Tomislav Pokraji, Ivica Kuki - Yet Another Vehicle Tracking System (IT Sho...IT Showoff
油
Sustav koji razvijamo je namijenjen praenju vozila putem GPS ureaja. Na domaem i inozemnom tr転i邸tu ve postoji mnogo rje邸enja za ovu problematiku, ali krenuli smo u razvoj vlastitog softvera vjerujui da mo転emo ponuditi ne邸to dovoljno novo i zanimljivo. Serverska strana sustava se temelji na Java platformi i MSSQL bazi podataka, a klijentske aplikacije su graene na Adobe Flash tehnologiji. Odabir Flash platforme (aplikacije bazirane na Flex4 frameworku i Flash/AIR runtime okolinama) omoguila nam je da napravimo bitan vizualni iskorak u odnosu na konkurentska rje邸enja i provodimo dosta vremena na UX problematici. Serverska strana je pak drugi tip tripa jer se tamo nalaze stream processing, rule engine i ogromna koliina podataka koje treba procesirati u stvarnom vremenu, pohraniti u bazu i nahraniti razne alarming, reporting, real-time UI sync i ostale module.
Uvoenje novih sadr転aja u nastavu digitalne forenzike i kibernetike sigurnos...Damir Delija
油
Sa転etak - U ovom radu razmatramo naine kontinuiranog uvoenje novih sadr転aja u predmete s podruja kibernetike sigurnosti. Kao primjer navodimo Osnove raunalne forenzike u koji se novi sadr転aji uvode kori邸tenjem studentskih praktinih i teoretskih radova, ideje za radove predla転u studenti i predavai. Predlo転eni postupak se sastoji iz testiranja kroz studentski rad, te ugradnje rezultata u nastavne materijale. Da bi se studentski rad uspje邸no koristio mora zadovoljiti niz zahtjeva: prilagoenost stupnju znanja studenta i raspolo転ivoj opremi, raspolo転ivost alata i sustava, jednostavna implementacija i prenosivost, upotreba alata otvorenog koda i slobodnih alata, te minimalna cijena.
Pojam umjetne inteligenicja koji smo susretati samo u znanstveno fantastickim filmovima sada je postao dio svakodnevnice i posve normalna pojava.
Od svojih pocetaka na slaba邸nim racunalima pred kraj dvadesetog stoljeca, ekspertni sustavi su razvojem informaticke industrije dobili znatan porast mogucnosti i sve veci broj primjena u rje邸avanju problema u mnogim svakodnevnim situacijama.
Uredsko poslovanje za tijela dr転avne upraveInpro d.o.o.
油
Upravljanje dokumentima i poslovnim procesima namijenjen za tijela dr転avne uprave.
Radi u skladu s Uredbom o uredskom poslovanju.
Ukljuen urud転beni zapisnik, pisarnica, klase i sl.
Analiza softverske imovine koju koristite - prvi korak migraciji u CloudTomislav Lulic
油
esto se dogaa da tvrtka odlui prijei na servise u Cloudu (Azure, Office 365 itd.), nabavi licence, pokrene servise i nakon toga poku邸aju migraciju svojih postojeih servisa u Cloud. I tu zapne! Za邸to? Zbog pripreme. Naime, dobra analiza 邸to koristite unutar tvrtke i voenje inventara aplikacija koje koristite, jednako je va転no, kao i materijalni inventar (ormari, stolice itd.). Posebno danas kada se pristupa dokumentima i aplikacijama praktiki sa svih ureaja koje posjedujete. Predavanje bi ukazalo na neke zamke kao i naine analize da bi migracija u Cloud bila bezbolnija, ili bi zbog tro邸kova odustali od nje. Da li je mogue migrirati cjelokupno poslovanje u Cloud, koje servise odabrati, kako licencirati? Demonstriralo bi se na nekoliko primjera na 邸to treba paziti i koje alate koristiti u analizi. Software Asset Management ili upravljanje softverskom imovinom tu vam mo転e pomoi.
6414 preparation and planning of the development of a proficiency test in the...Damir Delija
油
This document discusses the preparation and planning for developing a proficiency test in digital forensics using a Greyp electric bicycle. It outlines the planned project phases including creating scenarios, making forensic copies, collecting and evaluating results, and creating and distributing the test. Preliminary analyses of the bicycle have been conducted using various forensic tools to identify and validate digital artifacts that could be used for the test. While work has faced delays due to COVID-19, initial results suggest there are sufficient artifacts across the bicycle and associated devices and cloud storage to form the basis of a useful proficiency test.
Tomislav Pokraji, Ivica Kuki - Yet Another Vehicle Tracking System (IT Sho...IT Showoff
油
Sustav koji razvijamo je namijenjen praenju vozila putem GPS ureaja. Na domaem i inozemnom tr転i邸tu ve postoji mnogo rje邸enja za ovu problematiku, ali krenuli smo u razvoj vlastitog softvera vjerujui da mo転emo ponuditi ne邸to dovoljno novo i zanimljivo. Serverska strana sustava se temelji na Java platformi i MSSQL bazi podataka, a klijentske aplikacije su graene na Adobe Flash tehnologiji. Odabir Flash platforme (aplikacije bazirane na Flex4 frameworku i Flash/AIR runtime okolinama) omoguila nam je da napravimo bitan vizualni iskorak u odnosu na konkurentska rje邸enja i provodimo dosta vremena na UX problematici. Serverska strana je pak drugi tip tripa jer se tamo nalaze stream processing, rule engine i ogromna koliina podataka koje treba procesirati u stvarnom vremenu, pohraniti u bazu i nahraniti razne alarming, reporting, real-time UI sync i ostale module.
Uvoenje novih sadr転aja u nastavu digitalne forenzike i kibernetike sigurnos...Damir Delija
油
Sa転etak - U ovom radu razmatramo naine kontinuiranog uvoenje novih sadr転aja u predmete s podruja kibernetike sigurnosti. Kao primjer navodimo Osnove raunalne forenzike u koji se novi sadr転aji uvode kori邸tenjem studentskih praktinih i teoretskih radova, ideje za radove predla転u studenti i predavai. Predlo転eni postupak se sastoji iz testiranja kroz studentski rad, te ugradnje rezultata u nastavne materijale. Da bi se studentski rad uspje邸no koristio mora zadovoljiti niz zahtjeva: prilagoenost stupnju znanja studenta i raspolo転ivoj opremi, raspolo転ivost alata i sustava, jednostavna implementacija i prenosivost, upotreba alata otvorenog koda i slobodnih alata, te minimalna cijena.
Pojam umjetne inteligenicja koji smo susretati samo u znanstveno fantastickim filmovima sada je postao dio svakodnevnice i posve normalna pojava.
Od svojih pocetaka na slaba邸nim racunalima pred kraj dvadesetog stoljeca, ekspertni sustavi su razvojem informaticke industrije dobili znatan porast mogucnosti i sve veci broj primjena u rje邸avanju problema u mnogim svakodnevnim situacijama.
Uredsko poslovanje za tijela dr転avne upraveInpro d.o.o.
油
Upravljanje dokumentima i poslovnim procesima namijenjen za tijela dr転avne uprave.
Radi u skladu s Uredbom o uredskom poslovanju.
Ukljuen urud転beni zapisnik, pisarnica, klase i sl.
Analiza softverske imovine koju koristite - prvi korak migraciji u CloudTomislav Lulic
油
esto se dogaa da tvrtka odlui prijei na servise u Cloudu (Azure, Office 365 itd.), nabavi licence, pokrene servise i nakon toga poku邸aju migraciju svojih postojeih servisa u Cloud. I tu zapne! Za邸to? Zbog pripreme. Naime, dobra analiza 邸to koristite unutar tvrtke i voenje inventara aplikacija koje koristite, jednako je va転no, kao i materijalni inventar (ormari, stolice itd.). Posebno danas kada se pristupa dokumentima i aplikacijama praktiki sa svih ureaja koje posjedujete. Predavanje bi ukazalo na neke zamke kao i naine analize da bi migracija u Cloud bila bezbolnija, ili bi zbog tro邸kova odustali od nje. Da li je mogue migrirati cjelokupno poslovanje u Cloud, koje servise odabrati, kako licencirati? Demonstriralo bi se na nekoliko primjera na 邸to treba paziti i koje alate koristiti u analizi. Software Asset Management ili upravljanje softverskom imovinom tu vam mo転e pomoi.
6414 preparation and planning of the development of a proficiency test in the...Damir Delija
油
This document discusses the preparation and planning for developing a proficiency test in digital forensics using a Greyp electric bicycle. It outlines the planned project phases including creating scenarios, making forensic copies, collecting and evaluating results, and creating and distributing the test. Preliminary analyses of the bicycle have been conducted using various forensic tools to identify and validate digital artifacts that could be used for the test. While work has faced delays due to COVID-19, initial results suggest there are sufficient artifacts across the bicycle and associated devices and cloud storage to form the basis of a useful proficiency test.
Remote forensics involves acquiring digital evidence from remote devices or locations without physical access. It includes applications like electronic discovery, incident response, network forensics, and cloud forensics. While often understood as live forensics, remote forensics also includes techniques like booting devices into forensic modes remotely or using forensic tools on remote systems to access local evidence. Enterprise-level remote forensic tools allow preventative forensics and faster incident response but are not widely used due to budget, knowledge, and legal barriers. As technology spreads and more data is stored remotely, remote forensics will become more important and perhaps even fully automated for Internet of Things devices in the future.
The document discusses EnCase Direct Network Preview, which allows an examiner to access and examine data on a powered-on computer remotely. It involves generating encryption key pairs, creating a direct servlet file using the public key, deploying the servlet on the target computer, and then connecting from the examiner's EnCase interface by providing the IP address and port. This enables viewing and analyzing the contents of drives, removable media, and memory on the live remote system without needing authentication files or passphrases if disks are encrypted.
Draft current state of digital forensic and data science Damir Delija
油
In this presentation we will introduce current state of digital forensics, its positioning in general IT security and relations with data science and data analyses. Many strong links exist among this technical and scientific fields, usually this links are not taken into consideration. For data owners, forensic researchers and investigators this connections and data views presents additional hidden values.
This document discusses reasons for disliking digital forensics and identifies areas for improvement. It begins by introducing the author's background and motivation. The document then examines issues with naming conventions, tools/practices, standards/definitions, training/certification, and subfields. Key problems highlighted include a lack of standardization, compatibility issues between tools, outdated mindsets, and insufficient computing foundations in training. The author advocates treating digital forensics as an engineering science and applying best computing practices. Overall, the document critically analyzes challenges currently facing the field and questions how these issues may impact the future if not addressed.
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
油
One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",
Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics is a new, very fast developing field which lacks standardization, compatibility, tools, methods and skills. All this drawbacks have impact on the results of forensic process and also have deep influence in training and education process. In this paper real life experience in training is presented, with tools, devices, procedures and organization with purpose to improve process of mobile devices forensics and mobile forensic training and education
The document provides an overview of the deep web and digital investigations. It defines the deep web as data that is inaccessible to regular search engines but exists on the internet. This includes dynamically generated web pages, private websites requiring login, and files accessible only through direct filesystem access. The document estimates the deep web is 400-550 times larger than the surface web that is indexed by search engines. Standard digital forensic procedures can be applied to investigate the deep web, but tools may need to be adapted to handle specialized browsers and access methods used to retrieve deep web resources.
Datafoucs 2014 on line digital forensic investigations damir delija 2Damir Delija
油
This document discusses how to conduct on-line digital forensic investigations using EnCase Enterprise v7. It describes the key EnCase Enterprise components that enable forensically sound and secure network investigations, including the SAFE for authentication, the Examiner for examinations, and Servlets installed on remote machines. It provides steps for creating a new case, adding target nodes, conducting live previews and analyses of remote disks and RAM, and performing automated sweeps to collect files and system information from multiple machines using snapshot, file processing, and system info modules. The document emphasizes the importance of planning, monitoring sweeps, and documenting results.
The document provides an overview of the basic steps for conducting an ediscovery collection using Guidance Software's EnCase Enterprise v7. It describes installing the required EnCase Enterprise components like the SAFE, Examiner and Servlets. It then outlines how to open a new case, define the target nodes, create a collection sweep to retrieve files and metadata based on conditions, and handle the sweep results. The summary provides the essential workflow and technical components involved in performing a foundational EnCase Enterprise collection.
The document discusses how to process scanned documents in EnCase forensic software. It outlines that paper evidence needs to be converted to a digital format that forensic software can analyze. This involves scanning paper documents to create image files, then using optical character recognition (OCR) to convert those images into text files that can be indexed and searched in forensic software like EnCase. It stresses the importance of keeping the entire process forensically sound by not altering the original evidence, documenting all tools and files used, and considering metadata changes.
The document discusses using forensic preview, triage, and collection techniques with the TD3 device. It explores using these processes to complement full drive collection. Preview allows determining if a volume contains evidence, triage prioritizes investigation by reviewing data quickly, and collection fully images storage if enough evidence is found. The document outlines using the TD3 over iSCSI to remotely access storage in a forensically sound way for these processes. This enables fast review and triage to reduce data volume and close cases more efficiently. Hands-on with these techniques will be demonstrated using EnCase tools connected remotely to the TD3 during the training.
This document discusses the digital forensic tool EnCase Forensic. It provides an overview of EnCase and its features, including that it is a leading forensic tool accepted in courts. The document then outlines a scenario where EnCase will be used to conduct a forensic investigation based on a search warrant. The remainder of the document walks through the key functions and screens of EnCase like adding disk images, searching for evidence, tagging evidence, and reporting while conducting the outlined forensic investigation scenario.
Usage aspects techniques for enterprise forensics data analytics toolsDamir Delija
油
This document discusses techniques for accessing and analyzing data from enterprise forensic tools using external data analytics tools. It provides an example using the forensic tools EnCase v7 and FTK to collect disk images, memory images, and system snapshots from endpoints. While these tools store useful data, it can be difficult to extract and analyze. The document demonstrates connecting an EnCase database to an external analytics tool to allow easier viewing and analysis of process and network data across multiple snapshots. This approach could integrate forensic data with security tools like SIEM for more automated incident response.
This document discusses adding artificial intelligence capabilities to workload managers like IBM's AIX Work Load Manager (WLM) to help address system performance problems. It proposes using monitoring data and fuzzy logic rules to detect issues, identify problematic processes, and dynamically reschedule processes to prioritize important services. Existing system instrumentation and soft computing tools could be integrated with Perl to implement this. However, these ideas are theoretical and soft computing approaches are not widely known or accepted. The goal is to give workload managers more "brains" to autonomously address performance problems based on gathered data and expert knowledge encoded as fuzzy rules.
This document provides an example of how to configure workload management (WLM) classes on an AIX system based on business priorities for a banking workload. It describes setting up WLM classes mapped to different business processes and database instances, with rules for static and dynamic classification of processes into the classes. Processes are classified into classes like "biz_critical", "biz_important", and "biz_regular" based on their importance to the business, and resources are prioritized accordingly.
Improving data confidentiality in personal computer environment using on line...Damir Delija
油
The document describes a crypto-disk online encryption system that aims to improve data secrecy for PC users. The system uses a device driver to encrypt and decrypt data in the background as it is written to and read from virtual encrypted disks, redirecting the encrypted data to a file on a host disk. The encryption is transparent to applications and uses the symmetric-key IDEA algorithm. The system is designed to provide encryption with reasonable performance overhead and easy use for improving data privacy on personal computers.
Communication network simulation on the unix system trough use of the remote ...Damir Delija
油
This document describes a simulation of a communication network on UNIX using Remote Procedure Calls (RPCs). The simulation allows testing of network modules and consists of three processes that communicate via RPCs: a network simulator process, a host process, and a remote procedure monitor (RPM) process. The network simulator process pseudocode shows how it simulates message passing between the host and RPM processes and controls message loss based on configurable probability and duration parameters.
2. integriranasigurnost
Plan predavanja
Cilj prezentacije
dati pregled 邸to je raunalna forenzika i kakvo je
stanje
Proi e se kroz
邸to je raunalna forenzika
reakcije na incidente i raunalna forenzika
alati, komercijalni i open source
primjene i uvoenja alata u postojee velike
sustave
3. integriranasigurnost
Razvoj raunalne forenzike
Dva su osnovna motiva razvoja
razvoj raunalnih znanosti
razvoj raunalnih incidenata tj u転em smislu
raunalni kriminal ( uvjek vodi ...)
Kao grana raunalna forenzika relativno nova, ali postupci
su tu od prvih dana kori邸tenja raunala (jedan od
najranijih sluajeva Moris worm 1988)
Metode raunalne forenzike rade i za debugging sustava
pouzdano znati 邸to se i kako desilo
4. integriranasigurnost
Raunalna forenzika
Computer Forensics is simply the application
of computer investigation and analysis
techniques in the interest of determining
potential legal evidence"
Judd Robbins
To je primjena znastvene (forenzike) metode
Dugotrajan, pedantan, dosadan postupak
PS: Zaboravite seriju CSI.....
5. integriranasigurnost
Raunalna forenzika
Cilj raunalne forenzike je da prika転e i objasni
stanje stanje digitalnih artefakata.
Digitalni artefakti mogu biti
- raunalni sistem,
- storage media,
- eletroniki dokument,
- niz paketa u kretanju po mre転i ...
Obja邸njene mo転e biti jednostavno poput "koje su
informacije pristune" " ili detaljno i sofisticirano kao
"koji je niz dogaaja doveo do zateenog stanja"
6. integriranasigurnost
Zahtjevi na postupak
raunalne forenzike
Postupak mora biti dobro dokumentiran i
rezultati moraju biti ponovljivi
Princip "najbolji dokazni materijal" tj. analiza
se radi na egzaktnoj kopiji a ne 転ivom
sustavu ako je ikako mogue
Lanac kontrole dokaza (Chain of custody)
mora garantirati pouzdanost dokaza
izuzetno va転no - za sve mora postojati
zapis/opis
7. integriranasigurnost
Legalni kriteriji
Da bi forenzika tehnika bila legalno prihvatljiva
Da li je tehnika i postupak pouzdano testiran
Da li je tehnika i postupak objavljen, provjeren od
znanstvene zajednice
Da li se pouzdano zna koja je vjerojatnost gre邸ke
tehnike ili postupka
Da li je tehnika i postupak prihvaena od
znanstvene zajednice.
8. integriranasigurnost
Koraci forenzikog postupka
Priprema : priprema alata i opreme potrebne za forenziki
postupak;
Prikupljanje : prikupljanje dokumenta, logova, datoteka i izrada
kopija fizikih objekata koji sadr転e elektronike
dokaze
Ispitivanje dokaza : izdvajanje dokaza iz prikupljenog
materijala
Analiza : analiza dokaza prikupljenih u koraku ispitivanja
dokaza
Izvje邸tavanje : izrada izvje邸taja o nalazima
9. integriranasigurnost
Raunalna forenzika -
obzirom na obuhvat sustava
Forenzika mobilnih ureaja
profilira se kao posebno podruje
Forenzika pojedinanog raunala (host based)
naje邸i sluaj - analize radne stanice
ulazi i forenzika aplikacije, ureaja
Mre転nu forenziku (network enabled, system forensic)
analiza sustava kao umre転ene cjeline, analiza sustava na
razini mre転e, analiza prometa na mre転i, upravljanja
mre転om
Forenzika logova sustava (system log forensic)
rad sa zapisima posebna nauka i alati
10. integriranasigurnost
Forenzika sustava
Mre転na forenzika (network enabled, system
forensic)
analiza sustava kao umre転ene cjeline,
analizu sustava na razini mre転e,
analizu prometa na mre転i, upravljanja
mre転om
analiza aplikacija
Danas svaki puta live forensic
Agent / servlet
Pasivni nadzor
11. integriranasigurnost
Forenzika 転ivog sustava
Live forensic - analiza aktivnog ureaja ili
sustava iji se rad ne smije prekidati
Naje邸a na sustavima i sve e邸a u host
forensic
Radi se i na pojedinanim ureajima i
skupinama
Postoji nain na koji se na forenziki
prihvatljiv nain bilje転e stanja ureaja
Agent / servlet
Pasivni nadzor
12. integriranasigurnost
Standardni koraci raunalne forenzike
za raunalne sustave
Pokretanje dokumentiranog opisa incidentnog dogaaja u sustavu
Identificiranje i kontrola incidenta
Izrada i pohrana datoteka sa elektronikim dokazima u lancu
odgovornosti o dokazima
Oporavak usluga i vraanje / rekonstrukcija obrisanih podataka
Prikupljanje i klasificiranje metadata podataka po vremenu
Povezivanje svih informacija o dogaajima u lanac dogaaja na osnovi
vremena
Analiza metadata timelinea
Dokumentiranje cijelog forenzikog procesa i izvje邸tavanje
Kori邸tenje rezultata u daljim koracima
Detaljna analiza kljunih podatka iz forenzikg izvje邸taja
Sudjelovanje u revizijama
13. integriranasigurnost
Raunalna forenzika - po pristupu
Proaktivna raunalna forenzika
to je primjena metoda raunalne forenzike na
zdravom sustavu za dobivanje "baseline" (potpisa)
sustava
Retroaktivna raunalna forenzika (klasina
forenzika)
to je primjena nakon dogaaja klasini post mortem
ide i bez proaktivne ali puno manja efikasnost
Preduvjet za forenziku je kvalitetna raunalna
administracija sustava (tj. pripremljen teren za
rad)
14. integriranasigurnost
Rezultat forenzikog postupka -
zavr邸no izvje邸e o incidentu
Zavr邸no izvje邸e o incidentu
sadr転i relevantne podatke o incidentu
sadr転i opis postupka
Informacije iz tog izvje邸a moraju omoguiti:
prepoznavanje izvora dogaaja;
prepoznavanja i uklanjanje sigurnosnih propusta
Koristi se u sklopu procesa za upravljanje sigurnosnim
incidentima
Raunalna forenzika kao dio procesa kontrole incidenata i kao
dio procesa nadzora sustava
15. integriranasigurnost
Alati i ekspertiza
Postoje alati za forenziku raunalnog sustava na
nivou operacijskog sustava i sklopovlja
Ekspertiza vrlo rijetka
to se vi邸e ulazi u neku specifinu granu to je
situacija gora ....
Dvije glavne grane ekspertize
Akademska open source /UNIX oriented
Istra転iteljska law enforcement oriented
16. integriranasigurnost
Komercijalni alati ili Opensource
Nema idealnog alata
mo転e postojati zahtjevani alat!
Prednost sa pravne strane na komercijalnim
alatima
Opensource dodatni / kontrolni
Filozofija odabira alata ista kao i za druge
korporativne sustave
kljuno je 邸to mislite raditi i kako, u va邸em
sustavu
18. integriranasigurnost
Primjene i uvoenja u postojee
sustave
Primjene i uvoenja u postojee velike sustave
dio incident responsa (IR)
dio preventivne pripreme i normalnog fukcioniranja
sustava
Samo novi pogled na stare proku邸ane tehnike
kontrole sustava
dobra administracija sustva
Dio pripreme za nastavak poslovanja
bitno razumjevanje va転nosti metoda forenzike
19. integriranasigurnost
Uloga u IT sustavima - podruja
Forenzika baza podataka
Forenzika aplikacija / poslu転itelja
Forenzika logova / zapisa
Forenzika mre転ne opreme
Forenzika multimedije (IP telefonija)
Forenzika Scada sustava procesno /industrijsko
upravljanje
Forenzika mobilnih ureaja i sustava
Forenzika ugraenih sustava
Forenzika osobnih raunala
20. integriranasigurnost
Forenzika baza podataka
Nema namjenskog alata
Ekspertiza jako rijetka
Sustavi slo転eni, velika koliina podataka,
visoka raspolo転ivost
zgodno znati svaki podatak ima cca 11 kopija
negdje u sustavu
Incidenti ostaju u kui
Izvje邸taj od Verizona
"2008 DATA BREACH INVESTIGATIONS REPORT
Four Years of Forensic Research. More than 500
Cases. One Comprehensive Report"
21. integriranasigurnost
Forenzika scada sustava
Orgormna va転nost energetika, industrija ...
Danas - forenzika windows platforme i
scada aplikacije
Nekada - forenzika namjenskog ureaja
Kompleksna okolina u pravilu lo邸e
administrirana
raunalno nije primarno
24. integriranasigurnost
Podruja raunalnih znanja
Operativni sistemi
windows, linux, mac, unix,
Hardware
intel, mobilni ureaji, sparc, powerpc, scada
sustavi, embeded sustavi
Aplikacije
ono 邸to korisnici koriste sa i bez svog znanja
Mre転a, mre転ni servisi i usluge
25. integriranasigurnost
Operativni sistemi - korisniki
Windows ~ 75%
Linux ~ 3%
Mac ~ 12%
Windows XP (35.21%)
Windows 7 (31.21%)
Windows Vista (11.27%)
Mac OS X (7.31%)
iOS (3.38%)
Android Linux (1.30%)
GNU/Linux (1.11%)
26. integriranasigurnost
MS Windows
win 3.11
win nt, win 95, win 98,
win2000
win XP, win 2003
vista
win 7, windows 2008
win 8
windows mobile, windows ce
Svaka verzija ima specifinosti
drugaija struktura direktorija
drugaija pohrana OS i konfiguracija (registry, ini fajle, organizacija registry
strukture, keys)
promjena HW platforme (intel, alpha, powerpc, arm)
promjena tipa file systema (FATxx, NFTS)
drugaiji artefakti i formati (recyle bin, print spooler, backup, index, mail, vss,
browser)
28. integriranasigurnost
Linux kao derivat UNIXa
Distribucije Linuxa nevjerojatan broj i znatne razlike
Primjene OS po raznim kriterijima razne
karakteristike koje treba poznavati
Po OS kriteriju
Serverski OS
Korisniki OS
Po kriteriju ureaja
Mobilni ureaji
Sve mogue HW platforme
Embeded ureaji
Roboti
29. integriranasigurnost
Apple Mac
Evolucijska linija poput windowsa
os 1 .... os 10.x
Raznoliki HW
raunala, serveri
mobilni ureaji
dominanto mobilni ureaji danas
OS razni derivati i verzije
razlike u organizaciji i tipu FSa
razlike u pohrani podatke SQL baza i PListe
Edukacija digitalnog forenziara
30. integriranasigurnost
File systems
FAT, NTFS, EXT, UFS, HSFS .. oko 100 i bez FSa (baze
podataka raw partitions)
Razni aspekti koji se mijenjaju:
Organizacija prostora
Podr転ani mediji
Podr転ani OS
prava i vlasni邸tvo nad objektima
Enkripcija
Kompresija
Backup
Brisanje
Terminologija
31. integriranasigurnost
Mobilni ureaji
Svi ureaji u osnovi selfcontained
U u転em smislu smatphones
apple ios,
android,
windows
ali i GPS, tableti, stari mobiteli i jo邸 邸to邸ta
Razni proizvoai
Razni OSovi
Razni FS i naini pohrane i kodiranja podataka
Vi邸e izuzetaka nego pravila
Meusobna nekompatibilnost forenzikih alata
34. integriranasigurnost
Mobilni ureaji - Android OS
Android najvei oekivani rast
Verzije se meusobno razlikuju a time i artefakti i alati
Android verzije i svojstva
Raspodjela verzija Androida - 2011
35. integriranasigurnost
Mre転a i mre転ni servisi
U転e podruje digitalne forenzike mre転na
forenzika
TCP/IP v4, v6
Legacy mre転ni protokoli
Be転ine veze posebno podruje samo za sebe
Broadband
Malware analiza
36. integriranasigurnost
Aplikacije i programi
Email klijenti (outlook, webmail)
Email serveri (exchange)
Chat, messengers, voip (skype)
web browseri
explorer
mozzila
opera
chrome
Koji su forenziki relevantni artefakti i gdje ovisno o OS platformi,
verziji, konfiguraciji
Kojim alatima se i sa kojom pouzdano邸u mo転e doi do artefakata
37. integriranasigurnost
Linkovi i siteovi
Internet prepun referenci ...
Razliiti aspekti raunalne sigurnosti
http://forensics.sans.org/community/downloads/
"SANS Computer forensic and E-Discovery" SANS
portal za raunalnu forenziku
38. integriranasigurnost
Zakljuak
Raunalna forenzika je dio kontrole i oporavka od incidenta
tu je bitno prepoznavanje (ne)mogunosti raunalne
forenzike
U dogledno vrijeme mo転emo oekivati sve veu pojavu i
objavljivanje incidenata
incidenti se ne mogu vi邸e dr転ati unutar kue
incidenati moraju biti legalno ispravno odraeni
Kori邸tenje metoda raunalne forenzike mora biti sustavno i
ugraeno u organizaciju
Potrebna znanja i postupci moraju biti prepoznati kao ne邸to 邸to
se mora imati na raspolaganju
Bez takvog pristupa sustavi su izuzetno ugro転eni