SlideShare a Scribd company logo
Ethical Hacking and
CountermeasuresCountermeasures
Version 6
Module LVII
Computer Forensics
and Incident Handlingg
Scenario
OrientRecruitmentInc is an online human resource recruitment firm.
The web server of the firm is a critical link.
Neo, the network administrator sees some unusual activity that is
targeted towards the web server. The web server is overloaded witha ge ed o a ds e eb se e e eb se e s o e oaded
connection requests from huge number of different sources.
Before he could realize the potential of the attack, the website of
O i tR it tI f ll t th h f D i l fOrientRecruitmentInc falls prey to the much famous Denial of
Service Attack.
The company management calls up the local Incident Response
Team to look into the matter and solve the DoS issue.
What steps will the incident response team take to investigate the
attack?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
attack?
Module Objective
This module will familiarize you with:
• Computer Forensics
• What is an Incident
This module will familiarize you with:
• What is an Incident
• Categories of Incidents
• Incident Response Checklist
• Procedure for Handling Incidentg
• Incident Management
• Incident Reporting
• What is CSIRT
• Types of Incidents and Level of Support
• Incident Specific Procedures
• Best Practices for Creating a CSIRT
W ld CERT
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• World CERTs
Module Flow
Computer Forensics Incident Reporting
What is CSIRTWhat is an Incident
Categories of Incidents
Types of Incidents and
Level of Support
Incident Response Checklist Incident Specific Procedures
Best Practices for Creating a CSIRT
Procedure for
Handling Incident
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
World CERTsIncident Management
To Know More AboutTo Know More About
Computer Forensics,
A d EC C il’ CHFIAttend EC-Council’s CHFI
ProgramProgram
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
C t F iComputer Forensics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
What is Computer Forensics
“The preservation, identification, extraction, interpretation, and
documentation of computer evidence to include the rules of evidencedocumentation of computer evidence, to include the rules of evidence,
legal processes, integrity of evidence, factual reporting of the
information found, and providing expert opinion in a court of law or
other legal and/or administrative proceeding as to what was found.”
"Forensic Computing is the science of capturing, processing and
investigating data from computers using a methodology whereby anyinvestigating data from computers using a methodology whereby any
evidence discovered is acceptable in a Court of Law.”
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Need for Computer Forensics
“Computer forensics is equivalent of surveying a crime scene or performing an
autopsy on a victim”p y
{Source: James Borek 2001}
Presence of a majority of electronic documentsPresence of a majority of electronic documents
Search and identify data in a computerSearch and identify data in a computer
Digital Evidence can be easily destroyed if not handled properlyDigital Evidence can be easily destroyed, if not handled properly
For recovering Deleted Encrypted or Corrupted files from a system
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
For recovering Deleted, Encrypted, or Corrupted files from a system
Objectives of Computer Forensics
To recover, analyze and present computer-To recover, analyze and present computer
based material in such a way that it can be
presented as evidence in a court of law
To identify the evidence in short time, estimate
potential impact of the malicious activity on
the victim, and assess the intent and identity ofy
the perpetrator
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Stages of Forensic Investigation in
Tracking Cyber CriminalsTracking Cyber Criminals
An Incident occurs in
Whi h h C ’
The Client contacts the
C ’ Ad
The Advocate contracts
E l F iWhich, the Company’s
Server is compromised
Company’s Advocate
for Legal Advice
an External Forensic
Investigator
The Forensic Investigator
Prepares First Response
of Procedures (FRP)
The FI seizes the
evidences in the Crime
scene & transports
them to the Forensics Lab
The Forensic Investigator
(FI) prepares the
Bit-Stream images of the files
The Forensic Investigator
creates an MD5 #
of the files
The Forensic Investigator
examines the evidence
files for proof of a Crime
The FI prepares Investigation
reports and concludes the
Investigation, enables the
Advocate identify required proofsdvocate de t y equ ed p oo s
The FI handles the
sensitive Report to the
The Advocate studies the
report and might press charges
The Forensic Investigator
usually destroys
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
sensitive Report to the
Client in a secure manner
against the offensive in
the Court of Law
usually destroys
all the evidences
Key Steps in Forensic
InvestigationsInvestigations
1
• Computer crime is suspected
2
• Collect preliminary evidence
3
• Obtain court warrant for seizure (if required)
4
• Perform first responder procedures
4
p p
5
• Seize evidence at the crime scene
6
• Transport them to the forensic laboratory
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
7
• Create 2 bit stream copies of the evidence
Key Steps in Forensic
Investigations (cont’d)Investigations (cont d)
8
• Generate MD5 checksum on the images
9
• Prepare chain of custody
10
• Store the original evidence in a secure location
11
• Analyze the image copy for evidence
12
• Prepare a forensic report
13
• Submit the report to the client
14
• If required, attend the court and testify as expert witness
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
14
List of Computer Forensics Tools
Process ExplorerHelix
Autoruns
Irfan View
Pslist
Fport
Adapterwatch
Necrosoft Dig
Psloggedon
RegScanner
Visual TimeAnalyzer
Evidor
X-Ways Forensics
Traces Viewer
Ontrack
Forensic Sorter
Sleuth Kit
SMART
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Directory SnoopPenguin Sleuth Kit
I id H dliIncident Handling
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Present Networking Scenario
Increase in the number of companies venturing into e-business
l d ith hi h I t tcoupled with high Internet usage
Decrease in vendor product development cycle and product
i ltesting cycle
Increase in the complexity of Internet as a networkIncrease in the complexity of Internet as a network
Alarming increase in intruder activities and tools, expertise ofg , p
hackers, and sophistication of hacks
Lack of thoroughly trained professionals as compared to the
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Lack of thoroughly trained professionals as compared to the
number and intensity of security breaches
What is an Incident
Computer security incident is defined as “Any real or suspected adverse
event in relation to the security of computer systems or computerevent in relation to the security of computer systems or computer
networks”
• Source: www.cert.org
It also includes external threats such as gaining access to systems,
disrupting their services through malicious spamming, execution of
malicious codes that destroy or corrupt systemsmalicious codes that destroy or corrupt systems
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Category of Incidents: Low Level
Low level incidents are the least severe kind of incidentsLow level incidents are the least severe kind of incidents
They should be handled within one working day after the event occursThey should be handled within one working day after the event occurs
They can be identified when there is:
Loss of personal password
Suspected sharing of organization’s accountsSuspected sharing of organization s accounts
Unsuccessful scans and probes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Presence of any computer virus or worms
Category of Incidents: Mid Level
h i id hi l l i l i d h h ld bThe incidents at this level are comparatively more serious and thus, should be
handled the same day the event occurs
• Violation of special access to a computer or computing
They can be identified by observing:
Violation of special access to a computer or computing
facility
• Unfriendly employee termination
• Unauthorized storing and processing data
• Destruction of property related to a computer incident (lessp p y p (
than $100,000)
• Personal theft of data related to computer
incident($100,000)
• Computer virus or worms of comparatively larger intensity
Ill l t b ildi
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Illegal access to buildings
Category of Incidents: High Level
These are the most serious incidents and are considered as “Major” in nature
High level incidents should be handled immediately after the incident occurs
These include:
• Denial of Service attacks
• Suspected computer break-in
• Computer virus or worms of highest intensity; e.g. Trojan
back doorback door
• Changes to system hardware, firmware, or software without
authentication
• Destruction of property exceeding $100,000
• Personal theft exceeding $100,000 and illegal electronic
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g g
fund transfer or download/sale
• Any kind of pornography, gambling, or violation of any law
How to Identify an Incident
A system alarm from an intrusion detection tool indicating security breach
Suspicious entries in a network
Accounting gaps of several minutes with no accounting log
Other events like unsuccessful login attempts, unexplained new user or files, attempts to write
s stem files modification or deleting of datasystem files, modification, or deleting of data
Unusual usage patterns, such as programs being compiled in the account of users who are
non-programmers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How to Prevent an Incident
A key to preventing security incidents is to eliminate as many vulnerabilities
iblas possible
Intrusions can be prevented by:Intrusions can be prevented by:
• Scanning the network/system for security loopholes
• Auditing the network/system
• Deploying Intrusion Detection/Prevention Systems on the network/system
• Establishing Defense-in-Depth
• Securing Clients for Remote Users
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Defining the Relationship between Incident
Response, Incident Handling, and Incident
ManagementManagement
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Incident Response Checklist
Potential Incident Verified
Contact department/agency security staff
• I.T. Manager -
• [designee/others by department procedure] -[ g / y p p ]
Security designee will contact CSIRT member
• Call 802-250-0525 (GOVnet Beeper)
• GOVnet will then contact CSIRT members (csirt@.state.vt.us)( @ )
• If no response within ten minutes call the Office of the CIO
Isolate system(s) from GOVnet [unless CSIRT decision is to leave the system
connected to monitor active hacker]
Begin a log book - who/ what / when / where
Identify the type of Incident - Virus, worm, and hacker
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Preliminary estimation of extent of problem, number of systems
Incident Response Checklist
(cont’d)(cont d)
Contact local police authority with jurisdiction at location of incident (This
MUST BE coordinated with CSIRT)
Follow server/operating system specific procedures to snapshot the system
Inoculate/restore the systemInoculate/restore the system
Close the vulnerability and ensure that all patches have been installed
Return to normal operations
Prepare report and conduct follow-up analysis
Revise prevention and screening procedures
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Remember to log all actions!
Handling Incidents
Incident handling helps to find out trends and patterns regarding
intruder activity by analyzing itintruder activity by analyzing it
It involves three basic functions:
• Incident reporting,
• Incident analysis, and
• Incident response
It recommends network administrators for recovery, containment, and
prevention to constituents
It ll i id t t t b th d i l ti th t tIt allows incident reports to be gathered in one location so that exact
trends and pattern can be recognized and recommended strategies can
be employed
I h l h di ff d d h f
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
It helps the corresponding staffs to understand the process of
responding and to tackle unexpected threats and security breaches
Procedure for Handling Incident
The incident handling process is divided into six stages
These stages are:
• Preparation
• Identification
• Containment
E di ti• Eradication
• Recovery
• Follow-up
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Stage 1: Preparation
Preparation enables easy coordination among staffp y g
Create a policy
Develop preventive measures to deal with threats
Obtain resources required to deal with incidents
effectively
Develop infrastructure to respond and supportDevelop infrastructure to respond and support
activities related to incident response
Select team members and provide training
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Select team members and provide training
Stage 2: Identification
Identification involves validating, identifying, and
reporting the incidentreporting the incident
Determining the symptoms given in ‘how to identify an
incident’
Identifying the nature of the incident
Identifying events
Protecting evidence
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Reporting events
Stage 3: Containment
Containment limits the extent and intensity of an incidentContainment limits the extent and intensity of an incident
It avoids logging as root on the compromised systemIt avoids logging as root on the compromised system
Avoid conventional methods to trace back as this may alert the
kattackers
Perform the backup on the system to maintain the current state of
the system for facilitating the post-mortem and forensicthe system for facilitating the post-mortem and forensic
investigation later
Change the system passwords to prevent the possibility of
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g y p p p y
Spywares being installed
Stage 4: Eradication
Investigate further to uncover the cause of the incident by analyzing system logs
of various devices such as firewall, router, and host logs
Improve defenses on target host such as:
• Reloading of a new operating systemReloading of a new operating system
• Enabling firewalls
• Assigning new IP address
Install all the latest patchesInstall all the latest patches
Disable any unnecessary services
Install anti-virus software
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Apply the Company’s security policy to the system
Stage 5: Recovery
Determine the course of actionsDetermine the course of actions
Monitor and validate systemsy
Determine integrity of the backup itself by making an
attempt to read its dataattempt to read its data
Verify success of operation and normal condition of system
Monitor the system by network loggers, system log files, and
potential back doors
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
potential back doors
Stage 6: Follow-up
Post-mortem analysis:
• Perform a detailed investigation of the incident to identify the
extent of the incident and potential impact prevention mechanisms
Revise policies and procedures from the
lessons learned from the past
Determine the staff time required and
f th f ll i t l i
• Extent to which the incidents disrupted the organization
• Data lost and its value
perform the following cost analysis:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Damaged hardware and its cost
Stage 6: Follow-up (cont’d)
Document the response to incident by finding answers to the
following:
Was the preparation for the incident sufficient?
Whether the detection occurred promptly or not, and
why?
Using additional tools could have helped or not?Using additional tools could have helped or not?
Was the incident contained?
What practical difficulties were encountered?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Was it communicated properly?
Incident Management
Incident management is not just responding to an incident when it happens but
includes proactive activities that help prevent incidents by providing guidanceincludes proactive activities that help prevent incidents by providing guidance
against potential risks and threats
Includes the development of a plan of action, a set of processes that are consistent,p p , p ,
repeatable, of high quality, measurable, and understood within the constituency
Who performs Incident Management?
Human resource personnel
Legal council
The firewall manager
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
An outsourced service provider
Incident Management (cont’d)
Figure : Five High-Level Incident Management Processesg g g
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: www.cert.org/archive/pdf/04tr015.pdf
Why don’t Organizations Report
Computer CrimesComputer Crimes
Misunderstanding the scope of the problem
• This does not happen to other organizations
Proactive reporting and handling of the incident will allow many
organizations to put their spin on the media reports
Potential loss of customers
Desire to handle things internally
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Lack of awareness of the attack
Estimating Cost of an Incident
Tangible: Can be quantified
• Lost productivity hours
• Investigation and recovery efforts
L f b i
g q
• Loss of business
• Loss or theft of resources
Intangible: More difficult to identify and
• Damage to corporate reputation
• Loss of goodwill
Intangible: More difficult to identify and
quantify
Loss of goodwill
• Psychological damage
• Those directly impacted may feel victimized
• May impact morale or initiate fear
• Legal liability
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Legal liability
• Effect on shareholder value
Whom to Report an Incident
Incident reporting is the process of reporting the information regardingp g p p g g g
the encountered security breach in a proper format
The incident should be reported to the CERT Coordination center, site
security manager, or other sites
It can also be reported to law enforcement agencies such as FBI,USSS
Electronic crimes branch, or Department of Defense Contractors
It should be reported to receive technical assistance and to raise security
awareness to minimize the losses
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Incident Reporting
When a user encounters any breach, report the following:
Intensity the security breach
Circumstances, which revealed the vulnerability
Sh t i i th d i d i t l l f kShortcomings in the design and impact or level of weakness
Entry logs related to intruder’s activity
Specific help needed should be clearly defined
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Correct time-zone of the region and synchronization information of
the system with a National time server via NTP
Vulnerability Resources
US-CERT Vulnerability Notes Database:
• Descriptions of these vulnerabilities are available from this web page in a
searchable database format, and are published as "US-CERT Vulnerability
Notes".
• Integrates all publicly available U.S. Government vulnerability resources and
provides references to industry resources
NVD (National Vulnerability Database):
• List or dictionary of publicly known information security vulnerabilities and
l d f f bl
CVE (Common Vulnerabilities and Exposures List):
exposures international in scope and free for public use
OVAL (Open Vulnerability Assessment Language):
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• A three-leveled vulnerability handling method consisting of a characteristics
schema for collecting configuration data from systems for testing
What is CSIRT
Computer Security Incident Response Team (CSIRT):p y p ( )
Incident Response Services 24x7
CSIRT provides 24x7 Computer Security
Incident Response Services to any user,
company, government agency or organization
CSIRT provides a reliable and trusted single
point of contact for reporting computer
security incidents worldwidesecurity incidents worldwide
CSIRT provides the means for reporting
i id d f di i i i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
incidents and for disseminating important
incident-related information
CSIRT: Goals and Strategy
CSIRT’s goals:
• To organize the management of security problems by taking a
proactive approach to our customers’ security vulnerabilities
and by responding effectively to potential information security
i id t
CS s goa s:
incidents
• To minimize and control the damage
• To provide or assist with effective response and recovery
• To help prevent future events
• It provides a single point of contact for reporting local
Strategy of CSIRT:
t p o des a s g e po t o co tact o epo t g oca
problems
• It identifies and analyzes what has happened including the
impact and threat
• It researches solutions and mitigation strategies
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g g
• It shares response options, information, and lessons learned
Why an Organization needs an
Incident Response TeamIncident Response Team
Incident Response
T h l It i f li d t A d h t itTeam helps
organizations to
recover from
computer security
b h d h
It is a formalized team
that performs incident
response work as its
major job function
As an ad-hoc team, it
is responsible for
ongoing computer
security incident
breaches and threats
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CSIRT Case Classification
Incident Categories: All incidents managed by the CSIRT should be classified into one of the categories listed in the table below
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly ProhibitedSource: http://www.first.org/resources/guides/csirt_case_classification.html
Types of Incidents and Level of
Support
The Computer Security Incident Response Team will assign
resources according to the following priorities, listed in the
Support
• Threats to the physical safety of human beings
• Root or system-level attacks on any machine either multi-user or dedicated-
resources according to the following priorities, listed in the
decreasing order:
y y
purpose
• Compromise restricted confidential service accounts or software
installations, in particular those with authorized access to confidential data
• Denial of service attacks on any of the above two itemse a o se v ce attac s o a y o t e above t o te s
• Large-scale attacks of any kind, e.g. sniffing attacks, IRC "social engineering"
attacks, password cracking attacks, and destructive virus outbursts
• Compromise of individual user accounts, i.e. unauthorized access to a user or
service accountservice account
• Forgery and misrepresentation, and other security-related violations of local
rules and regulations, e.g. Netnews and e-mail forgery, unauthorized use of
IRC bots
• Types of incidents other than those mentioned above will be prioritized
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Types of incidents other than those mentioned above will be prioritized
according to their apparent severity and extent
Incident Specific Procedures-I
(Virus and Worm Incidents)(Virus and Worm Incidents)
Step 1: Isolate the system
Step 2: Notify appropriate people
Step 3: Identify the problem
Step 4: Include the virus or worm
Step 5: Inoculate the system(s)
Step 6: Return to a normal operating mode
Step 7: Follow up analysis
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
p 7 p y
Log all actions in every phase*
Incident Specific Procedures-II
(Hacker Incidents)(Hacker Incidents)
(A) Attempted Probes into a State of Vermont System
• Step 1: Identify the problem
• Step 2: Notify appropriate people
• Step 3: Identify the Hacker
• Step 4: Notify CERT
• Step 5: Follow up analysis• Step 5: Follow up analysis
• Step 1: Notify Appropriate People
(B) Active Hacker Activity
p y pp p p
• Option 1: Removal of Hacker from the system
• Step 2: Snap-shot the System
• Step 3: Lock out the Hacker
• Step 4: Restore the System
• Step 5: Notify other Agencies• Step 5: Notify other Agencies
• Step 6: Follow up Analysis
• Option 2: Monitoring of Hacker Activity
(C) Evidence of Past Incidents
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
(C) Evidence of Past Incidents
Log all actions in every phase*
Incident Specific Procedures-III
(Social Incidents, Physical Incidents)(Social Incidents, Physical Incidents)
Social Incidents:
• Step 1: Identify Potential Risk
• Log all actions*
• Step 2: Notify Appropriate People
Physical Incidents:
• Step 2: Notify Appropriate People
• Log all actions*
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How CSIRT Handles Case: Steps
KEEP A LOG BOOK
INFORM THE
APPROPRIATE PEOPLE
MAINTAIN
LIST OF CONTACTS
RELEASE THE
INFORMATION
O
FOLLOW UP ANALYSIS
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
REPORT
Example of CSIRT
Internal CSIRT provides services to their parent organization such as
bank, manufacturing company, university, or any government agencies
National CSIRT provides services to the entire nation example being
Japan Computer Emergency Response Team Coordination CenterJapan Computer Emergency Response Team Coordination Center
(JPCERT/CC)
Analysis Centers synthesize data, determine trends, and patterns in an
incident activity to predict future activity or provide early warnings
Vendor teams identify vulnerabilities in software and hardware productsVendor teams identify vulnerabilities in software and hardware products
Incidents Response Providers offer services to paid clients
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Incidents Response Providers offer services to paid clients
Best Practices for Creating a
CSIRTCSIRT
1
• Obtain management support and buy-in
1
2
• Determine the CSIRT strategic plan
3
• Gather relevant information
4
• Design the CSIRT vision
4
5
• Communicate the CSIRT vision and operational plan
6
• Begin CSIRT implementation
7
• Announce the operational CSIRT
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
7
Step 1: Obtain Management
Support and Buy-inSupport and Buy in
Without management approval and support, creating an
effective incident response capability can be extremely difficult
and problematic
Once the team is established, how is it maintained and
d d ith b d t l d q i t ?expanded with budget, personnel, and equipment resources?
Will the role and authority of the CSIRT continue to be backed
by management across the various constituencies or parent
organization?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Step 2: Determine the CSIRT
Development Strategic PlanDevelopment Strategic Plan
Are there specific timeframes to be met? Are they realistic, and ifp y ,
not, can they be changed?
Is there a project group? Where do the group members come from?
How do you let the organization know about the development of the
CSIRT?
If you have a project team, how do you record and communicate the
information you are collecting, especially if the team is
hi ll di d?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
geographically dispersed?
Step 3: Gather Relevant
InformationInformation
Meet with key stakeholders to discuss the expectations, strategic direction,
definitions, and responsibilities of the CSIRT
i
The stakeholders could include:
• Business managers
• Representatives from IT
• Representatives from the legal department
• Representatives from human resourcesRepresentatives from human resources
• Representatives from public relations
• Any existing security groups, including physical security
• Audit and risk management specialists
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Step 4: Design your CSIRT
VisionVision
In creating your vision you should:
• Identify your constituency: Who does the CSIRT support and service?
• Define your CSIRT mission, goals, and objectives: What does the CSIRT do
In creating your vision, you should:
y , g , j
for the identified constituency?
• Select the CSIRT services to provide to the constituency (or others): How
does the CSIRT support its mission?
• Determine the organizational model: How is the CSIRT structured andg
organized?
• Identify required resources: What staff, equipment, and infrastructure is
needed to operate the CSIRT?
• Determine your CSIRT funding: How is the CSIRT funded for its initialDetermine your CSIRT funding: How is the CSIRT funded for its initial
startup and its long-term maintenance and growth?
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Step 5: Communicate the CSIRT
VisionVision
Communicate the CSIRT visionCommunicate the CSIRT vision
and operational plan to
management, constituency, and
others who need to know and
understand its operations
As appropriate, make adjustments
to the plan based on their feedback
understand its operations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Step 6: Begin CSIRT
ImplementationImplementation
Hire and train initial CSIRT staffHire and train initial CSIRT staff
Buy equipment and build any necessary network infrastructure to supporty q p y y pp
the team
Develop the initial set of CSIRT policies and procedures to support yourDevelop the initial set of CSIRT policies and procedures to support your
services
D fi h ifi i f d b ild i id kiDefine the specifications for and build your incident-tracking system
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Develop incident-reporting guidelines and forms for your constituency
Step 7: Announce the CSIRT
When the CSIRT is operational, announce it to the
constituency or parent organization
It is best if this announcement comes from sponsoring
management
Include the contact information and hours of operation for the
CSIRT in the announcement
This is an excellent time to make the CSIRT incident-reporting
guidelines available
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
World CERTs
http://www.trusted-introducer.nl/teams/country.htmlhttp://www.trusted introducer.nl/teams/country.html
Asia Pacific CERTs
• Australia CERT (AUSCERT)
• Hong Kong CERT (HKCERT/CC)
• Indonesian CSIRT (ID-CERT)
• Japan CERT-CC (JPCERT/CC)p /
• Korea CERT (CERT-KR)
• Malaysia CERT (MyCERT)
• Pakistan CERT(PakCERT)
• Singapore CERT (SingCERT)
• Taiwan CERT (TWCERT)• Taiwan CERT (TWCERT)
• China CERT (CNCERT/CC)
North American CERTs
• CERT-CC
• US-CERT
• Canadian Cert
• Cancert
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cancert
• Forum of Incident Response and Security Teams
• FIRST
World CERTs (cont’d)
South American CERTs
• CAIS
• CAIS- Brazilian Research Network CSIRT
• NIC BR Security Office Brazilian CERTy
• NBS
European CERTs
• EuroCERT
• FUNET CERT
• CERTA
• DFN-CERT
• JANET-CERT
• CERT-NL
• UNINETT-CERT
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• CERT-NASK
• Swiss Academic and Research Network CERT
http://www.first.org/about/organization/
teams//
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
http://www.apcert.org/about/structure/me
mbers.html
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
IRTs Around the World
f /
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Courtesy of CERT/CC
©Carnegie Mellon University 2003
Summary
Increase in the number of products and relative increase in the number of
hacking tools has put security in the spotlighthacking tools has put security in the spotlight
Computer security incident is defined as any real or suspected adverse event in
relation to the security of computer systems or computer networks
Handling Incidents involves three basic functions: incident reporting, incident
analysis, and incident response
Incident reporting is the process of reporting the information regarding the
encountered security breach in a proper format
CSIRT provides rapid response to maintain the security and integrity of the
systems
Without management approval and support creating an effective incident
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Without management approval and support, creating an effective incident
response capability can be difficult and problematic
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

What's hot

Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
Andy Thompson
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3)
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
Nada G.Youssef
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASPMarco Morana
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
Albert Hui
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
Sylvain Martinez
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
InfosecTrain
 

What's hot (20)

Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
 

Viewers also liked

Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
Dhruv Seth
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Kabul Education University
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements
Sonali Parab
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
OWASP Khartoum
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
computer forensics
computer forensicscomputer forensics
computer forensics
Vaibhav Tapse
 
The Value of Project Risk Management
The Value of Project Risk ManagementThe Value of Project Risk Management
The Value of Project Risk Management
PMA Consultants
 
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnovComputer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Incident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEOIncident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEO
Paul Dutot IEng MIET MBCS CITP OSCP CSTM
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Anton Chuvakin
 
Incident Response
Incident ResponseIncident Response
Incident Response
primeteacher32
 
ICS Review & Response
ICS Review & ResponseICS Review & Response
ICS Review & Response
dwoodwoody
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
udemy course
 
Reading and Writing Files
Reading and Writing FilesReading and Writing Files
Reading and Writing Files
primeteacher32
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
Vi Tính Hoàng Nam
 

Viewers also liked (20)

Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
The Value of Project Risk Management
The Value of Project Risk ManagementThe Value of Project Risk Management
The Value of Project Risk Management
 
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnovComputer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
 
Incident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEOIncident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEO
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
ICS Review & Response
ICS Review & ResponseICS Review & Response
ICS Review & Response
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
Reading and Writing Files
Reading and Writing FilesReading and Writing Files
Reading and Writing Files
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 

Similar to Ce hv6 module 57 computer forensics and incident handling

Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
Ambuj Kumar
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
CHFI.pdf
CHFI.pdfCHFI.pdf
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
Vi Tính Hoàng Nam
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
aratibhavsar
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
Mustapha Mugisa
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
carlibradley31429
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 

Similar to Ce hv6 module 57 computer forensics and incident handling (20)

File000114
File000114File000114
File000114
 
File000166
File000166File000166
File000166
 
File000146
File000146File000146
File000146
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CHFI.pdf
CHFI.pdfCHFI.pdf
CHFI.pdf
 
File000119
File000119File000119
File000119
 
File000154
File000154File000154
File000154
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 

More from Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
Vi Tính Hoàng Nam
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
Vi Tính Hoàng Nam
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
Vi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
Vi Tính Hoàng Nam
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
Vi Tính Hoàng Nam
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
Vi Tính Hoàng Nam
 
Qtx 6404
Qtx 6404Qtx 6404
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
Vi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
Vi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
Vi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
Vi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
Vi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
Vi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
Vi Tính Hoàng Nam
 

More from Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Ce hv6 module 57 computer forensics and incident handling

  • 1. Ethical Hacking and CountermeasuresCountermeasures Version 6 Module LVII Computer Forensics and Incident Handlingg
  • 2. Scenario OrientRecruitmentInc is an online human resource recruitment firm. The web server of the firm is a critical link. Neo, the network administrator sees some unusual activity that is targeted towards the web server. The web server is overloaded witha ge ed o a ds e eb se e e eb se e s o e oaded connection requests from huge number of different sources. Before he could realize the potential of the attack, the website of O i tR it tI f ll t th h f D i l fOrientRecruitmentInc falls prey to the much famous Denial of Service Attack. The company management calls up the local Incident Response Team to look into the matter and solve the DoS issue. What steps will the incident response team take to investigate the attack? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited attack?
  • 3. Module Objective This module will familiarize you with: • Computer Forensics • What is an Incident This module will familiarize you with: • What is an Incident • Categories of Incidents • Incident Response Checklist • Procedure for Handling Incidentg • Incident Management • Incident Reporting • What is CSIRT • Types of Incidents and Level of Support • Incident Specific Procedures • Best Practices for Creating a CSIRT W ld CERT EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • World CERTs
  • 4. Module Flow Computer Forensics Incident Reporting What is CSIRTWhat is an Incident Categories of Incidents Types of Incidents and Level of Support Incident Response Checklist Incident Specific Procedures Best Practices for Creating a CSIRT Procedure for Handling Incident EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited World CERTsIncident Management
  • 5. To Know More AboutTo Know More About Computer Forensics, A d EC C il’ CHFIAttend EC-Council’s CHFI ProgramProgram EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. C t F iComputer Forensics EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. What is Computer Forensics “The preservation, identification, extraction, interpretation, and documentation of computer evidence to include the rules of evidencedocumentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.” "Forensic Computing is the science of capturing, processing and investigating data from computers using a methodology whereby anyinvestigating data from computers using a methodology whereby any evidence discovered is acceptable in a Court of Law.” EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. Need for Computer Forensics “Computer forensics is equivalent of surveying a crime scene or performing an autopsy on a victim”p y {Source: James Borek 2001} Presence of a majority of electronic documentsPresence of a majority of electronic documents Search and identify data in a computerSearch and identify data in a computer Digital Evidence can be easily destroyed if not handled properlyDigital Evidence can be easily destroyed, if not handled properly For recovering Deleted Encrypted or Corrupted files from a system EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited For recovering Deleted, Encrypted, or Corrupted files from a system
  • 9. Objectives of Computer Forensics To recover, analyze and present computer-To recover, analyze and present computer based material in such a way that it can be presented as evidence in a court of law To identify the evidence in short time, estimate potential impact of the malicious activity on the victim, and assess the intent and identity ofy the perpetrator EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. Stages of Forensic Investigation in Tracking Cyber CriminalsTracking Cyber Criminals An Incident occurs in Whi h h C ’ The Client contacts the C ’ Ad The Advocate contracts E l F iWhich, the Company’s Server is compromised Company’s Advocate for Legal Advice an External Forensic Investigator The Forensic Investigator Prepares First Response of Procedures (FRP) The FI seizes the evidences in the Crime scene & transports them to the Forensics Lab The Forensic Investigator (FI) prepares the Bit-Stream images of the files The Forensic Investigator creates an MD5 # of the files The Forensic Investigator examines the evidence files for proof of a Crime The FI prepares Investigation reports and concludes the Investigation, enables the Advocate identify required proofsdvocate de t y equ ed p oo s The FI handles the sensitive Report to the The Advocate studies the report and might press charges The Forensic Investigator usually destroys EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited sensitive Report to the Client in a secure manner against the offensive in the Court of Law usually destroys all the evidences
  • 11. Key Steps in Forensic InvestigationsInvestigations 1 • Computer crime is suspected 2 • Collect preliminary evidence 3 • Obtain court warrant for seizure (if required) 4 • Perform first responder procedures 4 p p 5 • Seize evidence at the crime scene 6 • Transport them to the forensic laboratory EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 7 • Create 2 bit stream copies of the evidence
  • 12. Key Steps in Forensic Investigations (cont’d)Investigations (cont d) 8 • Generate MD5 checksum on the images 9 • Prepare chain of custody 10 • Store the original evidence in a secure location 11 • Analyze the image copy for evidence 12 • Prepare a forensic report 13 • Submit the report to the client 14 • If required, attend the court and testify as expert witness EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 14
  • 13. List of Computer Forensics Tools Process ExplorerHelix Autoruns Irfan View Pslist Fport Adapterwatch Necrosoft Dig Psloggedon RegScanner Visual TimeAnalyzer Evidor X-Ways Forensics Traces Viewer Ontrack Forensic Sorter Sleuth Kit SMART EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Directory SnoopPenguin Sleuth Kit
  • 14. I id H dliIncident Handling EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Present Networking Scenario Increase in the number of companies venturing into e-business l d ith hi h I t tcoupled with high Internet usage Decrease in vendor product development cycle and product i ltesting cycle Increase in the complexity of Internet as a networkIncrease in the complexity of Internet as a network Alarming increase in intruder activities and tools, expertise ofg , p hackers, and sophistication of hacks Lack of thoroughly trained professionals as compared to the EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Lack of thoroughly trained professionals as compared to the number and intensity of security breaches
  • 16. What is an Incident Computer security incident is defined as “Any real or suspected adverse event in relation to the security of computer systems or computerevent in relation to the security of computer systems or computer networks” • Source: www.cert.org It also includes external threats such as gaining access to systems, disrupting their services through malicious spamming, execution of malicious codes that destroy or corrupt systemsmalicious codes that destroy or corrupt systems EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Category of Incidents: Low Level Low level incidents are the least severe kind of incidentsLow level incidents are the least severe kind of incidents They should be handled within one working day after the event occursThey should be handled within one working day after the event occurs They can be identified when there is: Loss of personal password Suspected sharing of organization’s accountsSuspected sharing of organization s accounts Unsuccessful scans and probes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Presence of any computer virus or worms
  • 18. Category of Incidents: Mid Level h i id hi l l i l i d h h ld bThe incidents at this level are comparatively more serious and thus, should be handled the same day the event occurs • Violation of special access to a computer or computing They can be identified by observing: Violation of special access to a computer or computing facility • Unfriendly employee termination • Unauthorized storing and processing data • Destruction of property related to a computer incident (lessp p y p ( than $100,000) • Personal theft of data related to computer incident($100,000) • Computer virus or worms of comparatively larger intensity Ill l t b ildi EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Illegal access to buildings
  • 19. Category of Incidents: High Level These are the most serious incidents and are considered as “Major” in nature High level incidents should be handled immediately after the incident occurs These include: • Denial of Service attacks • Suspected computer break-in • Computer virus or worms of highest intensity; e.g. Trojan back doorback door • Changes to system hardware, firmware, or software without authentication • Destruction of property exceeding $100,000 • Personal theft exceeding $100,000 and illegal electronic EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g g fund transfer or download/sale • Any kind of pornography, gambling, or violation of any law
  • 20. How to Identify an Incident A system alarm from an intrusion detection tool indicating security breach Suspicious entries in a network Accounting gaps of several minutes with no accounting log Other events like unsuccessful login attempts, unexplained new user or files, attempts to write s stem files modification or deleting of datasystem files, modification, or deleting of data Unusual usage patterns, such as programs being compiled in the account of users who are non-programmers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. How to Prevent an Incident A key to preventing security incidents is to eliminate as many vulnerabilities iblas possible Intrusions can be prevented by:Intrusions can be prevented by: • Scanning the network/system for security loopholes • Auditing the network/system • Deploying Intrusion Detection/Prevention Systems on the network/system • Establishing Defense-in-Depth • Securing Clients for Remote Users EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Defining the Relationship between Incident Response, Incident Handling, and Incident ManagementManagement EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Incident Response Checklist Potential Incident Verified Contact department/agency security staff • I.T. Manager - • [designee/others by department procedure] -[ g / y p p ] Security designee will contact CSIRT member • Call 802-250-0525 (GOVnet Beeper) • GOVnet will then contact CSIRT members (csirt@.state.vt.us)( @ ) • If no response within ten minutes call the Office of the CIO Isolate system(s) from GOVnet [unless CSIRT decision is to leave the system connected to monitor active hacker] Begin a log book - who/ what / when / where Identify the type of Incident - Virus, worm, and hacker EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Preliminary estimation of extent of problem, number of systems
  • 24. Incident Response Checklist (cont’d)(cont d) Contact local police authority with jurisdiction at location of incident (This MUST BE coordinated with CSIRT) Follow server/operating system specific procedures to snapshot the system Inoculate/restore the systemInoculate/restore the system Close the vulnerability and ensure that all patches have been installed Return to normal operations Prepare report and conduct follow-up analysis Revise prevention and screening procedures EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Remember to log all actions!
  • 25. Handling Incidents Incident handling helps to find out trends and patterns regarding intruder activity by analyzing itintruder activity by analyzing it It involves three basic functions: • Incident reporting, • Incident analysis, and • Incident response It recommends network administrators for recovery, containment, and prevention to constituents It ll i id t t t b th d i l ti th t tIt allows incident reports to be gathered in one location so that exact trends and pattern can be recognized and recommended strategies can be employed I h l h di ff d d h f EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It helps the corresponding staffs to understand the process of responding and to tackle unexpected threats and security breaches
  • 26. Procedure for Handling Incident The incident handling process is divided into six stages These stages are: • Preparation • Identification • Containment E di ti• Eradication • Recovery • Follow-up EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. Stage 1: Preparation Preparation enables easy coordination among staffp y g Create a policy Develop preventive measures to deal with threats Obtain resources required to deal with incidents effectively Develop infrastructure to respond and supportDevelop infrastructure to respond and support activities related to incident response Select team members and provide training EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Select team members and provide training
  • 28. Stage 2: Identification Identification involves validating, identifying, and reporting the incidentreporting the incident Determining the symptoms given in ‘how to identify an incident’ Identifying the nature of the incident Identifying events Protecting evidence EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Reporting events
  • 29. Stage 3: Containment Containment limits the extent and intensity of an incidentContainment limits the extent and intensity of an incident It avoids logging as root on the compromised systemIt avoids logging as root on the compromised system Avoid conventional methods to trace back as this may alert the kattackers Perform the backup on the system to maintain the current state of the system for facilitating the post-mortem and forensicthe system for facilitating the post-mortem and forensic investigation later Change the system passwords to prevent the possibility of EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g y p p p y Spywares being installed
  • 30. Stage 4: Eradication Investigate further to uncover the cause of the incident by analyzing system logs of various devices such as firewall, router, and host logs Improve defenses on target host such as: • Reloading of a new operating systemReloading of a new operating system • Enabling firewalls • Assigning new IP address Install all the latest patchesInstall all the latest patches Disable any unnecessary services Install anti-virus software EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Apply the Company’s security policy to the system
  • 31. Stage 5: Recovery Determine the course of actionsDetermine the course of actions Monitor and validate systemsy Determine integrity of the backup itself by making an attempt to read its dataattempt to read its data Verify success of operation and normal condition of system Monitor the system by network loggers, system log files, and potential back doors EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited potential back doors
  • 32. Stage 6: Follow-up Post-mortem analysis: • Perform a detailed investigation of the incident to identify the extent of the incident and potential impact prevention mechanisms Revise policies and procedures from the lessons learned from the past Determine the staff time required and f th f ll i t l i • Extent to which the incidents disrupted the organization • Data lost and its value perform the following cost analysis: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Damaged hardware and its cost
  • 33. Stage 6: Follow-up (cont’d) Document the response to incident by finding answers to the following: Was the preparation for the incident sufficient? Whether the detection occurred promptly or not, and why? Using additional tools could have helped or not?Using additional tools could have helped or not? Was the incident contained? What practical difficulties were encountered? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Was it communicated properly?
  • 34. Incident Management Incident management is not just responding to an incident when it happens but includes proactive activities that help prevent incidents by providing guidanceincludes proactive activities that help prevent incidents by providing guidance against potential risks and threats Includes the development of a plan of action, a set of processes that are consistent,p p , p , repeatable, of high quality, measurable, and understood within the constituency Who performs Incident Management? Human resource personnel Legal council The firewall manager EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited An outsourced service provider
  • 35. Incident Management (cont’d) Figure : Five High-Level Incident Management Processesg g g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: www.cert.org/archive/pdf/04tr015.pdf
  • 36. Why don’t Organizations Report Computer CrimesComputer Crimes Misunderstanding the scope of the problem • This does not happen to other organizations Proactive reporting and handling of the incident will allow many organizations to put their spin on the media reports Potential loss of customers Desire to handle things internally EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Lack of awareness of the attack
  • 37. Estimating Cost of an Incident Tangible: Can be quantified • Lost productivity hours • Investigation and recovery efforts L f b i g q • Loss of business • Loss or theft of resources Intangible: More difficult to identify and • Damage to corporate reputation • Loss of goodwill Intangible: More difficult to identify and quantify Loss of goodwill • Psychological damage • Those directly impacted may feel victimized • May impact morale or initiate fear • Legal liability EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Legal liability • Effect on shareholder value
  • 38. Whom to Report an Incident Incident reporting is the process of reporting the information regardingp g p p g g g the encountered security breach in a proper format The incident should be reported to the CERT Coordination center, site security manager, or other sites It can also be reported to law enforcement agencies such as FBI,USSS Electronic crimes branch, or Department of Defense Contractors It should be reported to receive technical assistance and to raise security awareness to minimize the losses EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Incident Reporting When a user encounters any breach, report the following: Intensity the security breach Circumstances, which revealed the vulnerability Sh t i i th d i d i t l l f kShortcomings in the design and impact or level of weakness Entry logs related to intruder’s activity Specific help needed should be clearly defined EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Correct time-zone of the region and synchronization information of the system with a National time server via NTP
  • 40. Vulnerability Resources US-CERT Vulnerability Notes Database: • Descriptions of these vulnerabilities are available from this web page in a searchable database format, and are published as "US-CERT Vulnerability Notes". • Integrates all publicly available U.S. Government vulnerability resources and provides references to industry resources NVD (National Vulnerability Database): • List or dictionary of publicly known information security vulnerabilities and l d f f bl CVE (Common Vulnerabilities and Exposures List): exposures international in scope and free for public use OVAL (Open Vulnerability Assessment Language): EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • A three-leveled vulnerability handling method consisting of a characteristics schema for collecting configuration data from systems for testing
  • 41. What is CSIRT Computer Security Incident Response Team (CSIRT):p y p ( ) Incident Response Services 24x7 CSIRT provides 24x7 Computer Security Incident Response Services to any user, company, government agency or organization CSIRT provides a reliable and trusted single point of contact for reporting computer security incidents worldwidesecurity incidents worldwide CSIRT provides the means for reporting i id d f di i i i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited incidents and for disseminating important incident-related information
  • 42. CSIRT: Goals and Strategy CSIRT’s goals: • To organize the management of security problems by taking a proactive approach to our customers’ security vulnerabilities and by responding effectively to potential information security i id t CS s goa s: incidents • To minimize and control the damage • To provide or assist with effective response and recovery • To help prevent future events • It provides a single point of contact for reporting local Strategy of CSIRT: t p o des a s g e po t o co tact o epo t g oca problems • It identifies and analyzes what has happened including the impact and threat • It researches solutions and mitigation strategies EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g g • It shares response options, information, and lessons learned
  • 43. Why an Organization needs an Incident Response TeamIncident Response Team Incident Response T h l It i f li d t A d h t itTeam helps organizations to recover from computer security b h d h It is a formalized team that performs incident response work as its major job function As an ad-hoc team, it is responsible for ongoing computer security incident breaches and threats EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. CSIRT Case Classification Incident Categories: All incidents managed by the CSIRT should be classified into one of the categories listed in the table below EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly ProhibitedSource: http://www.first.org/resources/guides/csirt_case_classification.html
  • 45. Types of Incidents and Level of Support The Computer Security Incident Response Team will assign resources according to the following priorities, listed in the Support • Threats to the physical safety of human beings • Root or system-level attacks on any machine either multi-user or dedicated- resources according to the following priorities, listed in the decreasing order: y y purpose • Compromise restricted confidential service accounts or software installations, in particular those with authorized access to confidential data • Denial of service attacks on any of the above two itemse a o se v ce attac s o a y o t e above t o te s • Large-scale attacks of any kind, e.g. sniffing attacks, IRC "social engineering" attacks, password cracking attacks, and destructive virus outbursts • Compromise of individual user accounts, i.e. unauthorized access to a user or service accountservice account • Forgery and misrepresentation, and other security-related violations of local rules and regulations, e.g. Netnews and e-mail forgery, unauthorized use of IRC bots • Types of incidents other than those mentioned above will be prioritized EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Types of incidents other than those mentioned above will be prioritized according to their apparent severity and extent
  • 46. Incident Specific Procedures-I (Virus and Worm Incidents)(Virus and Worm Incidents) Step 1: Isolate the system Step 2: Notify appropriate people Step 3: Identify the problem Step 4: Include the virus or worm Step 5: Inoculate the system(s) Step 6: Return to a normal operating mode Step 7: Follow up analysis EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p 7 p y Log all actions in every phase*
  • 47. Incident Specific Procedures-II (Hacker Incidents)(Hacker Incidents) (A) Attempted Probes into a State of Vermont System • Step 1: Identify the problem • Step 2: Notify appropriate people • Step 3: Identify the Hacker • Step 4: Notify CERT • Step 5: Follow up analysis• Step 5: Follow up analysis • Step 1: Notify Appropriate People (B) Active Hacker Activity p y pp p p • Option 1: Removal of Hacker from the system • Step 2: Snap-shot the System • Step 3: Lock out the Hacker • Step 4: Restore the System • Step 5: Notify other Agencies• Step 5: Notify other Agencies • Step 6: Follow up Analysis • Option 2: Monitoring of Hacker Activity (C) Evidence of Past Incidents EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited (C) Evidence of Past Incidents Log all actions in every phase*
  • 48. Incident Specific Procedures-III (Social Incidents, Physical Incidents)(Social Incidents, Physical Incidents) Social Incidents: • Step 1: Identify Potential Risk • Log all actions* • Step 2: Notify Appropriate People Physical Incidents: • Step 2: Notify Appropriate People • Log all actions* EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. How CSIRT Handles Case: Steps KEEP A LOG BOOK INFORM THE APPROPRIATE PEOPLE MAINTAIN LIST OF CONTACTS RELEASE THE INFORMATION O FOLLOW UP ANALYSIS EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited REPORT
  • 50. Example of CSIRT Internal CSIRT provides services to their parent organization such as bank, manufacturing company, university, or any government agencies National CSIRT provides services to the entire nation example being Japan Computer Emergency Response Team Coordination CenterJapan Computer Emergency Response Team Coordination Center (JPCERT/CC) Analysis Centers synthesize data, determine trends, and patterns in an incident activity to predict future activity or provide early warnings Vendor teams identify vulnerabilities in software and hardware productsVendor teams identify vulnerabilities in software and hardware products Incidents Response Providers offer services to paid clients EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Incidents Response Providers offer services to paid clients
  • 51. Best Practices for Creating a CSIRTCSIRT 1 • Obtain management support and buy-in 1 2 • Determine the CSIRT strategic plan 3 • Gather relevant information 4 • Design the CSIRT vision 4 5 • Communicate the CSIRT vision and operational plan 6 • Begin CSIRT implementation 7 • Announce the operational CSIRT EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 7
  • 52. Step 1: Obtain Management Support and Buy-inSupport and Buy in Without management approval and support, creating an effective incident response capability can be extremely difficult and problematic Once the team is established, how is it maintained and d d ith b d t l d q i t ?expanded with budget, personnel, and equipment resources? Will the role and authority of the CSIRT continue to be backed by management across the various constituencies or parent organization? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Step 2: Determine the CSIRT Development Strategic PlanDevelopment Strategic Plan Are there specific timeframes to be met? Are they realistic, and ifp y , not, can they be changed? Is there a project group? Where do the group members come from? How do you let the organization know about the development of the CSIRT? If you have a project team, how do you record and communicate the information you are collecting, especially if the team is hi ll di d? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited geographically dispersed?
  • 54. Step 3: Gather Relevant InformationInformation Meet with key stakeholders to discuss the expectations, strategic direction, definitions, and responsibilities of the CSIRT i The stakeholders could include: • Business managers • Representatives from IT • Representatives from the legal department • Representatives from human resourcesRepresentatives from human resources • Representatives from public relations • Any existing security groups, including physical security • Audit and risk management specialists EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 55. Step 4: Design your CSIRT VisionVision In creating your vision you should: • Identify your constituency: Who does the CSIRT support and service? • Define your CSIRT mission, goals, and objectives: What does the CSIRT do In creating your vision, you should: y , g , j for the identified constituency? • Select the CSIRT services to provide to the constituency (or others): How does the CSIRT support its mission? • Determine the organizational model: How is the CSIRT structured andg organized? • Identify required resources: What staff, equipment, and infrastructure is needed to operate the CSIRT? • Determine your CSIRT funding: How is the CSIRT funded for its initialDetermine your CSIRT funding: How is the CSIRT funded for its initial startup and its long-term maintenance and growth? EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. Step 5: Communicate the CSIRT VisionVision Communicate the CSIRT visionCommunicate the CSIRT vision and operational plan to management, constituency, and others who need to know and understand its operations As appropriate, make adjustments to the plan based on their feedback understand its operations EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 57. Step 6: Begin CSIRT ImplementationImplementation Hire and train initial CSIRT staffHire and train initial CSIRT staff Buy equipment and build any necessary network infrastructure to supporty q p y y pp the team Develop the initial set of CSIRT policies and procedures to support yourDevelop the initial set of CSIRT policies and procedures to support your services D fi h ifi i f d b ild i id kiDefine the specifications for and build your incident-tracking system EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Develop incident-reporting guidelines and forms for your constituency
  • 58. Step 7: Announce the CSIRT When the CSIRT is operational, announce it to the constituency or parent organization It is best if this announcement comes from sponsoring management Include the contact information and hours of operation for the CSIRT in the announcement This is an excellent time to make the CSIRT incident-reporting guidelines available EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 59. World CERTs http://www.trusted-introducer.nl/teams/country.htmlhttp://www.trusted introducer.nl/teams/country.html Asia Pacific CERTs • Australia CERT (AUSCERT) • Hong Kong CERT (HKCERT/CC) • Indonesian CSIRT (ID-CERT) • Japan CERT-CC (JPCERT/CC)p / • Korea CERT (CERT-KR) • Malaysia CERT (MyCERT) • Pakistan CERT(PakCERT) • Singapore CERT (SingCERT) • Taiwan CERT (TWCERT)• Taiwan CERT (TWCERT) • China CERT (CNCERT/CC) North American CERTs • CERT-CC • US-CERT • Canadian Cert • Cancert EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Cancert • Forum of Incident Response and Security Teams • FIRST
  • 60. World CERTs (cont’d) South American CERTs • CAIS • CAIS- Brazilian Research Network CSIRT • NIC BR Security Office Brazilian CERTy • NBS European CERTs • EuroCERT • FUNET CERT • CERTA • DFN-CERT • JANET-CERT • CERT-NL • UNINETT-CERT EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • CERT-NASK • Swiss Academic and Research Network CERT
  • 61. http://www.first.org/about/organization/ teams// EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 62. http://www.apcert.org/about/structure/me mbers.html EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 63. IRTs Around the World f / EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Courtesy of CERT/CC ©Carnegie Mellon University 2003
  • 64. Summary Increase in the number of products and relative increase in the number of hacking tools has put security in the spotlighthacking tools has put security in the spotlight Computer security incident is defined as any real or suspected adverse event in relation to the security of computer systems or computer networks Handling Incidents involves three basic functions: incident reporting, incident analysis, and incident response Incident reporting is the process of reporting the information regarding the encountered security breach in a proper format CSIRT provides rapid response to maintain the security and integrity of the systems Without management approval and support creating an effective incident EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Without management approval and support, creating an effective incident response capability can be difficult and problematic
  • 65. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 66. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited