SlideShare a Scribd company logo
Cyber Incident Response Proposed Strategies
Presented by:
Kemar Williams
Information Security Incident Response Management
University of Technology, Jamaica
September 23, 2017
www.opensecurityalliance.orgRGIT, Mumbai 02/24
IRP - Strategies
 IR Preparation
 Identify Attack Vectors
 How is the Attack Deployed
 Detection Strategies
 Analysis Strategies
 Prevention Strategies
 Email
 Network
 End User
 Recovery & Review
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Incident Preparation
 Organize IR Operation Centre.
 Have end users and IR team members trained in responding to a ransomware.
 Prepare incident response contact list.
 Provide backup storage
 Provide supplies in the event od an incident:
 Notebooks & pens
 Laptops, Multifunction Printer, backup UPS and batteries
 Provide Software to:
• Perform Computer Analysis (anti-virus, anti-malware etc.)
• Recover data from infected hard drives.
• Recover password for locked computers
 Equip IR operation center with rations and petty cash
 Provide law enforcement contact numbers
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Identifying The Attack Vectors
Fig. 1 Attack Vectors
How is The Attack Deployed
• Comes as an
email
attachment
• Often very
generic but
could include a
real vendor
name or even
your company
name.
• Once open,
ransomware
silently begins
encrypting all
the files it can
without any user
interaction or
notification
• Locks the user
screen
displaying a
ransom
notification with
an expiry date
• Payment is
usually in
bitcoins
• Paying ransom
increase risk of
future attacks
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Detection Strategies
Detection:
 Setup a file activity monitoring application such as LANGuardian to:
 Detect both a real time and historical record of all file and folder activity the
network file shares.
 Monitor increase in file renames - When Ransomware strikes, it will result in
a massive increase in file renames as your data gets encrypted.
 Update Intrusion Detection System systems with exploit kit detection rules
 Create a sacrificial network share Drive
 When Ransomware strikes, it typically looks for local files first and then
moves onto network share drives.
 A sacrificial network share can act as an early warning system and also
delay the Ransomware from getting to your critical data
 Use client based anti-ransomware agents
Analysis and Documentation Strategies
After the detection of a ransomware infection the next step is the gathering information on
the incident by analyzing the scope of the attack. Depending on the type of ransomware
variant the following will be conducted:
 Disconnect and Quarantine infected computer(s)
 Determine the Scope of the Infection, Check the Following for Signs of Encryption
a. Mapped or shared drives
b. Mapped or shared folders from other computers
c. Network storage devices of any kind
d. External Hard Drives
e. USB storage devices of any kind (USB sticks, memory sticks, attached
phones/cameras)
f. Cloud-based storage: Drobox, Google Drive, OneDrive etc.
 Determine Ransomware Strain
a. What strain/type of ransomware? For example: CryptoWall, Teslacrypt etc.
 Determine Response
a. Now that you know the scope of your encrypted files as well as the strain of
ransomware you are dealing with, you can make a more informed decision as to
what your next action will be.
www.opensecurityalliance.orgRGIT, Mumbai 02/24
Analysis and Documentation Strategies – Cont’d
.
Emron Technologies Inc. Incident Reporting Form
LOCATION: NAME OF DEPT./DIVISION:
Employee Name: Ext No: E-MAIL ADDRESS:
Date of Incident: Time of Incident:
Who Notified: Time of Notification:
Brief Description of Incident:
No. Of Host Infected: ____________
Host IP Address: ____________
Operating system: ____________
Impact Level:
Severe
7
6
Major
5
4
3
Minor
2
1
Negligible 0
Reporting Staff Name: _________________ Signature: ___________________ Date: ______________
CISO Name: ________________ Signature: ___________________ Date: ______________
Prevention Strategies
Prevention – Email:
 Enable strong spam filters to prevent phishing emails from reaching the end
users and authenticate inbound email using
 Scan all incoming and outgoing emails to detect threats and filter executable files
from reaching end users.
 Scan and filter all downloads
Prevention Strategies – Cont’d
Prevention – Network:
 Segment the Network by creating VLANS
 This will contain the ransomware infection and slow down its propagation.
 Configure firewall to block access to known malicious IP addresses
 Patch operating systems, application software, and update firmware on network
devices. Consider using a centralized patch management system.
 Configure enterprise security suite to perform daily scans of the network and
endpoints automatically.
 Virtualize servers
 Maintain offsite backup of crucial key servers and data.
Prevention Strategies – Cont’d
Prevention – Network: Sacrificial Network
Prevention Strategies – Cont’d
Prevention – End User:
 Install anti-virus/antimalware software
 Recommend the use of google chrome instead of internet explorer.
 Disabling execution of scripts running in the browser
 Download and install Microsoft windows/security updates.
 Disable the use of thumb drives
Recovery and Review
Restore from backup (if possible)
 Now that you’ve contained the infection and put the rest of your users on guard, the
best way to fix your user’s computer without paying the ransom is to restore it from
your backup. Before you wipe the computer, however, make sure your backup is up-
to-date and that you have a good copy of that data. You don’t want to hit the nuke
button and realize your last backup was two months ago.
Training:
 Conduct training or existing and new employees to raise awareness of the risks of
ransomware attack vectors. Remind employees never to click on unsolicited links or
attachments. Emails from unknown sources should be treated with suspicion.
THE END

More Related Content

What's hot

edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
ANJUMOHANANU
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
AlienVault
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
Central University Of Kashmir
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
Luigi Delgrosso
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
BeyondTrust
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
shusrusha
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809Todd Deshane
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and PatchingEmmanuel Udeagha B.
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
Information Technology
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
antoniomorancardenas
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Jowin John Chemban
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
Trinity Dwarka
 

What's hot (19)

edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 

Similar to Cyber Incident Response Proposed Strategies

ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
Brian Honan
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
Lumension
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
How To Prevent Ransomware
How To Prevent RansomwareHow To Prevent Ransomware
How To Prevent Ransomware
RansomwareEditor
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
Metaorange
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
anandanand521251
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
Metaorange
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
Bret Piatt
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
Vivek Chauhan
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09technext1
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From MalwareRishu Mehra
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Katherine Duffy
 

Similar to Cyber Incident Response Proposed Strategies (20)

ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
How To Prevent Ransomware
How To Prevent RansomwareHow To Prevent Ransomware
How To Prevent Ransomware
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 

More from Dam Frank

Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?
Dam Frank
 
Lesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and PhariseesLesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and Pharisees
Dam Frank
 
Lesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of ChristLesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of Christ
Dam Frank
 
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ HistoricityLesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
Dam Frank
 
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ HistoricityLesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
Dam Frank
 
Lesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ HistoricityLesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ Historicity
Dam Frank
 
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ HistoricityLesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
Dam Frank
 
What is Sin?
What is Sin?What is Sin?
What is Sin?
Dam Frank
 
The Son of God - Part 6 Redemption
The Son of God - Part 6 RedemptionThe Son of God - Part 6 Redemption
The Son of God - Part 6 Redemption
Dam Frank
 
The Son of God - Part 6 Substitution
The Son of God - Part 6 SubstitutionThe Son of God - Part 6 Substitution
The Son of God - Part 6 Substitution
Dam Frank
 
The Son of God - Part 6 Propitiation
The Son of God - Part 6 PropitiationThe Son of God - Part 6 Propitiation
The Son of God - Part 6 Propitiation
Dam Frank
 
The Son of God - Part 5
The Son of God - Part 5The Son of God - Part 5
The Son of God - Part 5
Dam Frank
 
The Son of God - Part 6
The Son of God - Part 6The Son of God - Part 6
The Son of God - Part 6
Dam Frank
 
The Son of God - Part 4
The Son of God - Part 4The Son of God - Part 4
The Son of God - Part 4
Dam Frank
 
The Son of God - Part 3
The Son of God -  Part 3The Son of God -  Part 3
The Son of God - Part 3
Dam Frank
 
Jesus is God: Defending the Claim
Jesus is God: Defending the Claim Jesus is God: Defending the Claim
Jesus is God: Defending the Claim
Dam Frank
 
Messianic Prophecies Quiz
Messianic Prophecies QuizMessianic Prophecies Quiz
Messianic Prophecies Quiz
Dam Frank
 
Messianic Prophecies
Messianic Prophecies Messianic Prophecies
Messianic Prophecies
Dam Frank
 
The Progressive Revelation of the Name
The Progressive Revelation of the NameThe Progressive Revelation of the Name
The Progressive Revelation of the Name
Dam Frank
 
The Nature of God
The Nature of GodThe Nature of God
The Nature of God
Dam Frank
 

More from Dam Frank (20)

Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?Is online education an effective replacement for traditional classroom teaching?
Is online education an effective replacement for traditional classroom teaching?
 
Lesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and PhariseesLesson 7: The Seven Woes Against the Scribes and Pharisees
Lesson 7: The Seven Woes Against the Scribes and Pharisees
 
Lesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of ChristLesson 6 : Jewish Sects at the Time of Christ
Lesson 6 : Jewish Sects at the Time of Christ
 
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ HistoricityLesson 5: Non Biblical Sources of Jesus Christ Historicity
Lesson 5: Non Biblical Sources of Jesus Christ Historicity
 
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ HistoricityLesson 4 : Non Biblical Sources of Jesus Christ Historicity
Lesson 4 : Non Biblical Sources of Jesus Christ Historicity
 
Lesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ HistoricityLesson 3: Non Biblical Sources of Christ Historicity
Lesson 3: Non Biblical Sources of Christ Historicity
 
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ HistoricityLesson 2: Non Biblical Sources of Jesus Christ Historicity
Lesson 2: Non Biblical Sources of Jesus Christ Historicity
 
What is Sin?
What is Sin?What is Sin?
What is Sin?
 
The Son of God - Part 6 Redemption
The Son of God - Part 6 RedemptionThe Son of God - Part 6 Redemption
The Son of God - Part 6 Redemption
 
The Son of God - Part 6 Substitution
The Son of God - Part 6 SubstitutionThe Son of God - Part 6 Substitution
The Son of God - Part 6 Substitution
 
The Son of God - Part 6 Propitiation
The Son of God - Part 6 PropitiationThe Son of God - Part 6 Propitiation
The Son of God - Part 6 Propitiation
 
The Son of God - Part 5
The Son of God - Part 5The Son of God - Part 5
The Son of God - Part 5
 
The Son of God - Part 6
The Son of God - Part 6The Son of God - Part 6
The Son of God - Part 6
 
The Son of God - Part 4
The Son of God - Part 4The Son of God - Part 4
The Son of God - Part 4
 
The Son of God - Part 3
The Son of God -  Part 3The Son of God -  Part 3
The Son of God - Part 3
 
Jesus is God: Defending the Claim
Jesus is God: Defending the Claim Jesus is God: Defending the Claim
Jesus is God: Defending the Claim
 
Messianic Prophecies Quiz
Messianic Prophecies QuizMessianic Prophecies Quiz
Messianic Prophecies Quiz
 
Messianic Prophecies
Messianic Prophecies Messianic Prophecies
Messianic Prophecies
 
The Progressive Revelation of the Name
The Progressive Revelation of the NameThe Progressive Revelation of the Name
The Progressive Revelation of the Name
 
The Nature of God
The Nature of GodThe Nature of God
The Nature of God
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 

Cyber Incident Response Proposed Strategies

  • 1. Cyber Incident Response Proposed Strategies Presented by: Kemar Williams Information Security Incident Response Management University of Technology, Jamaica September 23, 2017
  • 2. www.opensecurityalliance.orgRGIT, Mumbai 02/24 IRP - Strategies  IR Preparation  Identify Attack Vectors  How is the Attack Deployed  Detection Strategies  Analysis Strategies  Prevention Strategies  Email  Network  End User  Recovery & Review
  • 3. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Incident Preparation  Organize IR Operation Centre.  Have end users and IR team members trained in responding to a ransomware.  Prepare incident response contact list.  Provide backup storage  Provide supplies in the event od an incident:  Notebooks & pens  Laptops, Multifunction Printer, backup UPS and batteries  Provide Software to: • Perform Computer Analysis (anti-virus, anti-malware etc.) • Recover data from infected hard drives. • Recover password for locked computers  Equip IR operation center with rations and petty cash  Provide law enforcement contact numbers
  • 4. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Identifying The Attack Vectors Fig. 1 Attack Vectors
  • 5. How is The Attack Deployed • Comes as an email attachment • Often very generic but could include a real vendor name or even your company name. • Once open, ransomware silently begins encrypting all the files it can without any user interaction or notification • Locks the user screen displaying a ransom notification with an expiry date • Payment is usually in bitcoins • Paying ransom increase risk of future attacks
  • 6. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Detection Strategies Detection:  Setup a file activity monitoring application such as LANGuardian to:  Detect both a real time and historical record of all file and folder activity the network file shares.  Monitor increase in file renames - When Ransomware strikes, it will result in a massive increase in file renames as your data gets encrypted.  Update Intrusion Detection System systems with exploit kit detection rules  Create a sacrificial network share Drive  When Ransomware strikes, it typically looks for local files first and then moves onto network share drives.  A sacrificial network share can act as an early warning system and also delay the Ransomware from getting to your critical data  Use client based anti-ransomware agents
  • 7. Analysis and Documentation Strategies After the detection of a ransomware infection the next step is the gathering information on the incident by analyzing the scope of the attack. Depending on the type of ransomware variant the following will be conducted:  Disconnect and Quarantine infected computer(s)  Determine the Scope of the Infection, Check the Following for Signs of Encryption a. Mapped or shared drives b. Mapped or shared folders from other computers c. Network storage devices of any kind d. External Hard Drives e. USB storage devices of any kind (USB sticks, memory sticks, attached phones/cameras) f. Cloud-based storage: Drobox, Google Drive, OneDrive etc.  Determine Ransomware Strain a. What strain/type of ransomware? For example: CryptoWall, Teslacrypt etc.  Determine Response a. Now that you know the scope of your encrypted files as well as the strain of ransomware you are dealing with, you can make a more informed decision as to what your next action will be.
  • 8. www.opensecurityalliance.orgRGIT, Mumbai 02/24 Analysis and Documentation Strategies – Cont’d . Emron Technologies Inc. Incident Reporting Form LOCATION: NAME OF DEPT./DIVISION: Employee Name: Ext No: E-MAIL ADDRESS: Date of Incident: Time of Incident: Who Notified: Time of Notification: Brief Description of Incident: No. Of Host Infected: ____________ Host IP Address: ____________ Operating system: ____________ Impact Level: Severe 7 6 Major 5 4 3 Minor 2 1 Negligible 0 Reporting Staff Name: _________________ Signature: ___________________ Date: ______________ CISO Name: ________________ Signature: ___________________ Date: ______________
  • 9. Prevention Strategies Prevention – Email:  Enable strong spam filters to prevent phishing emails from reaching the end users and authenticate inbound email using  Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.  Scan and filter all downloads
  • 10. Prevention Strategies – Cont’d Prevention – Network:  Segment the Network by creating VLANS  This will contain the ransomware infection and slow down its propagation.  Configure firewall to block access to known malicious IP addresses  Patch operating systems, application software, and update firmware on network devices. Consider using a centralized patch management system.  Configure enterprise security suite to perform daily scans of the network and endpoints automatically.  Virtualize servers  Maintain offsite backup of crucial key servers and data.
  • 11. Prevention Strategies – Cont’d Prevention – Network: Sacrificial Network
  • 12. Prevention Strategies – Cont’d Prevention – End User:  Install anti-virus/antimalware software  Recommend the use of google chrome instead of internet explorer.  Disabling execution of scripts running in the browser  Download and install Microsoft windows/security updates.  Disable the use of thumb drives
  • 13. Recovery and Review Restore from backup (if possible)  Now that you’ve contained the infection and put the rest of your users on guard, the best way to fix your user’s computer without paying the ransom is to restore it from your backup. Before you wipe the computer, however, make sure your backup is up- to-date and that you have a good copy of that data. You don’t want to hit the nuke button and realize your last backup was two months ago. Training:  Conduct training or existing and new employees to raise awareness of the risks of ransomware attack vectors. Remind employees never to click on unsolicited links or attachments. Emails from unknown sources should be treated with suspicion.

Editor's Notes

  1. Many IDS, IPS and firewall systems come with exploit detection features. Exploit kits are used as a way to get Ransomware onto a client through malspam or via compromised websites. The two most common exploit kits (EK) associated with Ransomware are the Neutrino EK and the Angler EK.