Auditing Database Systems Through Forensic Analysis
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Part 1 Digital Forensics Module Jaap Van Ginkel Silvio Oertli
Part 1 Digital Forensics Module Jaap van Ginkel Silvio Oertli July 2016 Agenda • Part 1: Introduction – Definitions / Processes • Part 2: Theory in Practice – From planning to presentation • Part 3: Live Forensics – How to acquire a memory image – Investigate the image • Part 4: Advanced Topics – Tools – Where to go from here – And more 2 Disclaimer§ • A one or two-day course on forensics will not make you a forensics expert. – Professionals spend most of their working time performing forensic analysis and thus become an expert. • All we can offer is to shed some light on a quickly developing and broad field and a chance to look at some tools. • We will mostly cover Open Source Forensic Tools. 3 Introduction Forensics in History 4 Forensics – History 2000 BC 1200 BC 5 Introduction Definitions / Processes 6 Forensics – The Field digital forensics Computer Forensics Disk Forensics Mobil Forensics Memory Forensics Datenbase Forensics Live Forensics Network Forensics 7 Forensics - Definition • Digital Forensics [1]: – Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. • Computer Forensics [2]: – Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. 8 Forensics - Definitions • Network Forensics [3]: – Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.[1] Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. -
Introduction to Criminal Investigation: Processes, Practices and Thinking Introduction to Criminal Investigation: Processes, Practices and Thinking
Introduction to Criminal Investigation: Processes, Practices and Thinking Introduction to Criminal Investigation: Processes, Practices and Thinking ROD GEHL AND DARRYL PLECAS JUSTICE INSTITUTE OF BRITISH COLUMBIA NEW WESTMINSTER, BC Introduction to Criminal Investigation: Processes, Practices and Thinking by Rod Gehl is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted. Introduction to Criminal Investigation: Processes, Practices and Thinking by Rod Gehl and Darryl Plecas is, unless otherwise noted, released under a Creative Commons Attribution 4.0 International (CC BY-NC) license. This means you are free to copy, retain (keep), reuse, redistribute, remix, and revise (adapt or modify) this textbook but not for commercial purposes. Under this license, anyone who revises this textbook (in whole or in part), remixes portions of this textbook with other material, or redistributes a portion of this textbook, may do so without gaining the author’s permission providing they properly attribute the textbook or portions of the textbook to the author as follows: Introduction to Criminal Investigation: Processes, Practices and Thinking by Rod Gehl and Darryl Plecas is used under a CC BY-NC 4.0 International license. Additionally, if you redistribute this textbook (in whole or in part) you must retain the below statement, Download this book for free at https://pressbooks.bccampus.ca/criminalinvestigation/ as follows: 1. digital format: on every electronic page 2. print format: on at least one page near the front of the book To cite this textbook using APA, for example, follow this format: Gehl, Rod & Plecas, Darryl. (2016). Introduction to Criminal Investigation: Processes, Practices and Thinking. -
Forensic Attribution Challenges During Forensic Examinations of Databases
Forensic Attribution Challenges During Forensic Examinations Of Databases by Werner Karl Hauger Submitted in fulfilment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria September 2018 Publication data: Werner Karl Hauger. Forensic Attribution Challenges During Forensic Examinations Of Databases. Master's disser- tation, University of Pretoria, Department of Computer Science, Pretoria, South Africa, September 2018. Electronic, hyperlinked versions of this dissertation are available online, as Adobe PDF files, at: https://repository.up.ac.za/ Forensic Attribution Challenges During Forensic Examinations Of Databases by Werner Karl Hauger E-mail: [email protected] Abstract An aspect of database forensics that has not yet received much attention in the aca- demic research community is the attribution of actions performed in a database. When forensic attribution is performed for actions executed in computer systems, it is nec- essary to avoid incorrectly attributing actions to processes or actors. This is because the outcome of forensic attribution may be used to determine civil or criminal liabil- ity. Therefore, correctness is extremely important when attributing actions in computer systems, also when performing forensic attribution in databases. Any circumstances that can compromise the correctness of the attribution results need to be identified and addressed. This dissertation explores possible challenges when performing forensic attribution in databases. What can prevent the correct attribution of actions performed in a database? The first identified challenge is the database trigger, which has not yet been studied in the context of forensic examinations. Therefore, the dissertation investigates the impact of database triggers on forensic examinations by examining two sub questions. -
Integrigy Obtaining Value from Your Database Activity Monitoring Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Stephen Kost Phil Reimann Chief Security Officer Chief Technology Officer Director of Business Development Integrigy Corporation Integrigy Corporation Integrigy Corporation Agenda How to Obtain Overview Value 1 2 3 4 DAMs & Q&A How They Work About Integrigy ERP Applications Databases Oracle E-Business Suite Oracle, SQL Server, MySQL Products Services Verify Security Assessments Validates Security Oracle EBS, Apex, OBIEE, Databases, Security AppSentry Sensitive Data, Penetration Testing ERP Application and Database Security Auditing Tool Ensure Compliance Compliance Assistance SOX, PCI, HIPAA Protects Oracle EBS AppDefend Build Enterprise Application Firewall Security Security Design Services for the Oracle E-Business Suite Auditing, Encryption, DMZ You Agenda How to Obtain Overview Value 1 2 3 4 DAMs & Q&A How They Work Security is a Process . Tools do not provide security, people do - Tools only enable and automate . Security is not provided by any one product, upgrade, or patch - Security provided by on-going lifecycle and configuration management . Database security is a process - Monitoring and auditing are only one of several components required to secure a database Database Security Program Components . An inventory of all databases and sensitive data locations Inventory . Methods and processes to maintain the inventories . A measureable database security standard and baseline Configuration . Periodic validation with compliance to the standard . Database access management policies, procedures, and tools Access . Database access profiling and monitoring . Database auditing requirements, processes, and definitions Auditing . Centralized auditing retention and reporting solution . Database real-time security monitoring and intrusion detection Monitoring . Database monitoring definition and tools . -
2021-22 Undergraduate Catalog
Undergraduate and Graduate Course Descriptions for the 2021 - 2022 Academic Year ACCT - Accounting ACCT 201 INTRO TO FINANCIAL ACCOUNTING: A comprehensive study of basic financial accounting processes applicable to a service, merchandising, and manufacturing business. An analysis of transactions, journalizing, posting, preparation of working papers and financial statements. ACCT 202 INTRO TO MANAGERIAL ACCT: An introductory study of managerial accounting processes including job order costing, process costing, costvolumeprofit analysis, standard costs, activitybased costing, cost analysis, budgeting, and managerial decision making. Prerequisite: ACCT 201 or equivalent with a minimum grade of C. ACCT 301 INTERMEDIATE ACCOUNTING I: A study of financial accounting standard setting, the conceptual framework underlying financial accounting, balance sheet and income statement presentations, revenue and expense recognition, and accounting for current assets, and current liabilities. Prerequisite: ACCT 202 with a minimum grade of C. ACCT 302 INTERMEDIATE ACCOUNTING II: This class is the second course of the threesemester sequence of intermediate financial accounting. This course focuses on issues related to the reporting and analysis of financial accounting information. The objective in this course is to examine in detail (with an emphasis on both the "what" and the "why") the following financial topics: 1) Operational Assets 2) Time value of money 3) Bonds and long term notes 4) Leases 5) Employee benefits and pensions. Prerequisite: ACCT301 or equivalent with a minimum grade of C. ACCT 306 COST ACCOUNTING: A study of cost behavior, overhead cost allocations, cost systems design, and an introduction to activitybased costing and control systems. Emphasis is on case studies and other practical applications. -
Digital Forensic Tools & Cloud-Based Machine Learning for Analyzing
Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2018 Digital Forensic Tools & Cloud-Based Machine Learning for Analyzing Crime Data Majeed Kayode Raji Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Part of the Business Analytics Commons, Business Intelligence Commons, Computational Engineering Commons, and the Other Engineering Commons Recommended Citation Raji, Majeed Kayode, "Digital Forensic Tools & Cloud-Based Machine Learning for Analyzing Crime Data" (2018). Electronic Theses and Dissertations. 1879. https://digitalcommons.georgiasouthern.edu/etd/1879 This thesis (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. DIGITAL FORENSIC TOOLS & CLOUD-BASED MACHINE LEARNING FOR ANALYZING CRIME DATA by MAJEED KAYODE RAJI (Under the Direction of Hayden Wimmer) ABSTRACT Digital forensics is a branch of forensic science in which we can recreate past events using forensic tools for a legal measure. Also, the increase in the availability of mobile devices has led to their use in criminal activities. Moreover, the rate at which data is being generated has been on the increase which has led to big data problems. With cloud computing, data can now be stored, processed and analyzed as they are generated. This thesis document consists of three studies related to data analysis. The first study involves analyzing data from an Android smartphone while making a comparison between two forensic tools; Paraben E3: DS and Autopsy. -
Using IBM Infosphere Guardium for Monitoring and Auditing IBM DB2 for I Database Activity Ensure Compliance and Create a Tamper-Proof Audit Trail
Using IBM InfoSphere Guardium for monitoring and auditing IBM DB2 for i database activity Ensure compliance and create a tamper-proof audit trail Kathryn Zeidenstein December 16, 2013 Mark J. Anderson (First published October 09, 2012) IBM® InfoSphere® Guardium® is an enterprise information audit and protection solution that helps enterprises to protect and audit information across a diverse set of relational and nonrelational data sources such as Oracle, Teradata, IMS, VSAM, Microsoft® SharePoint, and IBM Netezza®, and IBM DB2® for z/OS®, and DB2 for Linux, UNIX and Windows. With InfoSphere Guardium V9.0, DB2 for i can now be included as a data source, enabling you to monitor access through native interfaces and through SQL. This article provides a brief overview of the InfoSphere Guardium architecture, describes how to configure access (including best practices for performance), and describes how to access data activity reports. Overview InfoSphere Guardium is an enterprise information database audit and protection solution that helps enterprise protect and audit information across a diverse set of relational and nonrelational data sources such as Oracle, Teradata, IMS, VSAM, Microsoft SharePoint, IBM Netezza, and DB2 for z/OS and DB2 for Linux, UNIX and Windows. With InfoSphere Guardium V9.0, DB2 for i can now be included as a data source, enabling you to monitor accesses from native interfaces as well as through SQL. This article provides a brief overview of the InfoSphere Guardium architecture, describes how to configure access (including best practices for performance), and shows how to access data activity reports. A short introduction to InfoSphere Guardium The IBM InfoSphere Guardium solution evolved to address the particular needs of organizations that need to implement more automated and auditable data security practices. -
Hacking Exposed Computer Forensics, Second Edition, Delivers the Most Valuable Insight on the Market
HACKING EXPOSED™ COMPUTER FORENSICS SECOND EDITION REVIEWS “This book provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties all the complex pieces together with real-world case studies. With so many books on the topic of computer forensics, Hacking Exposed Computer Forensics, Second Edition, delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations.” —Brian H. Karney, COO, AccessData Corporation “Hacking Exposed Computer Forensics is a ‘must-read’ for information security professionals who want to develop their knowledge of computer forensics.” —Jason Fruge, Director of Consulting Services, Fishnet Security 00-FM.indd i 8/23/2009 3:54:42 AM “Computer forensics has become increasingly important to modern incident responders attempting to defend our digital castles. Hacking Exposed Computer Forensics, Second Edition, picks up where the first edition left off and provides a valuable reference, useful to both beginning and seasoned forensic professionals. I picked up several new tricks from this book, which I am already putting to use.” —Monty McDougal, Raytheon Information Security Solutions, and author of the Windows Forensic Toolchest (WFT) (www.foolmoon.net) “Hacking Exposed Computer Forensics, Second Edition, is an essential reference for both new and seasoned investigators. The second edition continues to provide valuable information in a format that is easy to understand and reference.” —Sean Conover, CISSP, CCE, EnCE “This book is an outstanding point of reference for computer forensics and certainly a must-have addition to your forensic arsenal.” —Brandon Foley, Manager of Enterprise IT Security, Harrah’s Operating Co. -
IEEE Paper Template in A4 (V1)
ISSN 2319 – 1953 International Journal of Scientific Research in Computer Science Applications and Management Studies Digital Forensics in Cloud Computing Environment Santhosh B, Nelson Dsouza#2, Akash D Kumbhar*2 #1,Associate Professor, Dept of MCA,AIMIT, Mangaluru, Karnataka, India #2Department of MCA, AIMIT, Mangaluru, Karnataka, India Abstract— The Internet is growing explosively, as is the • In a lawful manner, preserving, extracting, storing, analyzing number of crimes committed against or using computers. As a and presenting the evidence. response to the growth of computer crime, the field of computer • To gain an insight into the activities and techniques used by forensics has emerged. Computer forensics involves carefully cybercriminals. And find a counter way to solve the loopholes. collecting and examining electronic evidence that not only assesses the damage to a computer as a result of an electronic III. CHALLENGES AND RESEARCH GAPS attack, but also to recover lost information from such a system to prosecute a criminal. With the growing importance of computer The states not available, suspect and court ready becomes a security today and the seriousness of cybercrime, it is important challenge for cloud forensic investigator to recognize the data for computer professionals to understand the technology that is set for them. The increase in data storage capacity in a cloud used in computer forensics. This paper will discuss the need, goal is a disadvantage for a digital forensic investigation as it for computer forensics to be practiced in an effective, legal ways increases the time for analyzing the abundant data. and challenges. Forensics is the process of using scientific Lack of tools and little expertise in cloud forensics is of knowledge for collecting, analyzing and presenting evidence to concern, involves more challenging when encryption, multi- the courts. -
Ten Years of Critical Review on Database Forensics Research
Digital Investigation 29 (2019) 180e197 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin Ten years of critical review on database forensics research * Rupali Chopade , V.K. Pachghare Department of Computer Engineering & IT, College of Engineering, Pune, India article info abstract Article history: The database is at the heart of any digital application. With the increased use of high-tech applications, Received 22 January 2019 the database is used to store important and sensitive information. Sensitive information storage leads to Received in revised form crimes related to computer activities. Digital forensics is an investigation process to discover any un- 30 March 2019 trusted or malicious movement, which can be presented as testimony in a court of law. Database fo- Accepted 7 April 2019 rensics is a subfield of digital forensics which focuses on detailed analysis of a database including its Available online 11 April 2019 contents, log files, metadata, and data files depending on the type of database used. Database forensics research is in its mid age and has not got awareness as compare to digital forensics research. The reason Keywords: Database forensics behind this is the internal complications of the database as well as the different dimensions to be Digital forensics considered for analysis. This review paper is focusing on the last ten years of research related to forensic Artifact analysis of relational and NoSQL databases along with the study of artifacts to be considered for database Recovery forensics. This review of the current state of database forensics research will serve as a resource to move SQL forward as far as research and investigation are concerned. -
DB3F & DF-Toolkit
Digital Investigation 29 (2019) S42eS50 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2019 USA d Proceedings of the Nineteenth Annual DFRWS USA DB3F & DF-Toolkit: The Database Forensic File Format and the Database Forensic Toolkit * James Wagner a, , Alexander Rasin a, Karen Heart a, Rebecca Jacob a, Jonathan Grier b a DePaul University, Chicago, IL, USA b Grier Forensics, USA article info abstract Article history: The majority of sensitive and personal user data is stored in different Database Management Systems (DBMS). For Example, Oracle is frequently used to store corporate data, MySQL serves as the back-end storage for most webstores, and SQLite stores personal data such as SMS messages on a phone or browser bookmarks. Each DBMS manages its own storage (within the operating system), thus databases require their own set of forensic tools. While database carving solutions have been built by multiple research groups, forensic investigators today still lack the tools necessary to analyze DBMS forensic ar- tifacts. The unique nature of database storage and the resulting forensic artifacts require established standards for artifact storage and viewing mechanisms in order for such advanced analysis tools to be developed. In this paper, we present 1) a standard storage format, Database Forensic File Format (DB3F), for database forensic tools output that follows the guidelines established by other (file system) forensic tools, and 2) a view and search toolkit, Database Forensic Toolkit (DF-Toolkit), that enables the analysis of data stored in our database forensic format. Using our prototype implementation, we demonstrate that our toolkit follows the state-of-the-art design used by current forensic tools and offers easy-to-interpret database artifact search capabilities. -
Auditing the DBA in Oracle Applications: a Guide for Compliance and Audit Managers
www.absolute-tech.com White Paper Auditing the DBA in Oracle Applications: A Guide for Compliance and Audit Managers By Cameron Larner Absolute Technologies, Inc. Copyright ©2014 by Cameron Larner Page 1 of 28 www.absolute-tech.com Table of Contents Introduction .......................................................................................................... 3 Intended Audience ................................................................................................ 3 Background ........................................................................................................... 3 Objectives ............................................................................................................. 3 DBA and Database Basics ...................................................................................... 4 DBA’s Primary Functions .................................................................................... 4 Database Objects............................................................................................... 4 Database Access ................................................................................................ 7 Database Operations ......................................................................................... 7 DBA Access to Oracle / E-Business Suite ........................................................... 8 Approaches to Auditing the DBA ......................................................................... 16 SQL Audit ........................................................................................................