SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Downloaden Sie, um offline zu lesen
!" #
                                                      $ &$
                                                       % ''


                                                                                      The
This information is provided for your review only and is not for any distribution. Any reproduction, modification, distribution, transmission, display or republication of the
                                                                        content is Computer
                                                                                   strictly prohibited
                                                                                  Forensics
!" # $ %
              "          !&
                          !

' (       )   #*

      +
,     )+- .




                    2
/           )

    0        *                                %* 1%      %         #
        %

    2                 $       *       * 3 %    (
        #4                                5

    0$
     $                    *   (                     #    3 ## 3
        %        #)       3 #* 6 %        3%            ##     %

    2             *           3%          $
                  %       3       (            %%        % 7



                                      3
8 9: : ;           8     0        *   <


        +              3%             * *
                                       +3
              $          * #                %    3%
#   %          *          7
        3 =              ( #              1*
        #%         %                      *     $ %   3
  (
 # *
  #           3 $            #$       *     #* %
    3




                              4
0     *         3       >           *


 7 5 $          (   %
97 ? ) )                    #           #
>7     #    # %* %              *

    ;    %* %       3           *           3   % %
     $ %




                            5
*         *      3 %

   # !        # *            #    0/
  @ %     $ 3 %              $    3     *
   #          0/     %        /
   # @        /     %         /
   # 9        /     %        $
                             $
   #    ;                /        $         %    3        #
   *     ( *%
    # +         % * #    ) #          # 3            34   $3   3
   *      #)    # $)
 1%            %* #        )   3 #               *
% 3 % 7 0/        %      / ) $              /7
@ 1#        %   /        % 3     *          )        3
)    #

                             6
0   *




            5 $ 5   5       * 3
                             *      %* %


•             5
                            #   3      3%
•              $
•   3
              5 $               *          #




                        7
0    *             3

    /*    3  %         #**             #    8% #
         # %           %* %            *
     A   $ 3       **
    A)4 #
        3     $                $   $   *   # $
                                             $
    3 #
    '    $) %*                     *   *     #4
    $ %    *               3
        4 $ %
     B*+$      #   +3 3%
       $ %
      # #
       #               $
                       $

                               8
0   *    #   + # #) #
                3




        (            (
         (               *
        )"
                             *
        *    *           *




                 9
%%             *           #* %             %

 7            3     *
      - #)
          3         *       )
97        3         #
      C #     #)                4 $)
      2   # ( %
> @
 7            3         *              #
      $8 *                       )     3    43       # 7
& @
 7        3   3         3 %          # 34
      0$$               *        +          %
        (         3 $       #
      +           ,          -
                                       10
5       3)           #

;            #           * 6
    2   #$           (   %

    C #      * #          *         4
    C #      *
      6        #


                 3                 1*
             1*      # *           $
       *              * #
    2 # 8                     1*        )   3)   %
      6 $


                                    11
0       *            #                     #       # *   * #1

                              %                $     )    * *
            3$           *                 #        $     *
    )                        $
    '       $    #       )        * *          3$    *  )    $
        %                 #       # *         # 8 #    $
       *         3                         # +* * #*   %3
      ( * #
         *     #
    0  *    1
    +         #                   *        *       *.




                                      12
0        *                     3


        %             $ * 3 *
        %         *       $ $ %                          %*            # #        D

        # %*                            %*                         #         #3 #
# 3          %        #)           $
                                   $             * 6 %         3%

0       *                 3%            $
5 $ )                 #                ##        #                 *          *
   3
    @                 )        #       *                       #
                  #        #       %   #$            )        (          *
            $ %           3 3                                            #
                                            13
;                #            3        #<

    A* *              *                 **           *
    5                     *                  3   *
    @ )               *
                                        5
    %            #
                                       B
                      *
                                       ' * 4 5+ / 4
                                          *        5C5
    ;                 *
                                       0% 3 3        3
    %        *

        #4       #4

                                  14
3*       =


      =    #      * $      (     %       # %*            3

      )      %*            #$    #    #            * #
          * $ (    %             *   #
  #   $   3+           )          * 3# )           #
B             *     *       =#       *   #* %            %
# %       %       3 #
 $         $
        #3 ) $ %%   *            3   *     (   %
          #%      #
      #    $  ) #


                            15
0                *           3   #*
                                     )    #               *    <
                             0   *  $% )          *   <
           Define Drivers          * <
Policy




               Data
           Classification
                             5 $ )   3            %        %* #)
         Policy Definition
                             5 %                  *       #) 4
                              $)       %




                                         16
=          *      #

       #   $ %   # 1*
                  %    $
                       <
5      $)     #        $ $       * <
5            * #      < ) %     <
-   )%         #     *   <
-   )    3#       *      #   <
5         # %                 #) <
    3             3 =      *
           /             -



                 17
;             *                $ %<


C @
  A4 A
 ? 4#
B +3      #
'      %    *
   #*
     #   $ %  #   ,        .
        ) #   *   # * *




                      18
5

                                     %
                                          * *

           Define Drivers
Policy




               Data
                             0                  A       7
           Classification
                                          %         #
         Policy Definition

                             3
                                 4 E 40B                #     4 /+ F !
                                                                    F!
                                     #              )
                                 @       G * )# *
                                          ?                 % #)   %*    3
                                 )       * $ % #

                                           19
5                %             #*

                             0     *            **      #     *
                             #    %          # $ %           % #
                             %    3%      * 3 %
                                   ) )    #(       *    # # *   #
           Define Drivers
                                 5 %                      # # #       #
Policy




               Data
           Classification          %      G
         Policy Definition       0 # #    %    3%
                                   %%     #     #+    #       *      4>#+*
                                      #         # 7 $ 8%      %*    8*
                                 # 83              #
                             0    *       *              #    $ #)
                                                               1
                                  (       $        %*

                                              20
0                 *     *

                             0       *        *
                                         ) +# $ # ##        %       #
                                 $   %* %       # # $3 #* *
           Define Drivers
                                              %* $ %  #3 #
Policy




               Data
           Classification        *            #
         Policy Definition
                             %* *             $3 #      *       *
                             3 $               $
                                     *             $#   $           $ %
                                 *       #)    8




                                              21
5                $

                                #     )    $ %                         3 #         +
                                # $ %       # 3
                                  %    3 )                         *
         Define Drivers         $      # %
Policy




             Data                   3    #        6    %       $ %
         Classification
                                    3                      3                 # 1
     Policy Definition
                              $      3
                              B #   #*             $           3
                              0% # * *
                                    *             *                %    3
                                    G!   "                               #
                                                                         #
                               #                       #
                              $ 7
                                             22
5                $            #

                   %*         #                  3               *
                 * $ %                                     7


         Define Drivers   0                          0
Policy




             Data                                     *
         Classification
                                  $#                 -3         $#
     Policy Definition
                                                       *
                              B        $#                      B /




                                            23
0          *        3

                           #       $       %        # $#   * 4      *
                                   3% #
                                       *             #         #*
           Data Mapping
                           **              3             # )
Strategy




           Risk Modeling
                           -3+
           Control Gaps
                               A* *
                               ;
                               5           *
                               /


                                               24
5       #

    #   $*          )     #                # #   #   $)
        % )#    #       $ #        *
        3 $     #       3$    3        *
                    %
    (       #   %* )          <
         $%            3  +*    ##
                )# $ ) )     / **      $ #$ )
            $ # )*   )
           %*     $$   # )      # $    # $
             3$    #
          $              $ , +*    # . )    )
        ##        8 3%   #$ %    $ )


                                  25
5   +$ ) # $




               26
(           %

                               5 $                        # *
                                ( %         #        6    $   *
                               5 $ *                        # * $         *
           Data Mapping
                                ( %
Strategy




                                  #        )             )*   #   %            =
           Risk Modeling
                                       #* * #             *       3   #       $
           Control Gaps        *           3*
                               5   %
                                    (   %     #$     #
                                   $        *  * 3 %



                                                27
A3         %

           3       %        # 3 #$            *
     A3        *       *
           $3* *                      *           +
       **   $
      B 3    *    **                      )    * ##
                                                *
      /$+ # 3
        $        *               3%           % #
     - #   * $ %           4:
                            &:




                            28
' +#             4       +       #           *    ,       .

                              5               * #
                                  '       *               $#
                              A                   $        * ##        3       * #
                                  #               %
                                  $           * #     *        #           #
Deployment




             Implementation

                                  3 $                          *        3     #
              Management
                                (    ##               *             3* ) 4 1*
                 Audit
                              -3                    #) +           #       # $
                              A 3+    #                 *                 ) # # %*
                              * $ %
                              C # G                   $                          *

                                                      29
**             +       #          *

                                  5                            * #         3      ##    #
                                   **          $       *
                                   $            *     #                )           3
                                  #
                                                 %* %
Deployment




             Implementation



              Management                            *
                 Audit

                                  @
                                          #(     $1
                                      $    1     #          3      *           #% 3 %
                                          %* 1   $        * 3 +    #             3 $
                                  C # G@             **        4   *
                                                          30
3#         *

                              5     % #       * #       3#
                              0      3        1 3       *    %
                                **   +#      % 3%
                              0    1*      * ##       *
Deployment




             Implementation

                              0    %* %     #   + $
                                                  $
              Management

                                   #        #      ##       * 3
                 Audit
                                3(      $# $        *
                              A 3 %     $#           % 3 #$ % 3
                                 % 3% * $ %
                              C # G 0       -


                                         31
*+           #   *

                              5          * #    * #

                              @ * $ %     *
                              0     %* %
Deployment




             Implementation
                                  %     3        #  $          ( #
              Management         $ %                       = #*
                 Audit           # *         $ %    $
                                                    $     # +* %
                               $ %
                              0            *%    $#
                                )             $ *
                              C # G       -         # @   **

                                          32
5                    *

                              5       +    #     *             )       *
                                      #         *#        #   5        #
                              5   *        #         5
                              B    )                 3         * ##    $
                                            3         *
Deployment




             Implementation



              Management                                           * # 1
                                  *       #$ % %     #    *
                 Audit
                                #         8*    # #(           3   %       3
                              $ *




                                                33
5               *


    *                        1        *
A       %*      **                %         %*
                  +                       #$ % 5     #
        *         #              **
#                                 *           * ##   $ %
    $ %       #3 #                 * #
      *          ##               %%                 #
    #)       ( # 73 -
                    7               #%         %




                        34
?           3%       , .
                     ?

              #                 3            ##               $
        *
    0   *      !H %
               :        3% I *              :H            3
             *  $       #    $
                             $              ? *
    " H $99
     :                3* #              #         *
        ?
    0$$   ?      *     ## 3         (       3 $       %       #
     $
     $




                           35
9       %

;    %%      * 3 *               %    $             %
 $    ( #              *#
' 3 * $                 #            4 ,9 + .
                                      9         $
  %%
    %   $*       ,.              %      $ %%
   %                  3$ *




                            36
?   %    3%       (

    -   )%            #        #<
    ;                      #<
    ;                        <
    -   ))        %       3    <
    -   ))        *                  *      <
    -   ) $           #         3<
    ;     $                # % 3#<
    -   )%        %        3%        3) )   #<
    -   )     #                 <



                              37
5               %           3%         (   %

    (       %        >7J
                        $    3
                    #
            #             3
    5                   $ #
    5                   $
        *       %        $ %* %       #
    ?


0           3                (    %         % $ %   *
                **                         ) % 37


                                  38
?           3%

    ?       %                    $       #
        $                3             $ %* %


        /   3            %) *                   $ %$     3
                =#   %       3%
                * %* $       %    3%      $ %   *   **




                                  39
?        3               ##

                              5
    '     & +9
           :       # #                   3 # $        6        #       #
        * 3 *     % #                    3 %
    5
                                              %   #   )                 #   G
                                       - ##
         0                             B
                                       0 /
             *4
                                         #*
     *         ) #3
                                   '          %   1       #            #+
    5
                                       *     $            **       #
                                       # )




                                  40
/       0   *    ?        3%        $           ,
                                                0?   .
    '    #     # #= 3%         3%       $ %%
        *     * 3 *                        *    )
      %%    ?     %
    ;     3         $
                    G
          %%    ?            *A 3 3 , ?   A.*
         %* %         # *     3 #  $      ?
          # 3 #     $    # 3   ?
             *        +   $ ? A %* %
        )))7   + * 7 3 %%
                       4      4 %4




                          41
' %                 $ %


    #          $      %* %       3           * 3 *           '#
           %
     *4
      G4        7    73 4*          4    *    4 : +9 + 4 * : +9 + K 9: L #
                                               ":         ":       5  : 7* $
    * 3 *
     *4
      G4        7    73 43    *4 4           4 #1 %
                                                 7
      %% #                $ ?                3%
     *4
      G4        7    73 4*          4    *    4 : +L 4 " : F
                                               ": F     : +L +    7* $
                                                                    #
     *4
      G4        7    73 4*          4    *    4 : +L 4 " : F
                                               ": F     : +L +   97* $
                                                                    #
0       *              3 G          ?                   35
    )))7       7 %4       *   4 4
                               )*       *     K    3 K 7* $
                                                      )* #




                                        42
43
/3 =              #                   $$      #
    $     * 3 %                      #       *
* 6
      3                *
#$$       )           3     *    #     # $
0   *                        *        **          #
  2




                       44
!                 0           3
'          #     ) AA ! ' #
                       &                 )         : " :M
                                                    J>      7G 9: .J +& 9 M' 1 , > " ! 9"
                                                              , > J >         G9: . J +: >
 $N   %*       $     )7 %

@ )2          $     # 9& + 9 O
                        !          *         9L '
                                               9            @2   : M
                                                                  :    7GL J 9 J " ! M' 1
                                                                         , . + J         G
, J 9 J " : M $ N )))7 %+ $ 3 #
L . + F                        7




 !" #
# .   4 #.

      )))7   # 7 %4 4
      )))7 ) 7 %4


                                         The
                                       Computer
                                       Forensics

Weitere ähnliche Inhalte

Was ist angesagt?

Horaris exàmens setembre 2012
Horaris exàmens setembre 2012Horaris exàmens setembre 2012
Horaris exàmens setembre 2012
Emma Saura Woods
 
General caballeros y damas 21 km
General caballeros y damas 21 kmGeneral caballeros y damas 21 km
General caballeros y damas 21 km
ACAM ATLETISMO
 
Oracle statistical functions
Oracle statistical functionsOracle statistical functions
Oracle statistical functions
Maggie Giust
 
Rede_CERTIFIC_natalia_lima
Rede_CERTIFIC_natalia_limaRede_CERTIFIC_natalia_lima
Rede_CERTIFIC_natalia_lima
Natalia Lima
 
Food Gh Fee Structures
Food Gh Fee StructuresFood Gh Fee Structures
Food Gh Fee Structures
msdhillon72
 

Was ist angesagt? (19)

Tonggak 12
Tonggak 12Tonggak 12
Tonggak 12
 
การจัดการไฟล์และโฟลเดอร์
การจัดการไฟล์และโฟลเดอร์การจัดการไฟล์และโฟลเดอร์
การจัดการไฟล์และโฟลเดอร์
 
Horaris exàmens setembre 2012
Horaris exàmens setembre 2012Horaris exàmens setembre 2012
Horaris exàmens setembre 2012
 
Rate
RateRate
Rate
 
Propertics of element
Propertics  of elementPropertics  of element
Propertics of element
 
Gestion multimedia
Gestion multimediaGestion multimedia
Gestion multimedia
 
Jasc
JascJasc
Jasc
 
General caballeros y damas 21 km
General caballeros y damas 21 kmGeneral caballeros y damas 21 km
General caballeros y damas 21 km
 
Atom structure
Atom structureAtom structure
Atom structure
 
Femtocell-based communication services - Executive briefing
Femtocell-based communication services - Executive briefingFemtocell-based communication services - Executive briefing
Femtocell-based communication services - Executive briefing
 
عید میلاد النبی کی شرعی حیثیت
عید میلاد النبی کی شرعی حیثیتعید میلاد النبی کی شرعی حیثیت
عید میلاد النبی کی شرعی حیثیت
 
Oracle statistical functions
Oracle statistical functionsOracle statistical functions
Oracle statistical functions
 
The Case for Third Party Archiving in Microsoft Exchange Server 2010
The Case for Third Party Archiving in Microsoft Exchange Server 2010The Case for Third Party Archiving in Microsoft Exchange Server 2010
The Case for Third Party Archiving in Microsoft Exchange Server 2010
 
الثالث ع السيرة
الثالث ع السيرةالثالث ع السيرة
الثالث ع السيرة
 
การปรับแต่งตัวอักษร
การปรับแต่งตัวอักษรการปรับแต่งตัวอักษร
การปรับแต่งตัวอักษร
 
Rede_CERTIFIC_natalia_lima
Rede_CERTIFIC_natalia_limaRede_CERTIFIC_natalia_lima
Rede_CERTIFIC_natalia_lima
 
Pau
PauPau
Pau
 
Global warming
Global warmingGlobal warming
Global warming
 
Food Gh Fee Structures
Food Gh Fee StructuresFood Gh Fee Structures
Food Gh Fee Structures
 

Andere mochten auch (6)

The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Rothke Talk
Rothke TalkRothke Talk
Rothke Talk
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 

Mehr von Ben Rothke

Mehr von Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke   Getting A Handle On Wireless Security For Pci Dss ComplianceBen Rothke   Getting A Handle On Wireless Security For Pci Dss Compliance
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
 

Rothke computer forensics show 2010

  • 1. !" # $ &$ % '' The This information is provided for your review only and is not for any distribution. Any reproduction, modification, distribution, transmission, display or republication of the content is Computer strictly prohibited Forensics
  • 2. !" # $ % " !& ! ' ( ) #* + , )+- . 2
  • 3. / ) 0 * %* 1% % # % 2 $ * * 3 % ( #4 5 0$ $ * ( # 3 ## 3 % #) 3 #* 6 % 3% ## % 2 * 3% $ % 3 ( %% % 7 3
  • 4. 8 9: : ; 8 0 * < + 3% * * +3 $ * # % 3% # % * 7 3 = ( # 1* #% % * $ % 3 ( # * # 3 $ #$ * #* % 3 4
  • 5. 0 * 3 > * 7 5 $ ( % 97 ? ) ) # # >7 # # %* % * ; %* % 3 * 3 % % $ % 5
  • 6. * * 3 % # ! # * # 0/ @ % $ 3 % $ 3 * # 0/ % / # @ / % / # 9 / % $ $ # ; / $ % 3 # * ( *% # + % * # ) # # 3 34 $3 3 * #) # $) 1% %* # ) 3 # * % 3 % 7 0/ % / ) $ /7 @ 1# % / % 3 * ) 3 ) # 6
  • 7. 0 * 5 $ 5 5 * 3 * %* % • 5 # 3 3% • $ • 3 5 $ * # 7
  • 8. 0 * 3 /* 3 % #** # 8% # # % %* % * A $ 3 ** A)4 # 3 $ $ $ * # $ $ 3 # ' $) %* * * #4 $ % * 3 4 $ % B*+$ # +3 3% $ % # # # $ $ 8
  • 9. 0 * # + # #) # 3 ( ( ( * )" * * * * 9
  • 10. %% * #* % % 7 3 * - #) 3 * ) 97 3 # C # #) 4 $) 2 # ( % > @ 7 3 * # $8 * ) 3 43 # 7 & @ 7 3 3 3 % # 34 0$$ * + % ( 3 $ # + , - 10
  • 11. 5 3) # ; # * 6 2 #$ ( % C # * # * 4 C # * 6 # 3 1* 1* # * $ * * # 2 # 8 1* ) 3) % 6 $ 11
  • 12. 0 * # # # * * #1 % $ ) * * 3$ * # $ * ) $ ' $ # ) * * 3$ * ) $ % # # * # 8 # $ * 3 # +* * #* %3 ( * # * # 0 * 1 + # * * *. 12
  • 13. 0 * 3 % $ * 3 * % * $ $ % %* # # D # %* %* # #3 # # 3 % #) $ $ * 6 % 3% 0 * 3% $ 5 $ ) # ## # * * 3 @ ) # * # # # % #$ ) ( * $ % 3 3 # 13
  • 14. ; # 3 #< A* * * ** * 5 * 3 * @ ) * 5 % # B * ' * 4 5+ / 4 * 5C5 ; * 0% 3 3 3 % * #4 #4 14
  • 15. 3* = = # * $ ( % # %* 3 ) %* #$ # # * # * $ ( % * # # $ 3+ ) * 3# ) # B * * =# * #* % % # % % 3 # $ $ #3 ) $ %% * 3 * ( % #% # # $ ) # 15
  • 16. 0 * 3 #* ) # * < 0 * $% ) * < Define Drivers * < Policy Data Classification 5 $ ) 3 % %* #) Policy Definition 5 % * #) 4 $) % 16
  • 17. = * # # $ % # 1* % $ < 5 $) # $ $ * < 5 * # < ) % < - )% # * < - ) 3# * # < 5 # % #) < 3 3 = * / - 17
  • 18. ; * $ %< C @ A4 A ? 4# B +3 # ' % * #* # $ % # , . ) # * # * * 18
  • 19. 5 % * * Define Drivers Policy Data 0 A 7 Classification % # Policy Definition 3 4 E 40B # 4 /+ F ! F! # ) @ G * )# * ? % #) %* 3 ) * $ % # 19
  • 20. 5 % #* 0 * ** # * # % # $ % % # % 3% * 3 % ) ) #( * # # * # Define Drivers 5 % # # # # Policy Data Classification % G Policy Definition 0 # # % 3% %% # #+ # * 4>#+* # # 7 $ 8% %* 8* # 83 # 0 * * # $ #) 1 ( $ %* 20
  • 21. 0 * * 0 * * ) +# $ # ## % # $ %* % # # $3 #* * Define Drivers %* $ % #3 # Policy Data Classification * # Policy Definition %* * $3 # * * 3 $ $ * $# $ $ % * #) 8 21
  • 22. 5 $ # ) $ % 3 # + # $ % # 3 % 3 ) * Define Drivers $ # % Policy Data 3 # 6 % $ % Classification 3 3 # 1 Policy Definition $ 3 B # #* $ 3 0% # * * * * % 3 G! " # # # # $ 7 22
  • 23. 5 $ # %* # 3 * * $ % 7 Define Drivers 0 0 Policy Data * Classification $# -3 $# Policy Definition * B $# B / 23
  • 24. 0 * 3 # $ % # $# * 4 * 3% # * # #* Data Mapping ** 3 # ) Strategy Risk Modeling -3+ Control Gaps A* * ; 5 * / 24
  • 25. 5 # # $* ) # # # # $) % )# # $ # * 3 $ # 3$ 3 * % ( # %* ) < $% 3 +* ## )# $ ) ) / ** $ #$ ) $ # )* ) %* $$ # ) # $ # $ 3$ # $ $ , +* # . ) ) ## 8 3% #$ % $ ) 25
  • 26. 5 +$ ) # $ 26
  • 27. ( % 5 $ # * ( % # 6 $ * 5 $ * # * $ * Data Mapping ( % Strategy # ) )* # % = Risk Modeling #* * # * 3 # $ Control Gaps * 3* 5 % ( % #$ # $ * * 3 % 27
  • 28. A3 % 3 % # 3 #$ * A3 * * $3* * * + ** $ B 3 * ** ) * ## * /$+ # 3 $ * 3% % # - # * $ % 4: &: 28
  • 29. ' +# 4 + # * , . 5 * # ' * $# A $ * ## 3 * # # % $ * # * # # Deployment Implementation 3 $ * 3 # Management ( ## * 3* ) 4 1* Audit -3 #) + # # $ A 3+ # * ) # # %* * $ % C # G $ * 29
  • 30. ** + # * 5 * # 3 ## # ** $ * $ * # ) 3 # %* % Deployment Implementation Management * Audit @ #( $1 $ 1 # 3 * #% 3 % %* 1 $ * 3 + # 3 $ C # G@ ** 4 * 30
  • 31. 3# * 5 % # * # 3# 0 3 1 3 * % ** +# % 3% 0 1* * ## * Deployment Implementation 0 %* % # + $ $ Management # # ## * 3 Audit 3( $# $ * A 3 % $# % 3 #$ % 3 % 3% * $ % C # G 0 - 31
  • 32. *+ # * 5 * # * # @ * $ % * 0 %* % Deployment Implementation % 3 # $ ( # Management $ % = #* Audit # * $ % $ $ # +* % $ % 0 *% $# ) $ * C # G - # @ ** 32
  • 33. 5 * 5 + # * ) * # *# # 5 # 5 * # 5 B ) 3 * ## $ 3 * Deployment Implementation Management * # 1 * #$ % % # * Audit # 8* # #( 3 % 3 $ * 33
  • 34. 5 * * 1 * A %* ** % %* + #$ % 5 # * # ** # * * ## $ % $ % #3 # * # * ## %% # #) ( # 73 - 7 #% % 34
  • 35. ? 3% , . ? # 3 ## $ * 0 * !H % : 3% I * :H 3 * $ # $ $ ? * " H $99 : 3* # # * ? 0$$ ? * ## 3 ( 3 $ % # $ $ 35
  • 36. 9 % ; %% * 3 * % $ % $ ( # *# ' 3 * $ # 4 ,9 + . 9 $ %% % $* ,. % $ %% % 3$ * 36
  • 37. ? % 3% ( - )% # #< ; #< ; < - )) % 3 < - )) * * < - ) $ # 3< ; $ # % 3#< - )% % 3% 3) ) #< - ) # < 37
  • 38. 5 % 3% ( % ( % >7J $ 3 # # 3 5 $ # 5 $ * % $ %* % # ? 0 3 ( % % $ % * ** ) % 37 38
  • 39. ? 3% ? % $ # $ 3 $ %* % / 3 %) * $ %$ 3 =# % 3% * %* $ % 3% $ % * ** 39
  • 40. ? 3 ## 5 ' & +9 : # # 3 # $ 6 # # * 3 * % # 3 % 5 % # ) # G - ## 0 B 0 / *4 #* * ) #3 ' % 1 # #+ 5 * $ ** # # ) 40
  • 41. / 0 * ? 3% $ , 0? . ' # # #= 3% 3% $ %% * * 3 * * ) %% ? % ; 3 $ G %% ? *A 3 3 , ? A.* %* % # * 3 # $ ? # 3 # $ # 3 ? * + $ ? A %* % )))7 + * 7 3 %% 4 4 %4 41
  • 42. ' % $ % # $ %* % 3 * 3 * '# % *4 G4 7 73 4* 4 * 4 : +9 + 4 * : +9 + K 9: L # ": ": 5 : 7* $ * 3 * *4 G4 7 73 43 *4 4 4 #1 % 7 %% # $ ? 3% *4 G4 7 73 4* 4 * 4 : +L 4 " : F ": F : +L + 7* $ # *4 G4 7 73 4* 4 * 4 : +L 4 " : F ": F : +L + 97* $ # 0 * 3 G ? 35 )))7 7 %4 * 4 4 )* * K 3 K 7* $ )* # 42
  • 43. 43
  • 44. /3 = # $$ # $ * 3 % # * * 6 3 * #$$ ) 3 * # # $ 0 * * ** # 2 44
  • 45. ! 0 3 ' # ) AA ! ' # & ) : " :M J> 7G 9: .J +& 9 M' 1 , > " ! 9" , > J > G9: . J +: > $N %* $ )7 % @ )2 $ # 9& + 9 O ! * 9L ' 9 @2 : M : 7GL J 9 J " ! M' 1 , . + J G , J 9 J " : M $ N )))7 %+ $ 3 # L . + F 7 !" # # . 4 #. )))7 # 7 %4 4 )))7 ) 7 %4 The Computer Forensics