Legal, Regulations, Investigations and Compliance Domain Objectives • Discuss the world’s various major legal systems • Describe the differences and similarities between common law and civil law • Explain laws and regulations affecting information technology • Discuss computer related crime and its importance to information assurance and security 2 Domain Objectives • Describe the importance of international cooperation in relation to computer crime • Explain an incident response methodology • Discuss the importance of digital evidence management and handling • Describe general guidelines for computer forensic investigations 3 Information Security TRIAD Availability Information Security Integrity Confidentiality 4 Domain Agenda • Major Legal Systems • Information Technology Laws and Regulations • Incident Response • Computer Forensics 5 Major Legal Systems • Common Law • Civil Law • Customary Law • Religious Law • Mixed Law 6 Common Law • Roots in England • Based on Legal Precedents, Past Decisions, and Societal Traditions 7 Common Law • Overview of Common Law • Courts • Judges • Common Law Countries 8 Common Law: Criminal Law • Based on common law, statutory law, or a combination of both • Deals with behavior or conduct • Typically the punishment meted out by the criminal courts involves some loss of personal freedom for the guilty party 9 Common Law: Tort Law • Definition • Punishment • Traces its origin to criminal law 10 Common Law: Tort Law • Principles of a Tort • Categories of a Tort 11 Common Law: Administrative Law • Law created by administrative agencies by way of rules, regulations, orders, and decisions • Areas covered by Administrative Law 12 Civil Law • Traces its roots back to two beginnings: • Roman Empire • Napoleonic Code of France • Characteristics • Presents various sub-divisions • Common law as opposed to Civil law • Methodological approach difference • Judges’ role difference 13 Customary Law • Regionalized systems • Reflects the society’s norms and values • Most countries combine customary law with another legal system 14 Religious Law • Traditional Islamic law (Sharia) • Guided by the Qur’an or Sunnah • Covers all aspects of a person’s life 15 Mixed Law • Convergence of two or more legal systems • Examples of mixed law 16 World Legal Systems Source: WorldLegalSystems 17 Domain Agenda • Major Legal Systems • Information Technology Laws and Regulations • Incident Response • Computer Forensics 18 Information Technology Law & Regulations • Intellectual Property Law • Patent • Trademark • Copyright • Trade Secret • Licensing Issues • Privacy • Liability • Computer Crime • International Cooperation 19 Intellectual Property Laws • Purpose • Two categories • Industrial Property • Copyright 20 Intellectual Property: Patent • Definition • Advantages 21 Intellectual Property: Trademark • Characteristics of a Trademark • Word • Name • Symbol • Color • Sound • Product shape ™ • Purpose of a Trademark 22 Intellectual Property: Copyright • Covers the expression of ideas • Writings • Recordings • Computer programs © • Weaker than patent protection 23 Intellectual Property: Trade Secret • Should be confidential • Protection of Trade Secret 24 Intellectual Property: Software Licensing Issues • Categories of software licensing: • • • • Freeware Shareware Commercial Academic • Master agreements and end user licensing agreements (EULAs) 25 Privacy Laws and Regulations • Rights and Obligations • Individuals • Organizations 26 Privacy Initiatives • Generic Approach • Regulation by Industry • The overall objective is to: • Protect citizen’s personal information • Balance the business and governmental need to collect and use this information 27 Privacy and the OECD • The Organization for Economic Co-operation and Development (OECD) • 7 core principles 28 Employee Privacy • Employee Monitoring • Authorized Usage Policies • Internet usage • Email • Telephone (i.e., VoIP) 29 Privacy: Personal Protection • Responsibilities of end users • Encourage use of: • Encryption • Anti-virus • Patches • Shredding 30 Liability • Legal Responsibility • Penalties • Civil • Criminal Penalties • Negligence is often used to establish liability 31 Negligence • Acting without care • Due care 32 Due Diligence • Ethereal concept often judged against a continually moving benchmark • Requires a commitment to an ongoing risk analysis and risk management process • Due Care vs. Due Diligence 33 Computer Crimes • Often divided into 3 categories • Computers as a Tool • Computers as the Target of Crime • Computer Incidental to the Crime 34 Computer Crimes • Insider abuse • Stalking • Viruses • Organized crime • White collar/Financial fraud • Terrorism • Corporate espionage • Hacking • Identity Theft • Social Engineering • Child Pornography 35 International Cooperation • Initiatives related to International Cooperation in dealing with Computer Crime • The Council of Europe (CoE) Cybercrime Convention 36 Domain Agenda • Major Legal Systems • Information Technology Laws and Regulations • Incident Response • Computer Forensics 37 Incident Response: Overview • Response capability • Policy and guidelines • Response • Incident response • • • • • • Debriefing • Metrics • Public Disclosure Triage Containment Investigation Analysis and Treatment Recovery 38 Incident Response Objectives • Incident response in its simplest form is the practice of: • • • • • Detecting a problem Determining its cause Minimizing the damage it causes Resolving the problem Documenting each step of the response for future reference 39 Response Capability • The foundation for Incident Response (IR) is comprised of: • • • • Policy Procedures Guidelines Management of evidence 40 Incident Response Policy • Escalation Process • Interaction with third party entities 41 Response Team • Staffing and training • Virtual Team • Permanent Team • Hybrid of the Virtual and Permanent • Response Team Members 42 Incident Response and Handling • Incident • Approved Handling Process 43 Incident Response and Handling Phases • Triage • Investigation • Containment • Analysis and tracking 44 Triage • Triage encompasses: • Detection • Classification • Notification 45 Triage - Detection • Initial Screening • False Positives 46 Triage - Classification • Incident Hierarchy • General Classifiers • Source (internal vs. external) • More Granular or Specific Characteristics • (i.e., worm vs. spam) 47 Investigation Phase Components • Components of this phase: • • • • Analysis Interpretation Reaction Recovery 48 Investigation Phase Objectives • Desired outcomes of this phase are: • Reduce the impact • Identify the cause • Get back up and running in the shortest possible time • Prevent the incident from re-occurring 49 Investigation Considerations • The investigative phase must consider: • Adherence to company policy • Applicable laws and regulations • Proper evidence management and handling 50 Containment • Reduce the potential impact of the incident • Systems, devices, or networks that can become “infected” • The containment strategy depends on: • Category of the attack • Asset(s) affected • Criticality of the data or system 51 Containment Strategies • Disconnecting the system from the network • Virtually isolating the systems through network segmentation • Implementing a firewall or filtering router with the appropriate rule sets • Installation of Honeynets/Honeypots 52 Containment Documentation • Incident and evidence handling procedures • Sources of evidence • Risk of Entrapment vs. Enticement 53 Analysis and Tracking • The Concept of Root Cause • Determines actual initial event • Attempts to identify the true source and actual point of entry 54 Analysis and Tracking Goals • Obtain sufficient information to stop the current incident • Prevent future “like” incidents from occurring • Identify what or whom is responsible 55 Analysis and Tracking Team • Heterogeneous and/or Eclectic Skills • Solid understanding of the systems affected • Real World, Applied Experience 56 Analysis and Tracking Logs • Dynamic Nature of the Logs • Feeds into the tracking process • Working Relationship with other Entities 57 Recovery Phase Goal • To get back up and running • The Business (worst case) • Affected Systems (best case) • Protect evidence 58 Recovery and Repair • Recovery into production of affected systems • Ensure system can withstand another attack • Test for vulnerabilities and weaknesses 59 Closure of the Incident • Incident response is an iterative process • Closure to the incident 60 Debriefing/Feedback • Formal process • Include all of the team members • Use output to adapt or modify policy and guidelines 61 Communications of the Incident • Public disclosure of an incident can: • Compound the negative impact • Provide an opportunity regain public trust • Communication handled by authorized personnel only 62 Domain Agenda • Major Legal Systems • Information Technology Laws and Regulations • Incident Response • Computer Forensics 63 Computer Forensics • Key Components • Crime scenes • Digital evidence • Guidelines 64 Computer Forensics: The Law • The inclusion of the “law”, introduces concepts that may be foreign to many information security professionals • • • • • Crime scene Chain of custody Best evidence Admissibility requirements Rules of evidence 65 Computer Forensics: Evidence • Computer Forensics includes: • Evidence or potential evidence • Falls under the larger domain of Digital Forensic Science Research Workshop • Deals with evidence and the legal system 66 Computer Forensics: Evidence • Correctly identifying the crime scene, evidence, and potential containers of evidence • Collecting or acquiring evidence: • Adhering to the criminalistic principles • Keeping contamination and the destruction of the scene to a minimum 67 Computer Forensics: Evidence • Using the scientific methods: • Determine characteristics of the evidence • Comparison of evidence • Event reconstruction • Presentation of findings: • Interpreting and analysis of the examination • Articulating these in a format appropriate for the intended audience 68 Crime Scene • Prior to identifying evidence, the larger crime scene needs to be addressed • A crime scene is nothing more than: • The environment in which potential evidence may exist • Digital crime scenes follow the same principles 69 Crime Scene • The principles of criminalistics apply to both digital and physical crime scenes: • Identify the scene • Protect the environment • Identify evidence and potential sources of evidence • Collect evidence • Minimize the degree of contamination 70 Crime Scene: Physical vs. Virtual • The Crime Scene Environment • Physical • Virtual or Cyber 71 Locard’s Principle • Locard’s Principle of Exchange • When a crime is committed, the Perpetrator • Leaves something behind • Takes something with them • This principle allows us to identify aspects of the person or persons responsible, even with a purely digital crime scene 72 Behavior • Investigation or Root Cause Analysis • Means, Opportunity, and Motives (MOM) • Modus Operandi (MO) • Criminal computer behavior is no different than typical criminal behavior 73 Behavior of Computer Criminals • Computer criminals have specific MO’s • Hacking software/tools • Types of systems or networks attacked, etc. • Signature behaviors • MO & Signature behaviors • Profiling • Interviewing 74 Crime Scene Analysis • Protect the ‘crime scene’ from unauthorized individuals • Once a scene has been contaminated, there is no undo or redo button to push • The damage is done! 75 Digital Evidence • The exact requirements for the admissibility of evidence vary • Evidence 76 Digital Evidence: 5 Rules • Admissible • Authentic • Complete • Accurate • Convincing 77 Digital Evidence: Hearsay • Hearsay • Second-hand evidence • Normally not admissible • Business records exceptions: • Computer generated information can fall into this category • May require someone to attest to the how the records/information were created 78 Digital Evidence: Life Span • Digital evidence • • • • Volatile and “fragile” May have a short “life span” Collect quickly By order of volatility (i.e., most volatile first) • Document, document, document! 79 Digital Evidence: Chain of Custody • Chain of Custody • • • • • Who What When Where How 80 Digital Evidence: Accuracy and Integrity • Ensuring the accuracy and integrity of evidence is critical! • The current protocol for demonstrating accuracy and integrity relies on hash functions • MD5 • SHA 256 81 General Guidelines • IOCE/SWGDE 6 principles for computer forensics and digital/electronic evidence • When dealing with digital evidence, all of the general forensic and procedural principles must be applied • Upon seizing digital evidence, actions taken should not change that evidence • When it is necessary for a person to access original digital evidence, that person should be trained for the purpose 82 Six IOCE/SWGDE Principles • All activity relating to the seizure, access, storage or transfer of digital evidence must be fully documented, preserved and available for review • An Individual is responsible for all actions taken with respect to digital evidence whilst the digital evidence is in their possession • Any agency, which is responsible for seizing, accessing, storing or transferring digital evidence is responsible for compliance with these principles 83 General Guidelines: Dos and Don’ts • Minimize Handling/Corruption of Original Data • Account for Any Changes and Keep Detailed Logs of Your Actions • Comply with the Five Rules for Evidence • Do Not Exceed Your Knowledge • Follow Your Local Security Policy and Obtain Written Permission 84 General Guidelines: Dos and Don’ts • Capture as Accurate an Image of the System as Possible • Be Prepared to Testify • Ensure Your Actions are Repeatable • Work Fast • Proceed From Volatile to Persistent Evidence • Don't Run Any Programs on the Affected System 85 General Guidelines: Dos and Don’ts • Act ethically • In good faith • Attempt to do no harm • Do not exceed one’s knowledge, skills, and abilities 86 Domain Summary • Know local laws and regulations • Have an approved procedure for handling of incidents • Ensure that all handling of sensitive information is compliant with regulation • Follow best practices and document all steps of an investigation 87 “Security Transcends Technology”