Forensic Investigation in Virtual Environment and hidden crime

advertisement
„Co-funded by the Prevention of and Fight against Crime Programme
of the European Union“
Training programme “Forensic investigation in a Virtual Environment and hidden crime information
detection”
The training programme is designed for law enforcement officers who perform criminal investigations of
virtual and cloud computing environments.
Law enforcement agents seeking to successfully investigate cybercrimes must know the basic virtual and
cloud computing environment operating principles, criminal concealment capabilities, cyber-crime
evidence collection techniques in virtual and cloud computing environments. The aim of this training
programme is to provide knowledge which would help to reduce international cybercrime damage by
stopping these crimes in a timely manner. The training programme includes an analysis of cyber security
vulnerabilities, cybercrime in cloud computing environments, practices applied in the EU and LT, and
experience in developing of training programmes.
This training programme covers the topics such as the main concepts of virtualisation and cloud computing,
challenges for virtualisation, forensic investigation of virtualisation technologies for personal use and
corporative use, basic on encrypting, steganography, data bases and virtualisation technologies for
cybercrime.
The topic on challenges for virtualisation includes application of virtualisation technologies, explanation
where are data, who does manage data, what are means for forensic investigation, how to investigate data
in the cloud.
The forensic investigation of virtualisation technologies for personal use is going into detail, how to identify
the use of virtualisation technologies at in-situ search and inspection, the most popular virtualisation
technologies for personal use (Google Drive, Dropbox, OneDrive, iCloud, Box, Spideroak, etc.), how to
collect information from typical virtualised environments, the most often used virtualised services (e-mail,
contacts, calendars, documents, spreadsheets, music, photos, videos, slideshows, fileshares, media
streaming, desktop apps/access), how the access rights are organised, users authentication, how an
additional information could be collected using available information (using other user accounts), the
commonly used virtualisation technologies with mobile access in accordance with mobile technology
groups (iPhone, iPad, Android, Windows Mobile, BlackBerry, Mobile Browser), the commonly used the
social internet services that could be used as virtualisation technologies (Facebook, Instagram, etc.),
collection of big data, the usage of remote access to forensic data storage, the typical problems and their
solutions scenarios.
The forensic investigation of virtualisation technologies for corporative use is focusing on the commonly
used virtualisation technologies in business, Citrix virtual environment and search of evidences in Citrix
virtual environment (XENServer), Vmware virtual environment and search of evidences in Vmware virtual
environment (ESXi), Microsoft virtual environment and search of evidences in Microsoft virtual
environment (Hyper-V), how to proceed at detection of the usage of virtualisation technologies at in-situ
search in company.
Encrypting topic includes the presentation of the methods and means of data encrypting potentially used
to hide the criminal information in computers and in virtual environment, methods and means for
detection, extraction and storage for further investigation of encrypted data and encrypted files.
1
„Co-funded by the Prevention of and Fight against Crime Programme
of the European Union“
Steganography topic focuses on the methods and means of steganography potentially used to hide the
criminal information in computers and in virtual environment, methods and means for detection,
extraction and storage for further investigation of data and files hidden by using steganography methods.
Data bases topic highlights an expertise of data bases.
Topic on vulnerability of IS backed out by data bases focuses on SQL injection, forensic of data bases
vulnerability and search crimes footprints.
Topic on virtualisation technologies for cybercrime explains the mechanisms of DDOS and anonymization.
The training programme is tailored both for in the class-training and learning remotely.
2
Download