www.sheetmusic-violin.blogspot.com)
Fisica do Violino (www.sheetmusic-violin.blogspot.com)Fisica do Violino (www.sheetmusic-violin.blogspot.com)
Fisica do Violino (www.sheetmusic-violin.blogspot.com)William Soph
 

Viewers also liked (20)

3 Mercado De La ComunicacióN
3  Mercado De La ComunicacióN3  Mercado De La ComunicacióN
3 Mercado De La ComunicacióN
 
Matéria culto do gueto
Matéria culto do guetoMatéria culto do gueto
Matéria culto do gueto
 
Portfolio
PortfolioPortfolio
Portfolio
 
Tienes un plan, ¡emprende! - José Luis López
Tienes un plan, ¡emprende! - José Luis LópezTienes un plan, ¡emprende! - José Luis López
Tienes un plan, ¡emprende! - José Luis López
 
50states
50states50states
50states
 
Werken Bij Winvision!
Werken Bij Winvision!Werken Bij Winvision!
Werken Bij Winvision!
 
Zen media presentación servicios
Zen media presentación serviciosZen media presentación servicios
Zen media presentación servicios
 
Taming the Commute Beast
Taming the Commute BeastTaming the Commute Beast
Taming the Commute Beast
 
Antologia arcade
Antologia arcadeAntologia arcade
Antologia arcade
 
MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...
MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...
MMP Gabriel Lucchesi - La utilización de los costos para la toma de decisione...
 
Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...
Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...
Change.org, Paula Hannemann: Die digitale Bewegung - Eine Evolution. (Campact...
 
Plantilla para evaluar recursos digitales
Plantilla para evaluar recursos digitalesPlantilla para evaluar recursos digitales
Plantilla para evaluar recursos digitales
 
Marketing Digital
Marketing DigitalMarketing Digital
Marketing Digital
 
Herramientas para comunidades part2
Herramientas para comunidades   part2Herramientas para comunidades   part2
Herramientas para comunidades part2
 
Setembro2012
Setembro2012Setembro2012
Setembro2012
 
External relations overview presentation
External relations overview presentationExternal relations overview presentation
External relations overview presentation
 
Robustel r3000
Robustel r3000Robustel r3000
Robustel r3000
 
3.21.13 Webinar: Investigative Face Recognition For Law Enforcement
3.21.13 Webinar: Investigative Face Recognition For Law Enforcement3.21.13 Webinar: Investigative Face Recognition For Law Enforcement
3.21.13 Webinar: Investigative Face Recognition For Law Enforcement
 
Haz la Transición! Monachil. Make the transition! Monachil (Granada)
Haz la Transición! Monachil. Make the transition! Monachil (Granada)Haz la Transición! Monachil. Make the transition! Monachil (Granada)
Haz la Transición! Monachil. Make the transition! Monachil (Granada)
 
Fisica do Violino (www.sheetmusic-violin.blogspot.com)
Fisica do Violino (www.sheetmusic-violin.blogspot.com)Fisica do Violino (www.sheetmusic-violin.blogspot.com)
Fisica do Violino (www.sheetmusic-violin.blogspot.com)
 

Similar to 20120911 delija kukina - education of digital forensics experts

Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draftDamir Delija
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer ScienceMarlouPadua1
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftDamir Delija
 
Information technology
Information technologyInformation technology
Information technologyAaron Ephraim
 
OBF Academy webinar - Competitive Skills: A National Open Badge constellation...
OBF Academy webinar - Competitive Skills: A National Open Badge constellation...OBF Academy webinar - Competitive Skills: A National Open Badge constellation...
OBF Academy webinar - Competitive Skills: A National Open Badge constellation...Open Badge Factory Ltd.
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Big Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challengesBig Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challengesMediaTek Labs
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Adam Wyner
 
IoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsIoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsThe IOT Academy
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security fieldAhmed Musaad
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Open source caqdas what is in the box and what is missing
Open source caqdas what is in the box and what is missingOpen source caqdas what is in the box and what is missing
Open source caqdas what is in the box and what is missingMerlien Institute
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons Amr Nasr
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internetFrankie Jones
 

Similar to 20120911 delija kukina - education of digital forensics experts (20)

Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer Science
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
 
Information technology
Information technologyInformation technology
Information technology
 
OBF Academy webinar - Competitive Skills: A National Open Badge constellation...
OBF Academy webinar - Competitive Skills: A National Open Badge constellation...OBF Academy webinar - Competitive Skills: A National Open Badge constellation...
OBF Academy webinar - Competitive Skills: A National Open Badge constellation...
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Big Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challengesBig Data & IoT. Opportunities and challenges
Big Data & IoT. Opportunities and challenges
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
 
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging TechnologiesIT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging Technologies
 
IoT Introduction Architecture and Applications
IoT Introduction Architecture and ApplicationsIoT Introduction Architecture and Applications
IoT Introduction Architecture and Applications
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Open source caqdas what is in the box and what is missing
Open source caqdas what is in the box and what is missingOpen source caqdas what is in the box and what is missing
Open source caqdas what is in the box and what is missing
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Managing knowledge
Managing knowledgeManaging knowledge
Managing knowledge
 
Basic concepts of information technology and the internet
Basic concepts of information technology and the internetBasic concepts of information technology and the internet
Basic concepts of information technology and the internet
 
INTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTERINTRODUCTION TO COMPUTER
INTRODUCTION TO COMPUTER
 

More from Damir Delija

6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...Damir Delija
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...Damir Delija
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1Damir Delija
 
Cis 2016 moč forenzičikih alata 1.1
Cis 2016 moč forenzičikih alata 1.1Cis 2016 moč forenzičikih alata 1.1
Cis 2016 moč forenzičikih alata 1.1Damir Delija
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Damir Delija
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations Damir Delija
 
Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2Damir Delija
 
EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection Damir Delija
 
Olaf extension td3 inisg2 2
Olaf extension td3 inisg2 2Olaf extension td3 inisg2 2
Olaf extension td3 inisg2 2Damir Delija
 
LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation Damir Delija
 
Moguće tehnike pristupa forenzckim podacima 09.2013
Moguće tehnike pristupa forenzckim podacima 09.2013 Moguće tehnike pristupa forenzckim podacima 09.2013
Moguće tehnike pristupa forenzckim podacima 09.2013 Damir Delija
 
Usage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsUsage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsDamir Delija
 
Cis 2013 digitalna forenzika osvrt
Cis 2013 digitalna forenzika osvrt  Cis 2013 digitalna forenzika osvrt
Cis 2013 digitalna forenzika osvrt Damir Delija
 
Aix workload manager
Aix workload managerAix workload manager
Aix workload managerDamir Delija
 
2013 obrada digitalnih dokaza
2013 obrada digitalnih dokaza 2013 obrada digitalnih dokaza
2013 obrada digitalnih dokaza Damir Delija
 
Tip zlocina digitalni dokazi
Tip zlocina digitalni dokaziTip zlocina digitalni dokazi
Tip zlocina digitalni dokaziDamir Delija
 
Sigurnost i upravljanje distribuiranim sustavima
Sigurnost i upravljanje distribuiranim sustavimaSigurnost i upravljanje distribuiranim sustavima
Sigurnost i upravljanje distribuiranim sustavimaDamir Delija
 

More from Damir Delija (20)

6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...
Uvođenje novih sadržaja u nastavu digitalne forenzike i kibernetičke sigurnos...
 
Ecase direct servlet acess v1
Ecase direct servlet acess  v1Ecase direct servlet acess  v1
Ecase direct servlet acess v1
 
Cis 2016 moč forenzičikih alata 1.1
Cis 2016 moč forenzičikih alata 1.1Cis 2016 moč forenzičikih alata 1.1
Cis 2016 moč forenzičikih alata 1.1
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2
 
EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection EnCase Enterprise Basic File Collection
EnCase Enterprise Basic File Collection
 
Ocr and EnCase
Ocr and EnCaseOcr and EnCase
Ocr and EnCase
 
Olaf extension td3 inisg2 2
Olaf extension td3 inisg2 2Olaf extension td3 inisg2 2
Olaf extension td3 inisg2 2
 
LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation
 
Moguće tehnike pristupa forenzckim podacima 09.2013
Moguće tehnike pristupa forenzckim podacima 09.2013 Moguće tehnike pristupa forenzckim podacima 09.2013
Moguće tehnike pristupa forenzckim podacima 09.2013
 
Usage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics toolsUsage aspects techniques for enterprise forensics data analytics tools
Usage aspects techniques for enterprise forensics data analytics tools
 
Cis 2013 digitalna forenzika osvrt
Cis 2013 digitalna forenzika osvrt  Cis 2013 digitalna forenzika osvrt
Cis 2013 digitalna forenzika osvrt
 
Ibm aix wlm idea
Ibm aix wlm ideaIbm aix wlm idea
Ibm aix wlm idea
 
Aix workload manager
Aix workload managerAix workload manager
Aix workload manager
 
2013 obrada digitalnih dokaza
2013 obrada digitalnih dokaza 2013 obrada digitalnih dokaza
2013 obrada digitalnih dokaza
 
Tip zlocina digitalni dokazi
Tip zlocina digitalni dokaziTip zlocina digitalni dokazi
Tip zlocina digitalni dokazi
 
Sigurnost i upravljanje distribuiranim sustavima
Sigurnost i upravljanje distribuiranim sustavimaSigurnost i upravljanje distribuiranim sustavima
Sigurnost i upravljanje distribuiranim sustavima
 

20120911 delija kukina - education of digital forensics experts

  • 1. sigurnost integrirana Digital Forensics Education Damir Delija, Irena Kukina Bratislava , 23.9.2012. god.
  • 2. Content 2 Digital forensics education and training Relevant IT related knowledge and skills Sources of knowledge and skills for digital forensics
  • 3. Why education for digital forensic ? 3 Without training and education there is no effective use of digital forensics tools and methodology of digital forensics The ability to use different tools does not mean the ability to work reliably, especially from legal point of view With HW and SW training there is a need for additional education and continuous improvements and keeping up
  • 4. Who needs digital forensics (1) 4 Police, prosecution, judiciary ... People there have to understand digital forensics Digital Forensics Education
  • 5. Who needs digital forensic (2) 5 IT business is looking for all kind of digital forensics knowledge and practice
  • 6. Who needs digital forensics (3) 6 Academy needs people who can teach existing digital forensics and who can develop and evaluate new digital forensics techniques
  • 7. Who needs digital forensics (4) 7 Policy-makers and decision-makers in all involved organizations need to understand meaning and importance of digital forensics and related strategic issues like permanent training and education
  • 8. Digital forensics path 8 Basic educaion and training • Professionall, technical, legal Keeping updated • Keeping up tehnology • Deeper specialisation • Keeping up with global trends • Permannet roles, role rotations and duty rotations • Career path as part of skills improvement Profesionall and technical certifications • Proof of ability and qualifications Continuous education and knowledge transfer  Part of the job basics and ethics
  • 9. Knowledge Sources 9 Academy – long term things • educational programs based on the recognized forensic curriculums • seminars, technology, research, think-thank • long-term projects and research that can not be carried out elsewhere Vendors – targeted training / professional training • HW / SW vendors with product trainings • Education for certain forensic and other products, skills • General training and education based on certified training material
  • 10. Knowledge Sources 10 Internal, the "knowledge" of the organization - continuous internal education • Analytics, information about events as sources • flow of information and use the information as a knowledge Internet • Digital forensic online resources Other • Conferences, trends local and global
  • 11. Education and news 11 Digital Forensics follows the development of computer technology and science, also it follows the evolution of computer crime New things are coming .... Problem – how to keep up Solution – continuous education, but how do it ? Who is trainer and who is trainee, how training is done ? Who is initiating a training / education ? Where are knowledge sources ? How long it will to fulfill training, how to measure success • Who train trainers, • Who evaluate results (and on which basis), • who evaluate achieved knowledge How expensive is new knowledge and how expensive it to be “in dark”
  • 12. IT areas of expertise 12 Operating systems • windows, linux, mac, unix, Hardware • intel, mobile devices, sparc, powerpc, scada, embedded systems Applications • sw which users use, even without their knowledge • in broadest sense, even malware Networking, network services and infrastructure • tcp/ip v4, v6 ... • industrial networking protocols
  • 13. Operating systems - desktops 13 Windows ~ 75% Linux ~ 3% Mac ~ 12% Windows XP (35.21%) Windows 7 (31.21%) Windows Vista (11.27%) Mac OS X (7.31%) iOS (3.38%) Android Linux (1.30%) GNU/Linux (1.11%)
  • 15. MS Windows 15 • win 3.11 • win nt, win 95, win 98, • win2000 • win XP, win 2003 • vista • win 7, windows 2008 • win 8 • windows mobile, windows ce Each windows version something new, different and undocumented, a bit of nightmare • directory structure • where are OS files, registry, configuration files • HW platforms change (intel, alpha, powerpc, arm) • File systems (FATxx, NFTS, exFAT) • and all other artifacts recycle bin, print spooler, backup, index, mail, vss, browser ... •
  • 16. UNIX 16 server OS rarely or expertly user OS
  • 17. Linux – UNIX derivate 17 Linux distributions – incredible number of versions, sometimes important differences OS with various applications Can be for • Servers • Users (desktops etc) Can be used on • Mobile devices • All HW platforms supported • Embedded devices • Robots • And surely I’ve forget something
  • 18. Apple Mac 18 Evolution like windows • os 1 .... os 10.x Different HW • personal machines, servers • mobile devices –today mostly OS versions • FS system differences • OS differences path from mac to unix .. • how data is stored in SQL and PLists
  • 19. Mobile devices 19 It’s almost self-contained devices Basically today - smartphones • apple ios, • android, • windows and GPS, tablets, old mobiles and many other things Various vendors (wars) Various OS (private and open source) Various FS, encryption, etc More exception than rules Forensic tools not too compatible ... (wars)
  • 20. Smartphones trends 20 USA, 2011 Today almost same
  • 21. Mobile devices - Android OS 21 Android biggest one on the market Version are different, artifacts and tools too Android versions Android versions - 2011
  • 22. Network and net services 22 It is a special part of digital forensics – network forensics TCP/IP v4, v6 Legacy networking protocols (IBM SNA) Wireless forensics Broadband 3G / 4G Malware analyses
  • 23. Applications and programs 23 Email clients (outlook, webmail) Email servers (exchange) Chat, messengers, voip (skype) web browsers • Internet Explorer • Mozilla • Opera • Chrome Forensic artifacts depends on OS, version, configuration Which tools can access this artifacts in forensically sound way
  • 24. What is our mission 24 Continuous digital forensics training to meet our customer needs Education is customer oriented, based on tools and tasks At user premises, in our training center or any appropriate location Consulting in various issues related to digital forensics
  • 25. What is important 25 Continious learning in • Tools developement • Evolution of computer related crime • IT evolution Feedback from real world what is missing and what needs improvements Keep up with tehnology Keep up with digital forensics methodology Keep up with legal issues Certifications
  • 26. Conclusion 26 Knowledge is expensive, but ignorance is even more expensive (trivia, but true) There must be system of continuous training • internal resources are often overlooked and left to fade away Digital forensics is more important • It is part of critical infrastructure defense Because of limited resources • Cooperation (very, very hard to achieve) • As simple as possible internal organization • Career path benefits
  • 27. Questions 27 damir.delija@insig2.hr irena.kukina@insig2.hr