1 grover kearns, phd, cpa information technology audit & forensic techniques acg 6936 summer...

85
1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

Upload: connor-hollingworth

Post on 31-Mar-2015

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

1

Grover Kearns, PhD, CPA

Information Technology Audit & Forensic Techniques

ACG 6936 Summer 2007

Page 2: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

2

IT Forensic Techniques for Auditors

Presentation Focus Importance of IT Forensic Techniques to

Organizations Importance of IT Forensic Techniques to

Auditors Audit Goals of Forensic Investigation Digital Crime Scene Investigation Illustration of Forensic Tools A Forensic Protocol

Page 3: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

3

Forensic Computing Defined

Forensic Computing is the process of identifying, preserving, analyzing, and presenting digital evidence in a manner that is legally acceptable in a court of law

Our interest is in … Identifying and preserving evidence, “post-mortem” system analysis to determine

extent and nature of attack, and the forensic framework

Page 4: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

4

Importance of IT Forensic Techniques to OrganizationsCorporate Fraud Losses in 2004 Cost companies an average loss of assets

over $ 1.7 million A 50% increase over 2003 Over one third of these frauds were

discovered by accident, making "chance" the most common fraud detection tool. PriceWaterhouseCoopers, Global Economic Crime Survey 2005

Page 5: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

5

Importance of IT Forensic Techniques to

Organizations The New Corporate Environment Sarbanes-Oxley 2002 COSO and COBIT SAS 94 and SAS 99 ISO 9000 and ISO 17799 Gramm-Leach-Bliley Act US Foreign Corrupt Practices Act…all of these have altered the corporate

environment and made forensic techniques a necessity!

Page 6: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

6

Importance of IT Forensic Techniques to Auditors SAS 99SAS No. 99 - Consideration of Fraud in a Financial Statement Audit - requires auditors to … Understand fraud Gather evidence about the existence of fraud Identify and respond to fraud risks Document and communicate findings Incorporate a technology focus

Page 7: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

7

Importance of IT Forensic Techniques to

Organizations Intellectual Property Losses Rapid increase in theft of IP – 323% over five

year period 1999-2004 75% of estimated annual losses were to an

employee, supplier or contractor Digital IP is more susceptible to theft Employees may not view it as theft

Page 8: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

8

Importance of IT Forensic Techniques to

Organizations Network Fraud Companies now highly reliant on networks Networks increasingly vulnerable to attacks Viruses, Trojans, Rootkits can add backdoors Social Engineering including Phishing and

Pharming Confidential and proprietary information can

be compromised Can create a corporate liability

Page 9: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

9

Page 10: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

10

Net Detector

Page 11: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

11

Importance of IT Forensic Techniques to

Organizations Security Challenges Technology expanding and becoming more

sophisticated Processes evolving and integrating with

technologies People under trained Policies outdated Organizations at risk

People

Technology

Policies

Processes

Page 12: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

12

Page 13: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

13

Page 14: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

14

Importance of IT Forensic Techniques to Auditors Majority of fraud is uncovered by chance Auditors often do not look for fraud Prosecution requires evidence Value of IT assets growing

Treadway Commission Study … Undetected fraud was a factor in one-half of

the 450 lawsuits against independent auditors.

Page 15: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

15

Importance of IT Forensic Techniques to Auditors Auditor’s Knowledge, Skills, Abilities Accounting Auditing IT (weak)

Needed … Increased IT knowledge Fraud and forensic accounting knowledge Forensic investigative and analytical skills and

abilities

Page 16: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

16

Importance of IT Forensic Techniques to Auditors Knowledge, Skills, Abilities: NeedsAuditor’s need KSAs to … Build a digital audit trail Collect “usable” courtroom electronic

evidence Trace an unauthorized system user Recommend or review security policies Understand computer fraud techniques Analyze and valuate incurred losses

Page 17: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

17

Importance of IT Forensic Techniques to Auditors KSA Needs (cont.)

Understand information collected from various computer logs

Be familiar with the Internet, web servers, firewalls, attack methodology, security procedures & penetration testing

Understand organizational and legal protocols for incident handling

Establish relationships with IT, risk management, security, law enforcement

Page 18: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

18

Audit Goals of a Forensic Investigation Uncover fraudulent or criminal cyber activity Isolate evidentiary matter (freeze scene) Document the scene Create a chain-of-custody for evidence Analyze digital information Communicate results

Page 19: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

19

Audit Goals of a Forensic Investigation

Immediate Concerns What is level of certainty that a problem

exists? Is this a criminal act?

Child porn, money laundering When should law enforcement be involved?

Can the system be isolated? Is a subpoena necessary? Is the intrusion internal or external? Are suspects known? Is extent of loss/damage known?

Page 20: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

20

Audit Goals of a Forensic Investigation

Immediate Response Shut down computer (pull plug) Bit-stream mirror-image of data Begin a traceback to identify possible log

locations Contact system administrators on

intermediate sites to request log preservation Contain damage Collect local logs Begin documentation

Page 21: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

21

Audit Goals of a Forensic Investigation

Continuing Investigation Implement measures to stop further loss Communicate to management and audit

committee regularly Analyze copy of digital files Ascertain level and nature of loss Identify perpetrator(s) Develop theories about motives Maintain chain-of-custody

Page 22: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

22

Digital Crime Scene InvestigationGoal: Determine what fraud events occurred by using digital evidence

Three Phases: Preserve & Document Scene Analyze/Search & Document Data Reconstruct & Document Fraud Event

Page 23: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

23

Digital Crime Scene Investigation Scene Preservation & Documentation Goal: Preserve the state of as many

digital objects as possible and document the crime scene.

Methods: Shut system down Unplug (best) Do nothing

Bag and tag

Page 24: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

24

Treat every incident as if it will end up in a criminal

prosecution.

Digital Crime Scene Investigation

Investigative Axiom

Page 25: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

25

Digital Crime Scene Investigation Incidents & Investigations

Incident/Crime: An event that violates a policy or law

Investigation: A process that develops and tests hypotheses to answer questions about events that occurred

Page 26: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

26

Audit Goals of a Forensic Investigation

Rules of Evidence

Complete Authentic Admissible Reliable Believable

Page 27: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

27

Audit Goals of a Forensic Investigation

Requirements for Evidence

Computer logs … Must not be modifiable Must be complete Appropriate retention rules

Page 28: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

28

Digital Crime Scene Investigation Problems with Digital Investigation Timing essential – electronic evidence

volatile Auditor may violate rules of evidence NEVER work directly on the evidence Skills needed to recover deleted data or

encrypted data

Page 29: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

29

Digital Crime Scene Investigation Extract, process, interpret Work on the imaged data or “safe copy” Data extracted may be in binary form Process data to convert it to

understandable form Reverse-engineer to extract disk partition

information, file systems, directories, files, etc Software available for this purpose

Interpret the data – search for key words, phrases, etc.

Page 30: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

30

Digital Crime Scene Investigation Technology

Magnetic disks contain data after deletion Overwritten data may still be salvaged Memory still contains data after switch-off Swap files and temporary files store data Most OS’s perform extensive logging (so do

network routers)

Page 31: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

31

Disk Geometry

Track

Sector

Cylinder

(Clusters aregroups ofSectors)

Page 32: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

32

Slack Space

End of FileEnd of File Slack SpaceSlack Space

Last Cluster in a FileLast Cluster in a File

Page 33: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

33

Digital Crime Scene Investigation Order of Volatility

Preserve most volatile evidence first Registers, caches, peripheral

memory Memory (kernel, physical) Network state Running processes Disk Floppies, backup media CD-ROMs, printouts

Page 34: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

34

Digital Crime Scene Investigation Digital Forensic Investigation

A process that uses science and technology to examine digital objects and that develops and tests theories, which can be entered into a court of law, to answer questions about events that occurred.

IT Forensic Techniques are used to capture and analyze electronic data and develop theories.

Page 35: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

35

Illustration of Forensic Tools

Forensic Software Tools are used for … Data imaging Data recovery Data integrity Data extraction Forensic Analysis Monitoring

Page 36: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

36

Data Imaging

EnCase

Reduces internal investigation costs Platform independent Automated analysis saves time Supports electronic records audit Creates logical evidence files — eliminating

need to capture entire hard drives

Page 37: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

37

Data Imaging

EnCase Previews computers over the network to

determine whether relevant evidence exists: Unallocated/allocated space Deleted files File slack Volume slack File system attributes CD ROMs/DVDs Mounted FireWire and USB devices Mounted encrypted volumes Mounted thumb drives

Page 38: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

38

Data Recovery

File Recovery with PC Inspector

Page 39: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

39

Data Eradication

Securely Erasing Files

Page 40: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

40

Data Integrity

MD5 Message Digest – a hashing algorithm used to

generate a checksum Available online as freeware Any changes to file will change the checksumUse: Generate MD5 of system or critical files

regularly Keep checksums in a secure place to

compare against later if integrity is questioned

Page 41: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

41

Data Integrity

MD5 Using HashCalc

Page 42: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

42

Data Integrity HandyBits EasyCrypto

Page 43: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

43

Data Integrity Private Disk

Page 44: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

44

Data Monitoring

Tracking Log Files

Page 45: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

45

Data Monitoring

PC System Log

Page 46: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

46

Security Software Log Entries

Page 47: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

47

Page 48: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

48

Free Log Tools

Page 49: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

49

Page 50: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

50

Audit Command Language (ACL) ACL is the market leader in computer-

assisted audit technology and is an established forensics tool.

Clientele includes … 70 percent of the Fortune 500 companies over two-thirds of the Global 500 the Big Four public accounting firms

Page 51: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

51

Forensic Tools

Audit Command Language

ACL is a computer data extraction and analytical audit tool with audit capabilities …StatisticsDuplicates and GapsStratify and ClassifySamplingBenford Analysis

Page 52: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007
Page 53: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

53

Page 54: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

54

Page 55: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

55

Page 56: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

56

Page 57: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

57

Forensic Tools: ACL

Benford Analysis States that the leading digit in

some numerical series is follows an exponential rather than normal distribution

Applies to a wide variety of figures: financial results, electricity bills, street addresses, stock prices, population numbers, death rates, lengths of rivers

Leading Digit

Probability

1 30.1 % 2 17.6 % 3 12.5 % 4 9.7 % 5 7.9 % 6 6.7 % 7 5.8 % 8 5.1 % 9 4.6 %

Page 58: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

58

Page 59: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

59

Page 60: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

60

Page 61: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

61

Data Monitoring

Employee Internet ActivitySpector captures employee web activity

including keystrokes, email, and snapshots to answer questions like:

Which employees are spending the most time surfing web sites?

Which employees chat the most? Who is sending the most emails with

attachments? Who is arriving to work late and leaving early? What are my employees searching for on the

Internet?

Page 62: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

62

Data Monitoring : Spector

Recorded Email

Page 63: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

63

Data Monitoring : Spector

Recorded Web Surfing

Page 64: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

64

Data Monitoring : Spector

Recording Keystrokes

Page 65: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

65

Data Monitoring : Spector

Recorded Snapshots

Page 66: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

66

Page 67: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

67

Data Capture : Key Log Hardware

KeyKatcher Records chat, e-mail, internet &

more Is easier to use than parental

control software Identifies internet addresses Uses no system resources Works on all PC operating

systems Undetectable by software

www.lakeshoretechnology.com

Page 68: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

68

Background Checks

Page 69: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

69http://www.expressmetrix.com/solutions/

Page 70: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

70

Page 71: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

71

Page 72: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

72

Page 73: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

73

Page 74: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

74

Developing a Forensic Protocol

The response plan must include a coordinated effort that integrates a number of organizational areas and possibly external areas

Response to fraud events must have top priority

Key players must exist at all major organizational locations

People

Technology

Policies

Processes

Page 75: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

75

Developing a Forensic Protocol

End-to-End Forensic Analysis

First rule of end-to-end forensic digital analysis Primary evidence must always be corroborated by at

least one other piece of relevant primary evidence to be considered a valid part of the evidence chain. Evidence that does not fit this description, but does serve to corroborate some other piece of evidence without itself being corroborated, is considered to be secondary evidence.

Exception: the first piece of evidence in the chain from the Identification layer

Page 76: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

76

A Forensic Protocol

Security Exposures

Organizations may possess critical technology skills but …

Skills are locked in towers – IT, Security, Accounting, Auditing

Skills are centralized while fraud events can be decentralized

Skills are absent – vacations, illnesses, etc

Page 77: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

77

A Forensic Protocol

The Role of Policies

They define the actions you can take They must be clear and simple to understand The employee must acknowledge that he or

she read them, understands them and will comply with them

They can’t violate law

Page 78: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

78

A Forensic Protocol Forensic Response Control

Incident Response Planning … Identify needs and objectives Identify resources Create policies, procedures Create a forensic protocol Acquire needed skills Train Monitor

Page 79: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

79

A Forensic Protocol

Documenting the Scene Note time, date, persons present Photograph and video the scene Draw a layout of the scene Search for notes (passwords) that might be

useful If possible freeze the system such that the

current memory, swap files, and even CPU registers are saved or documented

Page 80: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

80

A Forensic Protocol Forensic Protocol

First responder triggers alert Team response

Freeze scene Begin documentation

Auditors begin analysis Protect chain-of-custody Reconstruct events and develop theories Communicate results of analysis

Page 81: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

81

A Forensic Protocol Protocol Summary Ensure appropriate policies Preserve the crime scene (victim computer) Act immediately to identify and preserve logs

on intermediate systems Conduct your investigation Obtain subpoenas or contact law

enforcement if necessary

Key: Coordination between functional areas

Page 82: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

82

Conclusion

IT Forensic Investigative Skills Can … Decrease occurrence of fraud Increase the difficulty of committing fraud Improve fraud detection methods Reduce total fraud losses

Auditors trained in these skills are more valuable to the organization!

Page 83: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

83

Questions or Comments?

Grover [email protected]

University of South Florida St. Petersburg

Page 84: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

84

Web Resources ACL

http://www.acl.com/Default.aspx?bhcp=1 Eraser

http://www.heidi.ie/eraser/ Private Disk

http://www.private-disk.net/ HashCalc

http://www.slavasoft.com/hashcalc/index.htm PC Inspector

http://www.download.com/3000-2242-10066144.html VeriSign

http://www.verisign.com HandyBits Encryption

http://www.handybits.com/ EnCase

http://www.handybits.com/

Page 85: 1 Grover Kearns, PhD, CPA Information Technology Audit & Forensic Techniques ACG 6936 Summer 2007

85

Web Resources (cont.) Spectorhttp://www.spectorsoft.com/ Stolen ID Searchhttps://www.stolenidsearch.com/ Abika Background Checkhttp://www.abika.com/ Guide to Log Managementhttp://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf ACFE Fraud Prevention Checkuphttp://www.acfe.com/documents/Fraud_Prev_Checkup_IA.pdf NetWitnesshttp://www.netwitness.com/ GASP Std V 7.0 Free Softwarehttp://www.bsa.org/usa/antipiracy/Free-Software-Audit-Tools.cfm Federal Guidelines for Searcheshttp://www.cybercrime.gov/searchmanual.htm