SlideShare a Scribd company logo
1 of 14
Cyber Incident Response Proposed Strategies
Presented by:
Kemar Williams
Information Security Incident Response Management
University of Technology, Jamaica
September 23, 2017
www.opensecurityalliance.orgRGIT, Mumbai 02/24
IRP - Strategies
 IR Preparation
 Identify Attack Vectors
 How is the Attack Deployed
 Detection Strategies
 Analysis Strategies
 Prevention Strategies
 Email
 Network
 End User
 Recovery & Review
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Incident Preparation
 Organize IR Operation Centre.
 Have end users and IR team members trained in responding to a ransomware.
 Prepare incident response contact list.
 Provide backup storage
 Provide supplies in the event od an incident:
 Notebooks & pens
 Laptops, Multifunction Printer, backup UPS and batteries
 Provide Software to:
• Perform Computer Analysis (anti-virus, anti-malware etc.)
• Recover data from infected hard drives.
• Recover password for locked computers
 Equip IR operation center with rations and petty cash
 Provide law enforcement contact numbers
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Identifying The Attack Vectors
Fig. 1 Attack Vectors
How is The Attack Deployed
• Comes as an
email
attachment
• Often very
generic but
could include a
real vendor
name or even
your company
name.
• Once open,
ransomware
silently begins
encrypting all
the files it can
without any user
interaction or
notification
• Locks the user
screen
displaying a
ransom
notification with
an expiry date
• Payment is
usually in
bitcoins
• Paying ransom
increase risk of
future attacks
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Detection Strategies
Detection:
 Setup a file activity monitoring application such as LANGuardian to:
 Detect both a real time and historical record of all file and folder activity the
network file shares.
 Monitor increase in file renames - When Ransomware strikes, it will result in
a massive increase in file renames as your data gets encrypted.
 Update Intrusion Detection System systems with exploit kit detection rules
 Create a sacrificial network share Drive
 When Ransomware strikes, it typically looks for local files first and then
moves onto network share drives.
 A sacrificial network share can act as an early warning system and also
delay the Ransomware from getting to your critical data
 Use client based anti-ransomware agents
Analysis and Documentation Strategies
After the detection of a ransomware infection the next step is the gathering information on
the incident by analyzing the scope of the attack. Depending on the type of ransomware
variant the following will be conducted:
 Disconnect and Quarantine infected computer(s)
 Determine the Scope of the Infection, Check the Following for Signs of Encryption
a. Mapped or shared drives
b. Mapped or shared folders from other computers
c. Network storage devices of any kind
d. External Hard Drives
e. USB storage devices of any kind (USB sticks, memory sticks, attached
phones/cameras)
f. Cloud-based storage: Drobox, Google Drive, OneDrive etc.
 Determine Ransomware Strain
a. What strain/type of ransomware? For example: CryptoWall, Teslacrypt etc.
 Determine Response
a. Now that you know the scope of your encrypted files as well as the strain of
ransomware you are dealing with, you can make a more informed decision as to
what your next action will be.
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Analysis and Documentation Strategies – Cont’d
.
Emron Technologies Inc. Incident Reporting Form
LOCATION: NAME OF DEPT./DIVISION:
Employee Name: Ext No: E-MAIL ADDRESS:
Date of Incident: Time of Incident:
Who Notified: Time of Notification:
Brief Description of Incident:
No. Of Host Infected: ____________
Host IP Address: ____________
Operating system: ____________
Impact Level:
Severe
7
6
Major
5
4
3
Minor
2
1
Negligible 0
Reporting Staff Name: _________________ Signature: ___________________ Date: ______________
CISO Name: ________________ Signature: ___________________ Date: ______________
Prevention Strategies
Prevention – Email:
 Enable strong spam filters to prevent phishing emails from reaching the end
users and authenticate inbound email using
 Scan all incoming and outgoing emails to detect threats and filter executable files
from reaching end users.
 Scan and filter all downloads
Prevention Strategies – Cont’d
Prevention – Network:
 Segment the Network by creating VLANS
 This will contain the ransomware infection and slow down its propagation.
 Configure firewall to block access to known malicious IP addresses
 Patch operating systems, application software, and update firmware on network
devices. Consider using a centralized patch management system.
 Configure enterprise security suite to perform daily scans of the network and
endpoints automatically.
 Virtualize servers
 Maintain offsite backup of crucial key servers and data.
Prevention Strategies – Cont’d
Prevention – Network: Sacrificial Network
Prevention Strategies – Cont’d
Prevention – End User:
 Install anti-virus/antimalware software
 Recommend the use of google chrome instead of internet explorer.
 Disabling execution of scripts running in the browser
 Download and install Microsoft windows/security updates.
 Disable the use of thumb drives
Recovery and Review
Restore from backup (if possible)
 Now that you’ve contained the infection and put the rest of your users on guard, the
best way to fix your user’s computer without paying the ransom is to restore it from
your backup. Before you wipe the computer, however, make sure your backup is up-
to-date and that you have a good copy of that data. You don’t want to hit the nuke
button and realize your last backup was two months ago.
Training:
 Conduct training or existing and new employees to raise awareness of the risks of
ransomware attack vectors. Remind employees never to click on unsolicited links or
attachments. Emails from unknown sources should be treated with suspicion.
THE END

More Related Content

What's hot

edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_ggAlienVault
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...Luigi Delgrosso
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskBeyondTrust
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virusshusrusha
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809Todd Deshane
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsInformation Technology
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 

What's hot (19)

edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 

Similar to Cyber Incident Response Proposed Strategies

Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptxVivek Chauhan
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09technext1
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From MalwareRishu Mehra
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 

Similar to Cyber Incident Response Proposed Strategies (20)

ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
How To Prevent Ransomware
How To Prevent RansomwareHow To Prevent Ransomware
How To Prevent Ransomware
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 

More from Dam Frank

Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?Dam Frank
 
Lesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and PhariseesLesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and PhariseesDam Frank
 
Lesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of ChristLesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of ChristDam Frank
 
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ HistoricityLesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ HistoricityDam Frank
 
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ HistoricityLesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ HistoricityDam Frank
 
Lesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ HistoricityLesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ HistoricityDam Frank
 
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ HistoricityLesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ HistoricityDam Frank
 
What is Sin?
What is Sin?What is Sin?
What is Sin?Dam Frank
 
The Son of God - Part 6 Redemption
The Son of God - Part 6 RedemptionThe Son of God - Part 6 Redemption
The Son of God - Part 6 RedemptionDam Frank
 
The Son of God - Part 6 Substitution
The Son of God - Part 6 SubstitutionThe Son of God - Part 6 Substitution
The Son of God - Part 6 SubstitutionDam Frank
 
The Son of God - Part 6 Propitiation
The Son of God - Part 6 PropitiationThe Son of God - Part 6 Propitiation
The Son of God - Part 6 PropitiationDam Frank
 
The Son of God - Part 5
The Son of God - Part 5The Son of God - Part 5
The Son of God - Part 5Dam Frank
 
The Son of God - Part 6
The Son of God - Part 6The Son of God - Part 6
The Son of God - Part 6Dam Frank
 
The Son of God - Part 4
The Son of God - Part 4The Son of God - Part 4
The Son of God - Part 4Dam Frank
 
The Son of God - Part 3
The Son of God -  Part 3The Son of God -  Part 3
The Son of God - Part 3Dam Frank
 
Jesus is God: Defending the Claim
Jesus is God: Defending the Claim Jesus is God: Defending the Claim
Jesus is God: Defending the Claim Dam Frank
 
Messianic Prophecies Quiz
Messianic Prophecies QuizMessianic Prophecies Quiz
Messianic Prophecies QuizDam Frank
 
Messianic Prophecies
Messianic Prophecies Messianic Prophecies
Messianic Prophecies Dam Frank
 
The Progressive Revelation of the Name
The Progressive Revelation of the NameThe Progressive Revelation of the Name
The Progressive Revelation of the NameDam Frank
 
The Nature of God
The Nature of GodThe Nature of God
The Nature of GodDam Frank
 

More from Dam Frank (20)

Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?
 
Lesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and PhariseesLesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and Pharisees
 
Lesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of ChristLesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of Christ
 
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ HistoricityLesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
 
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ HistoricityLesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
 
Lesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ HistoricityLesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ Historicity
 
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ HistoricityLesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
 
What is Sin?
What is Sin?What is Sin?
What is Sin?
 
The Son of God - Part 6 Redemption
The Son of God - Part 6 RedemptionThe Son of God - Part 6 Redemption
The Son of God - Part 6 Redemption
 
The Son of God - Part 6 Substitution
The Son of God - Part 6 SubstitutionThe Son of God - Part 6 Substitution
The Son of God - Part 6 Substitution
 
The Son of God - Part 6 Propitiation
The Son of God - Part 6 PropitiationThe Son of God - Part 6 Propitiation
The Son of God - Part 6 Propitiation
 
The Son of God - Part 5
The Son of God - Part 5The Son of God - Part 5
The Son of God - Part 5
 
The Son of God - Part 6
The Son of God - Part 6The Son of God - Part 6
The Son of God - Part 6
 
The Son of God - Part 4
The Son of God - Part 4The Son of God - Part 4
The Son of God - Part 4
 
The Son of God - Part 3
The Son of God -  Part 3The Son of God -  Part 3
The Son of God - Part 3
 
Jesus is God: Defending the Claim
Jesus is God: Defending the Claim Jesus is God: Defending the Claim
Jesus is God: Defending the Claim
 
Messianic Prophecies Quiz
Messianic Prophecies QuizMessianic Prophecies Quiz
Messianic Prophecies Quiz
 
Messianic Prophecies
Messianic Prophecies Messianic Prophecies
Messianic Prophecies
 
The Progressive Revelation of the Name
The Progressive Revelation of the NameThe Progressive Revelation of the Name
The Progressive Revelation of the Name
 
The Nature of God
The Nature of GodThe Nature of God
The Nature of God
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Cyber Incident Response Proposed Strategies

  • 1. Cyber Incident Response Proposed Strategies Presented by: Kemar Williams Information Security Incident Response Management University of Technology, Jamaica September 23, 2017
  • 2. www.opensecurityalliance.orgRGIT, Mumbai 02/24 IRP - Strategies  IR Preparation  Identify Attack Vectors  How is the Attack Deployed  Detection Strategies  Analysis Strategies  Prevention Strategies  Email  Network  End User  Recovery & Review
  • 3. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Incident Preparation  Organize IR Operation Centre.  Have end users and IR team members trained in responding to a ransomware.  Prepare incident response contact list.  Provide backup storage  Provide supplies in the event od an incident:  Notebooks & pens  Laptops, Multifunction Printer, backup UPS and batteries  Provide Software to: • Perform Computer Analysis (anti-virus, anti-malware etc.) • Recover data from infected hard drives. • Recover password for locked computers  Equip IR operation center with rations and petty cash  Provide law enforcement contact numbers
  • 4. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Identifying The Attack Vectors Fig. 1 Attack Vectors
  • 5. How is The Attack Deployed • Comes as an email attachment • Often very generic but could include a real vendor name or even your company name. • Once open, ransomware silently begins encrypting all the files it can without any user interaction or notification • Locks the user screen displaying a ransom notification with an expiry date • Payment is usually in bitcoins • Paying ransom increase risk of future attacks
  • 6. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Detection Strategies Detection:  Setup a file activity monitoring application such as LANGuardian to:  Detect both a real time and historical record of all file and folder activity the network file shares.  Monitor increase in file renames - When Ransomware strikes, it will result in a massive increase in file renames as your data gets encrypted.  Update Intrusion Detection System systems with exploit kit detection rules  Create a sacrificial network share Drive  When Ransomware strikes, it typically looks for local files first and then moves onto network share drives.  A sacrificial network share can act as an early warning system and also delay the Ransomware from getting to your critical data  Use client based anti-ransomware agents
  • 7. Analysis and Documentation Strategies After the detection of a ransomware infection the next step is the gathering information on the incident by analyzing the scope of the attack. Depending on the type of ransomware variant the following will be conducted:  Disconnect and Quarantine infected computer(s)  Determine the Scope of the Infection, Check the Following for Signs of Encryption a. Mapped or shared drives b. Mapped or shared folders from other computers c. Network storage devices of any kind d. External Hard Drives e. USB storage devices of any kind (USB sticks, memory sticks, attached phones/cameras) f. Cloud-based storage: Drobox, Google Drive, OneDrive etc.  Determine Ransomware Strain a. What strain/type of ransomware? For example: CryptoWall, Teslacrypt etc.  Determine Response a. Now that you know the scope of your encrypted files as well as the strain of ransomware you are dealing with, you can make a more informed decision as to what your next action will be.
  • 8. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Analysis and Documentation Strategies – Cont’d . Emron Technologies Inc. Incident Reporting Form LOCATION: NAME OF DEPT./DIVISION: Employee Name: Ext No: E-MAIL ADDRESS: Date of Incident: Time of Incident: Who Notified: Time of Notification: Brief Description of Incident: No. Of Host Infected: ____________ Host IP Address: ____________ Operating system: ____________ Impact Level: Severe 7 6 Major 5 4 3 Minor 2 1 Negligible 0 Reporting Staff Name: _________________ Signature: ___________________ Date: ______________ CISO Name: ________________ Signature: ___________________ Date: ______________
  • 9. Prevention Strategies Prevention – Email:  Enable strong spam filters to prevent phishing emails from reaching the end users and authenticate inbound email using  Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.  Scan and filter all downloads
  • 10. Prevention Strategies – Cont’d Prevention – Network:  Segment the Network by creating VLANS  This will contain the ransomware infection and slow down its propagation.  Configure firewall to block access to known malicious IP addresses  Patch operating systems, application software, and update firmware on network devices. Consider using a centralized patch management system.  Configure enterprise security suite to perform daily scans of the network and endpoints automatically.  Virtualize servers  Maintain offsite backup of crucial key servers and data.
  • 11. Prevention Strategies – Cont’d Prevention – Network: Sacrificial Network
  • 12. Prevention Strategies – Cont’d Prevention – End User:  Install anti-virus/antimalware software  Recommend the use of google chrome instead of internet explorer.  Disabling execution of scripts running in the browser  Download and install Microsoft windows/security updates.  Disable the use of thumb drives
  • 13. Recovery and Review Restore from backup (if possible)  Now that you’ve contained the infection and put the rest of your users on guard, the best way to fix your user’s computer without paying the ransom is to restore it from your backup. Before you wipe the computer, however, make sure your backup is up- to-date and that you have a good copy of that data. You don’t want to hit the nuke button and realize your last backup was two months ago. Training:  Conduct training or existing and new employees to raise awareness of the risks of ransomware attack vectors. Remind employees never to click on unsolicited links or attachments. Emails from unknown sources should be treated with suspicion.

Editor's Notes

  1. Many IDS, IPS and firewall systems come with exploit detection features. Exploit kits are used as a way to get Ransomware onto a client through malspam or via compromised websites. The two most common exploit kits (EK) associated with Ransomware are the Neutrino EK and the Angler EK.