We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF or read online on Scribd
You are on page 1/ 82
Module 05
Designed by . Presented by Professionals.
reScenario
Sam, a system administrator, was surprised to see critical files missing from his,
y office server. He suspected that the server was compromised. He did not want to
take a chance by investigating the system himself.
Sam reported the incident to Bob, an Information Security Officer employed with
the same firm. Bob took note of the request from Sam. Being a CHF, seizing
Sam's system and following the basic procedures in investigating the case was
easy for Bob.
He investigated the image file of the hard disk of the server. His investigation
revealed the presence of roctkit in one of the directories of the server.
During the investigation process, Sam recalled downloading a patch
management tool from the Internet from a third party source. He realized that
kit could have been bundled with the patch management tool
@:e CU eel aaa
Eee ae redSecurity News
EESlSSfaa55 PT
Tey, 2, 2014
Astechnology evolves, so does the criminal mind. To be successful in this information age, law enforcement
ABOUT US must embrace technology tocombat 21st century crimes, That is the philosophy of Franklin County Sherif
Ewell Hunt. " " Hunt said, “investigations
as today are very different than they were 30 years ago, so we must adapt our methods to the 2ist century
criminal.”
. "For example, Hunt
PRESENTATION said. "Anc they contain a wealth of information we can use to establish time lines, contacts and addresses
that are useful to our investigations.”
PARTNERS
CONTACT 3 | BE aD E
"We do not monitor cell phone use," said Sgt. Eric
Ingram. "We retrieve information from call phones we have obtained legally during criminal investigations.”
eeps/pmaru tnefankinnewspost.com
Credence
ee as