SlideShare a Scribd company logo
1 of 25
Phil Huggins
February 2004
 The 2003 survey identified a combined total loss of
  $201,797,340 for 251 organisations
 This was lower than each of the previous 3 three
  years
 The average cost of a security incident is at it’s
  lowest for some time in 2003 at $47,107 down from
  a high of $80,000 dollars in 2002
 Based on organisations responses to the survey. No
  idea how those estimates were arrived at or what
  industries the loss reporting companies were in.
   At a basic level answering these questions is a good
    start:
     Who worked on responding to or investigating the
        incident?
       How many hours did each of them spend?
       How many people were prevented from working because
        of the incident?
       How much productive time did each of them lose?
       How much do you pay each of those people to work for
        you?
       How much overhead do you pay for your employees?
       Did you need to purchase new or replacement equipment?
   More complicated and difficult questions include:
     What business opportunities did you lose?
     How much revenue did you lose as a direct result of the
      incident?
     How much damage was done to your reputation?
   While these shouldn’t be ignored it is probably more
    useful to get a good measure of the simple costs for
    immediate management purposes
 Established by a group of large universities in the
  90’s
 First used in 1998 at the University of Washington in
  New Zealand
 “The largest security incident in new Zealand
  history” where 18 servers at the university were
  compromised
 They estimated the average cost per compromised
  host of the incident was approximately $1,544
   Individual cost per hour
     Wage divided by 52 Weeks = Weekly Cost
     Weekly cost divided by 40 hours = hourly cost
     Benefit rate of 28% added (Average of the
     universities involved
   Incidental Expenses
     Hardware Stolen / Damaged
     Phone Bills
     etc
 http://project.honeynet.org/challenge/
 The Forensic Challenge is an opportunity for
  incident responders to compete using copies of
  compromised systems to see who can find the most
  useful information
 Using I-CAMP they estimated that the average cost
  of the forensic analyses in the challenge was
  $2,067.46 +/- $810.12
 Using a consulting rate of $300 an hour they
  estimate $22,620 +/- $393
   Incident Response is likely to cost
    approximately $1,544 a system at university
    pay scales
   Forensic Analysis of a compromised system is
    likely to cost about $22,620
   These are both manpower intensive, costly
    activities
   Need to plug our own figures into these to
    get a better picture of the risks we carry
   https://cirdb.ceria.purdue.edu/website/
   Web-based system that tracks the on-going
    costs of an incident response
   Can compare many incidents against each
    other to track changing costs over time
   Can use the online database hosted at Cerias
    if you are brave
   Otherwise requires PHP and MySQL on a
    server in your network
   Call Tree & Escalation list
   Communication methods
   Public Relations and Legal
   Inventory and Contacts
   Procedures and policies
   Acquisition kit
 Goal: To clearly document who should be called
  during an incident, and how (phone numbers)
 The structure of this tree depends on the size and
  structure of the organization
 The escalation tree describes what people should be
  called based on the severity of the incident
     The CEO will likely not need to immediately know that a
      user got the latest email virus
   For internal incidents, the list may not be strictly
    followed, in order to keep it quiet
   Response Team
   Public Relations
   Legal Counsel
   Compliance
   Data Protection Officer (Europe / Safe Harbor in US)
   Human Resources
   Firewall Group
   IDS & Monitoring Group
   Remote Access / VPN Group
   Physical Security Group
   Head of IT
   CIO / CSO (or CEO)
Executive Team


                           Public           XSP:
                          Relations       ISP, MSP
                          Response
                           Team
Detection   Security                      IT Group
            Manager        Legal         Compromised
                       General Counsel
                           Physical       Forensics
                           Security        Process
                            Law
                        Enforcement
                        Monitoring:
                        Firewall/IDS
 Goal: To clearly document how parties should communicate
 The needed infrastructure should be built ahead of time
 Normal business communication methods could be compromised
  during an incident and should not be explicitly trusted until proven
  otherwise.
 Out of band communication:
       Dedicated voice mail system
       3rd party email network and dialups
       Fax machines and non-networked printers
       Mobile phones
   Encryption for in-band and secure out-of-band email
     Exchange all keys and required tools ahead of time
   A single reporting method will make the response
    more efficient
   An awareness program can teach users to call a
    “hotline” number when incidents are suspected
    (virus, DoS)
   The hotline can be the normal IT Help Desk or a
    dedicated incident line
   The hotline operators will report the incident to the
    proper responders
   The size of an organization will depend on how
    formal this process is
 Public Relations may want to prepare press releases
  and webpages for incidents in advance
 PR should be ready to ask the right questions if an
  incident is reported to them by the media
 Legal Counsel may want to have all documentation
  directed towards them so that they are “Attorney
  Work Products”.
     This reduces the chances that it is given to the defense in
      the discovery process
 Goal: To clearly document what systems exist and who is
  responsible for each of them.
 Identify other systems that could be involved more easily
 Decrease the amount of time required to get accounts and
  passwords by storing contact information
 For internal incidents, contact information may decrease the
  number of people that hear about it
 Network maps will help when installing network monitors
  and analyzing network traffic
 Goal: To script what steps will be taken when an
  incident occurs
 Every incident is unique, but procedures give a
  baseline to follow
 The level of detail depends on the organization:
     Outsourced response team or in-house
     Small IT group or several hundred members
     Special medical or legal privacy laws or internal policies
 Whom to call? (the Call & Escalation Tree)
 How to identify the scope of the incident?
 Which systems can never be shutdown?
 In which cases will an acquisition be performed for
  forensics?
 How do I acquire data from a Windows system?
  (Acquisition Procedures)
 How do I store the acquired data? (Data Handling
  Procedures)
 Am I allowed to increase user monitoring?
   Basic
     Call the Head of IT Security
     Head of IT Security calls:
       ▪ Response Team: 617-621-3500
       ▪ Public Relations: 617-555-1000
       ▪ Legal: 617-555-1200
   Data Handling
     All acquired data must be stored in the safe in the Security
      Office
     Original data must never be used during an analysis
     Chain of Custody forms must be created for all acquired
      data
   Solaris Dead Acquisition
    1. Insert SCSI drive into suspect system
    2. Boot the suspect system from “Response Kit Solaris CD-ROM”
    3. Mount the SCSI disk to /mnt:
       mount /dev/dsk/c0t6d0s6 /mnt
    4. Calculate MD5 checksum of suspect slices (repeat for each slice):
       dd if=/dev/rdsk/c0t0d0s4 bs=8k | md5sum
    5. dd the suspect slice to a file on the mounted disk (repeat for each
       slice):
       dd if=/dev/rdsk/c0t0d0s4 of=/mnt/c0t0d0s4.dd
       bs=8k
    6. Verify the MD5 checksum of the acquired slices:
       md5sum /mnt/c0t0d0s4.dd
   Goal: Build (or at least identify) hardware and
    software to safely and quickly collect data
    during an incident.
   A pre-built kit will save time during an
    incident.
   Acquisition procedures should be written for
    the dedicated hardware
   An acquisition computer should have large amounts
    of disk space
   Data is sent to the computer from either the
    network interface or an IDE or SCSI bus
   UNIX (Linux) is better suited for this system because
    it does not try to mount new disks
   This system can also be used for network
    monitoring
   Examples:
     Linux rackmount system with a SCSI card
     Mac OS X laptop with Firewire IDE Enclosures
 Trusted binaries are needed during an acquisition
  (the local ones could be trojaned)
 CDs should exist that can collect the needed data
  from a live system and that can boot the hardware
  into a trusted kernel with the needed tools
 Bootable Examples:
       @stake Pocket Security Toolkit
       Penguin Sleuth Kit
       Solaris Install CD
       AIX Install CD
   Large IDE and SCSI disks that are wiped with
    all zeros
   Hand-held imaging devices
   Hub and network cables
   Power strip
   Digital camera
   Required forms

More Related Content

What's hot

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous BehaviorCapgemini
 
Incident Response
Incident Response Incident Response
Incident Response InnoTech
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Chris Ross
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramLancope, Inc.
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8colleenatrsc
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyStephanie Weagle
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopMichele Chubirka
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatAndrew Case
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 

What's hot (18)

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous Behavior
 
Incident Response
Incident Response Incident Response
Incident Response
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
DamballaOverview
DamballaOverviewDamballaOverview
DamballaOverview
 
Information security-toolkit-76396-8
Information security-toolkit-76396-8Information security-toolkit-76396-8
Information security-toolkit-76396-8
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Ht t17
Ht t17Ht t17
Ht t17
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 

Viewers also liked

Каталог на велочасти
Каталог на велочастиКаталог на велочасти
Каталог на велочастиIvaylo Dragov
 
HTM404 Presentation
HTM404 PresentationHTM404 Presentation
HTM404 Presentationanthonyc31
 
Penetration Testing; A customers perspective
Penetration Testing; A customers perspectivePenetration Testing; A customers perspective
Penetration Testing; A customers perspectivePhil Huggins FBCS CITP
 
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]Phil Huggins FBCS CITP
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]Phil Huggins FBCS CITP
 
First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]Phil Huggins FBCS CITP
 
Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...
Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...
Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...Vicky Warr
 

Viewers also liked (15)

Каталог на велочасти
Каталог на велочастиКаталог на велочасти
Каталог на велочасти
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Measuring black boxes
Measuring black boxesMeasuring black boxes
Measuring black boxes
 
Introduction to Hacktivism
Introduction to HacktivismIntroduction to Hacktivism
Introduction to Hacktivism
 
Open source (1)
Open source (1)Open source (1)
Open source (1)
 
Delivering Secure Projects
Delivering Secure ProjectsDelivering Secure Projects
Delivering Secure Projects
 
HTM404 Presentation
HTM404 PresentationHTM404 Presentation
HTM404 Presentation
 
Penetration Testing; A customers perspective
Penetration Testing; A customers perspectivePenetration Testing; A customers perspective
Penetration Testing; A customers perspective
 
Probability Calibration
Probability CalibrationProbability Calibration
Probability Calibration
 
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]
 
First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]First Responders Course - Session 8 - Digital Evidence Collection [2004]
First Responders Course - Session 8 - Digital Evidence Collection [2004]
 
Pitfalls of Cyber Data
Pitfalls of Cyber DataPitfalls of Cyber Data
Pitfalls of Cyber Data
 
Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...
Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...
Postpartum Super Nutrition; The Top Ten Vitamins, Nutrients And Foods, you ne...
 
11 things about 11gr2
11 things about 11gr211 things about 11gr2
11 things about 11gr2
 

Similar to First Responders Course - Session 3 - Monitoring and Controlling Incident Costs

Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaDavid Kearney
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemCSCJournals
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inmaribethy2y
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxStevenTharp2
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
Events Management or How to Survive Security Incidents
Events Management or How to Survive Security IncidentsEvents Management or How to Survive Security Incidents
Events Management or How to Survive Security Incidentsguest6fd3c2f9
 
Belnet events management
Belnet events managementBelnet events management
Belnet events managementXavier Mertens
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteDamir Delija
 

Similar to First Responders Course - Session 3 - Monitoring and Controlling Incident Costs (20)

Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Design for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic SystemDesign for A Network Centric Enterprise Forensic System
Design for A Network Centric Enterprise Forensic System
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Events Management or How to Survive Security Incidents
Events Management or How to Survive Security IncidentsEvents Management or How to Survive Security Incidents
Events Management or How to Survive Security Incidents
 
Belnet events management
Belnet events managementBelnet events management
Belnet events management
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data Centralization
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 

Recently uploaded

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 

Recently uploaded (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 

First Responders Course - Session 3 - Monitoring and Controlling Incident Costs

  • 2.  The 2003 survey identified a combined total loss of $201,797,340 for 251 organisations  This was lower than each of the previous 3 three years  The average cost of a security incident is at it’s lowest for some time in 2003 at $47,107 down from a high of $80,000 dollars in 2002  Based on organisations responses to the survey. No idea how those estimates were arrived at or what industries the loss reporting companies were in.
  • 3. At a basic level answering these questions is a good start:  Who worked on responding to or investigating the incident?  How many hours did each of them spend?  How many people were prevented from working because of the incident?  How much productive time did each of them lose?  How much do you pay each of those people to work for you?  How much overhead do you pay for your employees?  Did you need to purchase new or replacement equipment?
  • 4. More complicated and difficult questions include:  What business opportunities did you lose?  How much revenue did you lose as a direct result of the incident?  How much damage was done to your reputation?  While these shouldn’t be ignored it is probably more useful to get a good measure of the simple costs for immediate management purposes
  • 5.  Established by a group of large universities in the 90’s  First used in 1998 at the University of Washington in New Zealand  “The largest security incident in new Zealand history” where 18 servers at the university were compromised  They estimated the average cost per compromised host of the incident was approximately $1,544
  • 6. Individual cost per hour  Wage divided by 52 Weeks = Weekly Cost  Weekly cost divided by 40 hours = hourly cost  Benefit rate of 28% added (Average of the universities involved  Incidental Expenses  Hardware Stolen / Damaged  Phone Bills  etc
  • 7.  http://project.honeynet.org/challenge/  The Forensic Challenge is an opportunity for incident responders to compete using copies of compromised systems to see who can find the most useful information  Using I-CAMP they estimated that the average cost of the forensic analyses in the challenge was $2,067.46 +/- $810.12  Using a consulting rate of $300 an hour they estimate $22,620 +/- $393
  • 8. Incident Response is likely to cost approximately $1,544 a system at university pay scales  Forensic Analysis of a compromised system is likely to cost about $22,620  These are both manpower intensive, costly activities  Need to plug our own figures into these to get a better picture of the risks we carry
  • 9. https://cirdb.ceria.purdue.edu/website/  Web-based system that tracks the on-going costs of an incident response  Can compare many incidents against each other to track changing costs over time  Can use the online database hosted at Cerias if you are brave  Otherwise requires PHP and MySQL on a server in your network
  • 10. Call Tree & Escalation list  Communication methods  Public Relations and Legal  Inventory and Contacts  Procedures and policies  Acquisition kit
  • 11.  Goal: To clearly document who should be called during an incident, and how (phone numbers)  The structure of this tree depends on the size and structure of the organization  The escalation tree describes what people should be called based on the severity of the incident  The CEO will likely not need to immediately know that a user got the latest email virus  For internal incidents, the list may not be strictly followed, in order to keep it quiet
  • 12. Response Team  Public Relations  Legal Counsel  Compliance  Data Protection Officer (Europe / Safe Harbor in US)  Human Resources  Firewall Group  IDS & Monitoring Group  Remote Access / VPN Group  Physical Security Group  Head of IT  CIO / CSO (or CEO)
  • 13. Executive Team Public XSP: Relations ISP, MSP Response Team Detection Security IT Group Manager Legal Compromised General Counsel Physical Forensics Security Process Law Enforcement Monitoring: Firewall/IDS
  • 14.  Goal: To clearly document how parties should communicate  The needed infrastructure should be built ahead of time  Normal business communication methods could be compromised during an incident and should not be explicitly trusted until proven otherwise.  Out of band communication:  Dedicated voice mail system  3rd party email network and dialups  Fax machines and non-networked printers  Mobile phones  Encryption for in-band and secure out-of-band email  Exchange all keys and required tools ahead of time
  • 15. A single reporting method will make the response more efficient  An awareness program can teach users to call a “hotline” number when incidents are suspected (virus, DoS)  The hotline can be the normal IT Help Desk or a dedicated incident line  The hotline operators will report the incident to the proper responders  The size of an organization will depend on how formal this process is
  • 16.  Public Relations may want to prepare press releases and webpages for incidents in advance  PR should be ready to ask the right questions if an incident is reported to them by the media  Legal Counsel may want to have all documentation directed towards them so that they are “Attorney Work Products”.  This reduces the chances that it is given to the defense in the discovery process
  • 17.  Goal: To clearly document what systems exist and who is responsible for each of them.  Identify other systems that could be involved more easily  Decrease the amount of time required to get accounts and passwords by storing contact information  For internal incidents, contact information may decrease the number of people that hear about it  Network maps will help when installing network monitors and analyzing network traffic
  • 18.  Goal: To script what steps will be taken when an incident occurs  Every incident is unique, but procedures give a baseline to follow  The level of detail depends on the organization:  Outsourced response team or in-house  Small IT group or several hundred members  Special medical or legal privacy laws or internal policies
  • 19.  Whom to call? (the Call & Escalation Tree)  How to identify the scope of the incident?  Which systems can never be shutdown?  In which cases will an acquisition be performed for forensics?  How do I acquire data from a Windows system? (Acquisition Procedures)  How do I store the acquired data? (Data Handling Procedures)  Am I allowed to increase user monitoring?
  • 20. Basic  Call the Head of IT Security  Head of IT Security calls: ▪ Response Team: 617-621-3500 ▪ Public Relations: 617-555-1000 ▪ Legal: 617-555-1200  Data Handling  All acquired data must be stored in the safe in the Security Office  Original data must never be used during an analysis  Chain of Custody forms must be created for all acquired data
  • 21. Solaris Dead Acquisition 1. Insert SCSI drive into suspect system 2. Boot the suspect system from “Response Kit Solaris CD-ROM” 3. Mount the SCSI disk to /mnt: mount /dev/dsk/c0t6d0s6 /mnt 4. Calculate MD5 checksum of suspect slices (repeat for each slice): dd if=/dev/rdsk/c0t0d0s4 bs=8k | md5sum 5. dd the suspect slice to a file on the mounted disk (repeat for each slice): dd if=/dev/rdsk/c0t0d0s4 of=/mnt/c0t0d0s4.dd bs=8k 6. Verify the MD5 checksum of the acquired slices: md5sum /mnt/c0t0d0s4.dd
  • 22. Goal: Build (or at least identify) hardware and software to safely and quickly collect data during an incident.  A pre-built kit will save time during an incident.  Acquisition procedures should be written for the dedicated hardware
  • 23. An acquisition computer should have large amounts of disk space  Data is sent to the computer from either the network interface or an IDE or SCSI bus  UNIX (Linux) is better suited for this system because it does not try to mount new disks  This system can also be used for network monitoring  Examples:  Linux rackmount system with a SCSI card  Mac OS X laptop with Firewire IDE Enclosures
  • 24.  Trusted binaries are needed during an acquisition (the local ones could be trojaned)  CDs should exist that can collect the needed data from a live system and that can boot the hardware into a trusted kernel with the needed tools  Bootable Examples:  @stake Pocket Security Toolkit  Penguin Sleuth Kit  Solaris Install CD  AIX Install CD
  • 25. Large IDE and SCSI disks that are wiped with all zeros  Hand-held imaging devices  Hub and network cables  Power strip  Digital camera  Required forms