Associate Director â Security Research and Analytics. UBS AG. SESSION ID: .... Can be resource intensive, consumes CPU
discusses the emerging area of cloud forensics, and highlights its chal- lenges
and ... (CSPs) and cloud customers – must establish forensic capabilities that.
What are the three layers of cloud computing? .... To support the forensic investigation, cloud service providers (CSPs)
We define malware as âmalicious softwareâ or anything that can run on an endpoint and do bad things. This includes .
Mar 2, 2016 - Network logs. Fabric. Data center security token service. Cloud service logs ... Computer. System ... MSRC, O365 Advanced Threat. Protection ...
CLOUD STORAGE FORENSICS. MATTIA EPIFANI. SANS EUROPEAN DIGITAL
FORENSICS SUMMIT. PRAGUE, 7 OCTOBER 2013 ...
What is Cloud Computing? ⢠Anything and everything ... Keys to Cloud Computing. ⢠A revolution in the ... Private cl
Nancy J. Cox, Ph.D. The University of Chicago http://genemed.uchospitals.edu.
Cloud Computing for. Large-Scale Sequencing ...
Mar 2, 2017 - Blast or Reciprocal Best Hits (RBH)[2â4]. In order for a RBH to be .... the users receive an email with a link for their results. The web server is ...
Anything and everything that is âout thereâ â not on your desktop or laptop. ⢠Outsourcing. â IT support. â
What is Cloud Computing? ⢠Anything and everything that ... HIPAA compliant clouds with EMR data. â dbGaP-level ...
tenants and collaboration between international law enforcement agen- cies are ..... Amazon S3 and Amazon Simple DB ensure object durability by stor-.
Session ID: Session Classification: Christopher Hadnagy. Social-Engineer.Com.
Human Hacking Exposed. 6 Preventative Tips. That Can. Save Your Company.
Service Platform for Internet Videos ... Index TermsâContent delivery network, digital forensics, load .... forensics service architecture and platform, which can.
which integrates the CDN-based distributed architecture and. CRAS algorithm with a large-scale video detection algorithm, and evaluate the deployed system.
Cyber Security & Aviation. MASH-F01. Managing ... General Counsel & Managing Director Information. Security. TAL
Taking it all In â And Applying It to Scale ... resolve ALL potential vulnerabilities, whether reported from ..... ISO
02/26 and 02/27, will each receive a Pebble smartwatch with an estimated retail
value in US Dollars or “ARV” of $150; aggregate retail value of all prizes is ARV ...
Besides this, the existing digital forensics tools cannot cope with the dynamic ...
mitigation strategies, which have significant real-life implications in investigating
...
information technology services are created, delivered, accessed and managed. .... and cloud computing is based on broad network access, thus technically, ...
Dec 7, 2011 - www.lonix.com/training/Lecture_Systems_Overview.pdf ..... an event free from parental supervision and isolated from the .... requirements could be most accurately described as "like a magician⦠..... Setting up a Leavers Video Diary t
19 Aug 2013 ... PROVIDING CLOUD FORENSICS VIA F-RESPONSE. Page 2. 8/19/2013. TABLE
OF CONTENTS. Table of Contents .
efficacy of collected digital evidence for computer forensics investigations. In fact .... Agents are software units distributed in every cloud machine which manage ...
Session ID: Session Classification: Edward L. Haletky. AstroArch Consulting, Inc.
Sam Curry. RSA, The Security Division of EMC. Large Scale Cloud Forensics.
Large Scale Cloud Forensics
Edward L. Haletky AstroArch Consulting, Inc.
Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced
Happenstance
Lo and Behold … Sam and Edward sit on a train … (January 2011) Edward Wrote a Book with Forensics as the last chapter … (2009)
•Discussing an Idea for Better Large Scale Cloud Forensics …
2
Problem Scenario The Economist reported on July 6th, 2011, that arrests in Latvia triggered an FBI raid in Virginia • Multiple Tenants Impacted • Multiple Jurisdictions Involved
Touched Upon • Continuity of Business • “Legality” Issues (Boundaries => Tenants) • Law Enforcement’s Civil Liability • Effectiveness of Forensic Approach
Sledgehammer to drive in a Thumbtack
3
Formal Problem Statement Given • Large Scale • Multi‐Tenant • Cloud
Required • Acquire Data • Perform Analysis • Store Data
Solution Must Include • Modern Methodology • Improved Technology and Tools • Improved Legal Framework
4
Challenges
Virtual Environment
Incident
Audit + Gather Evidence
Forensics
Response
Court of Law
5
Data
Storage
Why Care?
Business
• Saves Money • Less Operational Risk • Less Liability Risk
• Saves Money over Time • Faster and Less Disruptive Acquisition • Faster Investigations Law Enforcement • Less Error Prone Methodology
Forensic Scientists
• Advancing the State of the Art • Less Time doing the Mundane
6
The State of Acquisition Today Acquisition of Physical Resources Acquisition of Virtual Law Enforcement Just Gets a Bigger Truck Using In‐VM Disk Grabbing Technologies (ala Encase) Grab Everything Mentality Language of Warrants lacking Using Disk Replication Methods (not proven (target IP not Tenant) forensically sound) Chain of Custody Issues no uniqueness among Clouds
7
State of Analysis Today Separate Forms of Analysis Disk
Network
Log (OS Logs)
Memory (at least 1 service provider)
Non‐Uniform No Preponderance of evidence Only Ask Simple Questions
Answers are not fine‐grained
•Not a lot of multiply re‐enforcing evidence •A contradiction violates the conclusion
Little Data Tools Trying to Answer a Big Data Problem
8
First Principles Locard’s Priniciple
Uniqueness (Chain of Custody)
• Whenever a crime is committed there is an exchange of evidence between the criminal and the crime scene. • 20th century this came to mean trace evidence • In the Cloud, this implies electronic evidence
• Require Uniqueness Among Clouds • How you process the, data affects the chain of custody • Improve “Bagging and Tagging”
The Fourth Dimension (Time) • Need a constant Time Source • Can we find one outside the Target
9
Unique Identifier Uniqueness is a Quality of the Following Objects: • Virtual Disks • Configuration Files • Run‐Time Files • Log Files • vNetwork Interfaces
Uniqueness must be represented by an artifact that can be computed upon (search upon, quantify etc.) • Eg Identification value
Rules of Unique Identifier • No two objects, regardless of time or location, should have the same artifact • Artifact Can be and should be used to describe relationships among objects • Must Survive migration • Eg vMotion, Migration between clouds • Ultimately Any of the Above objects without an ID is rogue
10
Time Common Time Source Cases Thrown Out if Time not correct
Track Across Time Temporal Acquisition From Now til Whenever? Can we go back in Time?
Big Data Problem
11
Tools Needed Requirements for Future Clouds • Unique ID • Mapping between Admin Users and low level action • … Other VMware SRQs