@@ -430,8 +430,57 @@ by their own pieces of legislation.
430430# W5: Legal Framework
431431## Key pieces of legislation
4324321 . [ Computer Misuse Act] ( https://www.legislation.gov.uk/ukpga/1990/18/crossheading/computer-misuse-offences )
433+
434+ ** Amendments**
435+ The amendments to the Computer Misuse Act 1990 by Part 5 of
436+ the Police and Justice Act 2006 are:
437+ - Section 35. Unauthorised access to computer material, punishable by up to 2 years
438+ in prison or a fine or both
439+ - Section 36. Unauthorised acts with intent to impair operation of computer,
440+ etc. punishable by up to 10 years in prison or a fine or both. This covers
441+ Denial of Service (DoS) attacks.
442+ - Section 37. Making, supplying or obtaining articles intended for use in
443+ computer misuse offences, punishable by up to 2 years in prison or a fine or both
444+
4334452 . [ Investigatory Powers Act] ( https://www.legislation.gov.uk/ukpga/2016/25/contents/enacted )
434446
447+ ** Provisions of the Act**
448+ - introduced new powers, and restated existing ones, for UK intelligence agencies and law
449+ enforcement to carry out targeted interception of communications, bulk collection
450+ of communications data, and bulk interception of communications;
451+ - created an Investigatory Powers Commission (IPC) to oversee the use of all investigatory
452+ powers, alongside the oversight provided by the Intelligence and Security Committee of
453+ Parliament and the Investigatory Powers Tribunal. The IPC consists of a number of serving
454+ or former senior judges. It combined and replaced the powers of the Interception of
455+ Communications Commissioner, Intelligence Services Commissioner, and Chief
456+ Surveillance Commissioner;
457+ - established a requirement for a judge serving on the IPC to review warrants for accessing
458+ the content of communications and equipment interference authorised by a Secretary of
459+ State before they come into force;
460+ - required communication service providers (CSPs) to retain UK internet users' "Internet
461+ connection records" – which websites were visited but not the particular pages and not the
462+ full browsing history – for one year;
463+ - allowed 48 authorities such as police, intelligence officers and other government
464+ department managers (including HMRC, the Department of Health, the Food Standards
465+ Agency, the Gambling Commission, the Department for Work and Pensions, and
466+ the Department for Transport) to see the Internet connection records, as part of a targeted
467+ and filtered investigation, without a warrant;
468+ - permitted the police and intelligence agencies to carry out targeted equipment interference,
469+ that is, hacking into computers or devices to access their data, and bulk equipment
470+ interference for national security matters related to foreign investigations;
471+ - placed a legal obligation on CSPs to assist with targeted interception of data, and
472+ communications and equipment interference in relation to an investigation; foreign
473+ companies are not required to engage in bulk collection of data or communications;
474+ - maintained an existing requirement on CSPs in the UK to have the ability to remove
475+ encryption applied by the CSP; foreign companies are not required to remove encryption;
476+ - put the Wilson Doctrine* on a statutory footing for the first time as well as safeguards for
477+ other sensitive professions such as journalists, lawyers and doctors;
478+ - provided local government with some investigatory powers, for example to investigate
479+ someone fraudulently claiming benefits, but not access to Internet connection records;
480+ - created a new criminal offence for unlawfully accessing internet data;
481+ - created a new criminal offence for a CSP or someone who works for a CSP to reveal that
482+ data has been requested.
483+
435484## Regulation of security technologies
436485The following principles for the handling of digital electronic evidence come from
437486the Association of Chief Police Officers (ACPO).
@@ -454,8 +503,9 @@ the Association of Chief Police Officers (ACPO).
454503# W6: The Forensics Process
455504## The Investigative Methodology
456505### Differences between Conventional and Digital Forensics
457- ** Conventional forensics** is built on top of Locard's Exchange Principle.
458- This principle says that every contact leaves a trace. When there is physical contact,
506+ ** Conventional forensics** is built on top of ** Locard's Exchange Principle** .
507+ This principle says that every contact leaves a trace, because it results in
508+ an exchange of physical material. When there is physical contact,
459509there is indeed an exchange of physical material.
460510
461511In theory, one might be able to cover digital tracks, and someone could actually
@@ -583,19 +633,19 @@ to repeat the steps until a conclusion is reached.
583633** Attributing activities** on a computer to a particular person can be challenging.
584634For example, logs showing that an internet account was used to commit a crime
585635do not prove that the owner of that account was responsible, since someone else
586- could have used the individual’s account. However, personal communications and
587- access to online banking or e-commerce accounts can make it difficult for a person
636+ could have used the individual’s account. However, ** personal communications** and
637+ ** access to online banking** or ** e-commerce accounts** can make it difficult for a person
588638to deny responsibility for the illegal activities on the computer around
589639the same time. It is important to use evidence from multiple independent sources.
590640
591641** Assessing alibis** can also be tricky. Again, the use of evidence from multiple sources
592642is essential, as it is not difficult to alter the clock on a machine or change
593- the creation time of a file. However, evidence of clock tampering may enable a
643+ the creation time of a file. However, ** evidence of clock tampering** may enable a
594644forensic practitioner to conclude that the computer owner intentionally backdated
595645a digital document for example.
596646
597- ** Determining intent** can be done by analysing internet search history,
598- suspicious behaviour or simply through notes and plans that were not deleted.
647+ ** Determining intent** can be done by analysing ** internet search history** ,
648+ ** suspicious behaviour** or simply through ** notes** and ** plans** that were not deleted.
599649In several cases, internet searches on suspects’ computers revealed their intent
600650to commit murder.
601651
@@ -608,8 +658,8 @@ and lead to further breakthroughs.
608658
609659Finally, there is ** document authentication** . Significant attributes such as
610660the author of a document or its date of creation can be tampered with, as
611- was already mentioned. In these cases, it is possible to use date-time stamps
612- on files and in log files, look for nuances on date-time stamps, look for
661+ was already mentioned. In these cases, it is possible to use ** date-time stamps
662+ on files and in log files** , look for nuances on date-time stamps, look for
613663meta-data within files or inspect the files through digital stratigraphy.
614664Stratigraphy, which is a building block process in archeology, is the study of layers
615665to determine elements such as the origin, the composition, or the time frame
@@ -790,6 +840,9 @@ human communications** like emails and chat sessions.
790840 can be presented as valid digital evidence in a court of law.
791841
792842# W8: Anti-forensics
843+ Anti-forensics is the discipline that tries to evade and thwart the forensic process through
844+ the implementation of attacks and adoption of adversarial actions.
845+
793846## Adversarial Actions
794847- ** Destroy**
795848 Potentially useful digital forensic evidence of their activities (wiping logs)
@@ -864,6 +917,17 @@ to ensure services are up and running**.
864917<img src =" /static/course/postgraduate/forensics/lifecycle.png " alt =" " />
865918</div >
866919
920+ ### Logging Element
921+ - Event: Single occurrence within an environment
922+ - Event Field: Describes one characteristic of the event.
923+ - Event Record: Collection of event fields
924+ - Log: Collection of event records
925+ - Audit: Process of evaluating logs
926+ - Recording: Process of tracking events fields
927+ - Logging: Process of saving events into logs
928+ - Security Incident: Occurrence of a security event (eg,
929+ intrusion attempt, data leakage, DoS, etc).
930+
867931### Normalisation
868932Logs come in different formats, syntax and types, eg, ASCII, binary, etc.
869933There are some standards, but generally there is a lack of consensus.
@@ -876,6 +940,12 @@ and all relevant attributes of the event are identified and processed.
876940The practice of collecting, monitoring and analysing security-related data from
877941computer logs.
878942
943+ A security information management system (SIMS) automates that practice.
944+ It is a type of software that automates the collection of event log data from
945+ security devices, such as firewalls, proxy servers, intrusion-detection systems
946+ and antivirus software. It translates the logged data into correlated and
947+ simplified formats and has strong log management capabilities.
948+
879949SIEM systems gather data from many devices, correlate events and provide information
880950and knowledge in the form of reports and alerts.
881951
@@ -884,6 +954,11 @@ and knowledge in the form of reports and alerts.
884954<img src =" /static/course/postgraduate/forensics/sim.png " alt =" " />
885955</div >
886956
957+ A diagram showing a frontend connected to the management server which
958+ contains the server and framework. The server is connected to DB.
959+ It is also connected to the sensor which hosts the agent and plugins
960+ such as snort and spade.
961+
887962The OSSIM evaluates the risk as follows:
888963$Risk = (Asset * Priority * Reliability) / 25$
889964
0 commit comments