SlideShare a Scribd company logo
1 of 23
INCIDENT RESPONSE
THREAT LANDSCAPE
• The Advanced Persistent Threat (APT) concern
• –The “UFO” of hacking/cracking activities
• •Malice—Malicious insiders (employees, contractors, vendors) may be higher risk
than outsiders
• •Poor Practices—Newer systems allow for more connectivity and higher risk—
users may not see risk of business as usual
• •Emerging threats and reports
• –New vulnerabilities and exploits are released daily
• •Enhanced media focus leads to ineffective quick-fixes and attracts all manner of
new attackers and threats.
• –The cyber “copycat” is increasingly common
FIRST RESPONDER
• Individuals, who in the early stages of an incident, are responsible for the
protection and preservation of life, property, evidence, and the environment,
including emergency response providers as defined in section 2 of the
Homeland Security Act of 2002 (6 U.S.C. 101), as well as emergency
management, public health, clinical care, public works, and other skilled
support personnel (such as equipment operators) that provide immediate
support services during prevention, response, and recovery operations.
THE FIRST RESPONDER ROLE
• As a First Responder, you are the first person notified and reacting to an
information security related incident launched against potential critical
infrastructure or key resources (CI/KR).
• •Responsibilities include:
• –Assessing the severity of the threat, the scope of the breach and targets, and the
associated appropriate response
• –Containing the threat or breach
• –Eradicating the threat or breach
• –Restoring critical cyber services
• –Conveying support to secondary response personnel
• –Assisting with the reestablishment of security controls
FIRST RESPONDERS ROLES
• Internal:
• –System/network staff performing regular duties
• –IT Security staff responding to any incident
• –Helpdesk support, collecting and providing solutions to user issues and concerns
• •External:
• –A DHS-designated, trained CFR
• –Locally recognized response expert
• –Law enforcement emergency cyber response personnel
• –Government trained and delegated cyber response personnel (local, state, or
federal)
RESPONSE EVOLUTION
• Technology has evolved.
• Security threats have evolved.
• Incident Response has not.
• Security and Incident Response professionals must find ways to more
proactively, efficiently, and effectively respond to the escalating cyber threat
landscape.
• The Internet is the Wild West of old. We either train to be the Sheriff, or we
wait to become the victim.
THE FIRST RESPONDER METHODOLOGY
• Step 1: Emergency Assessment
• The ability to quickly assess the potential breach to determine attack type, potential targets, and severity.
• The intent is to focus on most critical systems, and most severe breach to quickly combat an attack.
• Step 2: Emergency Containment
• Once the emergency assessment is completed, immediate containment efforts must be initiated.
• A cyber triage system must be established to contain the critical systems and the most severe breaches.
• Step 3: Emergency Eradication
• Building on the prior steps, the eradication process focuses on eliminating the most severe threats against the most critical targets.
• This eradication step is intended to provide a temporary remediation for the breach, leading to restored services.
• Step 4: Emergency Restoration
• This final emergency step provides for the immediate restoration of critical systems and associated services.
• This is a short-term restoration that re-establishes critical services, while a more thorough response is initiated.
• Step 5: Post-Emergency Response
• More thorough response activities are conducted to ensure that ongoing security of restored services is maintained.
• This includes assessment, containment, eradication, and restoration processes.
• Step 6: The Hand-Off
• The final active CFR step is the transfer of responsibility to investigative and forensics personnel.
• Documentation and oral updates are provided to follow-up incident response personnel for ongoing forensic and law enforcement activities.
FIRST RESPONDER PREPARATION
• The CFR Incident Response Team
• Core Response Team
• Smaller, more nimble and broadly experienced first response group
• Support Team
• Diverse, specific skillset, on call as needed
• Management Liaison Team
• Focused on executive-level updates, external updates, communication and
coordination
THE FIRST RESPONDER TOOLKIT
• The CFR should maintain a kit of response tools that are readily available, easily
useable, and guaranteed secure/authentic.
• Create hashes of stored tools
• The CFR should be very familiar with the tools and the proper use of each
application.
• •Sample Toolkit Options
• System Tools
• Fport,, Process Explorer , Netstat , PsList , PsService
• Network Tools
• Wireshark, Arp , Kismet , TCPDump , Cain and Abel
• Post-Restoration Tools
• Nessus , NMap , Snort , NetStumbler , Nikto
THE CYBER ATTACK METHOD
• Cyber attacks typically follow logical patterns:
• –Target Research
• Review of available information regarding potential target(s)
• Public data, Google hacking, corporate records, etc.
• –Information Gathering and Reconnaissance
• Slow, precise discovery of target’s footprint
• Creating an electronic blueprint
• –Vulnerability Assessments
• Methodical discovery of potential weaknesses
• Time consuming and deliberate step in the process
• –Exploitation of Vulnerabilities
• Subtle exploitation to avoid discovery
• Establishing the initial entry point
THE CYBER ATTACK METHOD
• Cyber attacks typically follow logical patterns:
• –Privilege Escalation
• Turning initial entry point into elevated access
• Reinforcing access and providing improved expansion opportunities
• –Conducting Breach Goals
• Data or monetary theft, service disruption or elimination, etc.
• –Maintaining Access
• Anticipating the discovery and removal of the initial ingress point, the attacker will create a
point of return
• Backdoors with possible outbound connections
• –Anti-Forensics
• Working to eliminate responders’ research tools such as event logs, alert messages, etc.
• Eliminating evidence
ATTACK INDICATORS
• Attack steps have notable traits, and learning these traits can help you more
quickly identify a potential problem.
• Know your enemies and know yourself!
• Learning how an attack is conducted and knowing how tools appear when used
against your environment will help you more quickly respond.
• For example, consider what is done for information gathering and reconnaissance:
• –Fast-paced port scanning versus slow, methodical probing
• Precursors and Indicators: Certain events or anomalies can indicate the existence of
a potential cyber threat.
• There are few specific, definitive notices of a breach, but a collection of indicative
activities can be correlated to determine that a security event has occurred (or is
currently occurring). Initially, the incident may be reported by an end user,
detected by a system administrator, identified by IDS alerts, or discovered by many
other means.
IDENTIFICATION
• Look for system anomalies, deviations
• Unusual network traffic patterns
• Notable IDS/IPS alerts
• Logon attempts/activities (failed or successful)
• Newly active services or open ports
• Newly created user accounts
• Newly installed programs
• Related system alerts, warnings (SIEM)
• Spiked CPU, memory, or hard drive utilization
CONTAINMENT
• The primary goal of containment is to
quickly track down, identify, and isolate a
breach or threat.
• –Once the impacted systems have been
identified, the scope of the review can
be more targeted.
• –Identification of the breach will lead
to the proper containment and
eradication steps.
• –Isolation of the breach will prevent a
potential spread or relocation of the
infection/breach.
• –Isolation of the breach will also ensure
that additional data loss or progressive
system loss is minimized.
• Tracking down impacted systems
• –Information gathered during the
emergency assessment process will
help to determine breached systems.
• –IP addresses, system names,
logical/physical network locations, and
impacted databases or applications can
be used to locate breached systems.
• –Assumptions must be made that
similarly configured systems with
similar connections and similar
protective mechanisms may also have
been targeted.
• –Systems on the same network
segments or systems that are logically
connected to impacted systems must
also be assumed to have been
breached.
ERADICATION
• The most critical and difficult step of the FR response methodology is the
removal of the breach from the impacted network/systems, regardless of
type.
• Eradication is not limited to only initial removal of a threat, but can also
include the ongoing review of the impacted network/systems to prevent a
recurring breach.
• Eradication processes can consist of two primary removal methods:
• –“The scalpel versus the machete”
VS.
ERADICATION
• Network-based eradication
• –If multiple systems within the same network segments have been breached, a full network compromise must be suspected.
• –A network eradication process can entail a variety of actions to eliminate continued unwanted access.
• Changing SNMP strings
• Changing device passwords (standard, enable, etc.)
• Changing IP address schemes, assignments
• Changing centralized network management tool accounts
• Modifying firewall rules, IPS scanning filters
• Server/Desktop-based eradication
• –If a system is known to have been compromised, eradication steps must include a review of connected systems to ensure a spread is contained.
• –Removing a breach against a server or desktop can entail multiple steps, with variations based on OS.
• Deleting any non-mandatory accounts
• Changing system passwords (local and domain) for ALL accounts on the impacted systems
• Running full anti-virus scans for possible malware
• Thoroughly reviewing all running processes and listening ports, while looking for correlated file activity
RESTORATION
• Restoration from Backup
• If adequate backups are available, system restoration from tape (or other storage
media) will likely be the second most desirable option.
• Tape/media restoration from backup should be quickly reviewed in an offline test
environment to ensure that a breach and/or infection was not backed up.
• This restoration may be for an entire system, specific operating systems files, or
specific database or application files.
• –Correlated to the Emergency Eradication technique selected; Scalpel versus Machete
• –Reinstallation of system files
• Another emergency restoration technique is the reinstallation of verified, valid
operating systems, applications, etc.
• Attention to software versions, patch levels, protective applications.
POST-EMERGENCY RESPONSE
• After emergency steps 1-4 are completed, follow-up activities are necessary to ensure that the
existing threat is completely eliminated.
• –Conduct ongoing system monitoring for pending new or returned threats.
• –Conduct fast-paced vulnerability assessments to make sure systems are appropriately patched, secure after
conclusion of emergency response activities.
• –Gather additional logs, records for more in-depth review
• –Findings and associated activities conducted during the emergency response activities should be analyzed to
begin standard, complex incident response.
• Lessons Learned
• –Convey knowledge and responsibility for ongoing activities to secondary response personnel
• –Respond to questions, concerns, needs of investigative personnel for possible prosecution, legal recourse
• –Educate on-site security operations personnel about the breaches found, characteristics and similarities of
the targeted systems, and the successful countering methods conducted during the CFR process.
• In short, impart knowledge to those responsible for ensuring that a similar breach does not happen again

More Related Content

What's hot

Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability ManagementVicky Ames
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskBeyondTrust
 
Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony David Sweigert
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewSusan Rantall
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Managementjpubal
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsHuntsman Security
 
OSB130 Patch Management Best Practices
OSB130 Patch Management Best PracticesOSB130 Patch Management Best Practices
OSB130 Patch Management Best PracticesIvanti
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte
 
Open-Source Security Management and Vulnerability Impact Assessment
Open-Source Security Management and Vulnerability Impact AssessmentOpen-Source Security Management and Vulnerability Impact Assessment
Open-Source Security Management and Vulnerability Impact AssessmentPriyanka Aash
 

What's hot (20)

Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Incident response
Incident responseIncident response
Incident response
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
 
Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Vulnerability Management V0.1
Vulnerability Management V0.1Vulnerability Management V0.1
Vulnerability Management V0.1
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 
OSB130 Patch Management Best Practices
OSB130 Patch Management Best PracticesOSB130 Patch Management Best Practices
OSB130 Patch Management Best Practices
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report Webinar
 
Open-Source Security Management and Vulnerability Impact Assessment
Open-Source Security Management and Vulnerability Impact AssessmentOpen-Source Security Management and Vulnerability Impact Assessment
Open-Source Security Management and Vulnerability Impact Assessment
 

Viewers also liked

Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnovComputer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnovEric Vanderburg
 
ICS Review & Response
ICS Review & ResponseICS Review & Response
ICS Review & Responsedwoodwoody
 
Reading and Writing Files
Reading and Writing FilesReading and Writing Files
Reading and Writing Filesprimeteacher32
 
6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace ViolenceCase IQ
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 

Viewers also liked (19)

Snort
SnortSnort
Snort
 
Snort IDS
Snort IDSSnort IDS
Snort IDS
 
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnovComputer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
 
ICS Review & Response
ICS Review & ResponseICS Review & Response
ICS Review & Response
 
Reading and Writing Files
Reading and Writing FilesReading and Writing Files
Reading and Writing Files
 
6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence
 
RT and RT for Incident Response
RT and RT for Incident ResponseRT and RT for Incident Response
RT and RT for Incident Response
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 

Similar to Incident Response

BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
Penentration testing
Penentration testingPenentration testing
Penentration testingtahreemsaleem
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptxdotco
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Attackers process
Attackers processAttackers process
Attackers processbegmohsin
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.pptit160320737038
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacksdkaya
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?PECB
 

Similar to Incident Response (20)

BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
Security Incident Handling for Schools
Security Incident Handling for Schools Security Incident Handling for Schools
Security Incident Handling for Schools
 
Penentration testing
Penentration testingPenentration testing
Penentration testing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Intruders
IntrudersIntruders
Intruders
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Attackers process
Attackers processAttackers process
Attackers process
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Drop, Stop & Roll
Drop, Stop & RollDrop, Stop & Roll
Drop, Stop & Roll
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?CASE STUDY: How to Defend the Compromised Network?
CASE STUDY: How to Defend the Compromised Network?
 

More from primeteacher32

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
 
Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Soham Mondal
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girlsshivangimorya083
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testspriyanshukumar97908
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boodykojalkojal131
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 

Recently uploaded (20)

(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
 
Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
 
Notes of bca Question paper for exams and tests
Notes of bca Question paper for exams and testsNotes of bca Question paper for exams and tests
Notes of bca Question paper for exams and tests
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
 
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 

Incident Response

  • 2.
  • 3. THREAT LANDSCAPE • The Advanced Persistent Threat (APT) concern • –The “UFO” of hacking/cracking activities • •Malice—Malicious insiders (employees, contractors, vendors) may be higher risk than outsiders • •Poor Practices—Newer systems allow for more connectivity and higher risk— users may not see risk of business as usual • •Emerging threats and reports • –New vulnerabilities and exploits are released daily • •Enhanced media focus leads to ineffective quick-fixes and attracts all manner of new attackers and threats. • –The cyber “copycat” is increasingly common
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. FIRST RESPONDER • Individuals, who in the early stages of an incident, are responsible for the protection and preservation of life, property, evidence, and the environment, including emergency response providers as defined in section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101), as well as emergency management, public health, clinical care, public works, and other skilled support personnel (such as equipment operators) that provide immediate support services during prevention, response, and recovery operations.
  • 9. THE FIRST RESPONDER ROLE • As a First Responder, you are the first person notified and reacting to an information security related incident launched against potential critical infrastructure or key resources (CI/KR). • •Responsibilities include: • –Assessing the severity of the threat, the scope of the breach and targets, and the associated appropriate response • –Containing the threat or breach • –Eradicating the threat or breach • –Restoring critical cyber services • –Conveying support to secondary response personnel • –Assisting with the reestablishment of security controls
  • 10. FIRST RESPONDERS ROLES • Internal: • –System/network staff performing regular duties • –IT Security staff responding to any incident • –Helpdesk support, collecting and providing solutions to user issues and concerns • •External: • –A DHS-designated, trained CFR • –Locally recognized response expert • –Law enforcement emergency cyber response personnel • –Government trained and delegated cyber response personnel (local, state, or federal)
  • 11. RESPONSE EVOLUTION • Technology has evolved. • Security threats have evolved. • Incident Response has not. • Security and Incident Response professionals must find ways to more proactively, efficiently, and effectively respond to the escalating cyber threat landscape. • The Internet is the Wild West of old. We either train to be the Sheriff, or we wait to become the victim.
  • 12. THE FIRST RESPONDER METHODOLOGY • Step 1: Emergency Assessment • The ability to quickly assess the potential breach to determine attack type, potential targets, and severity. • The intent is to focus on most critical systems, and most severe breach to quickly combat an attack. • Step 2: Emergency Containment • Once the emergency assessment is completed, immediate containment efforts must be initiated. • A cyber triage system must be established to contain the critical systems and the most severe breaches. • Step 3: Emergency Eradication • Building on the prior steps, the eradication process focuses on eliminating the most severe threats against the most critical targets. • This eradication step is intended to provide a temporary remediation for the breach, leading to restored services. • Step 4: Emergency Restoration • This final emergency step provides for the immediate restoration of critical systems and associated services. • This is a short-term restoration that re-establishes critical services, while a more thorough response is initiated. • Step 5: Post-Emergency Response • More thorough response activities are conducted to ensure that ongoing security of restored services is maintained. • This includes assessment, containment, eradication, and restoration processes. • Step 6: The Hand-Off • The final active CFR step is the transfer of responsibility to investigative and forensics personnel. • Documentation and oral updates are provided to follow-up incident response personnel for ongoing forensic and law enforcement activities.
  • 13. FIRST RESPONDER PREPARATION • The CFR Incident Response Team • Core Response Team • Smaller, more nimble and broadly experienced first response group • Support Team • Diverse, specific skillset, on call as needed • Management Liaison Team • Focused on executive-level updates, external updates, communication and coordination
  • 14. THE FIRST RESPONDER TOOLKIT • The CFR should maintain a kit of response tools that are readily available, easily useable, and guaranteed secure/authentic. • Create hashes of stored tools • The CFR should be very familiar with the tools and the proper use of each application. • •Sample Toolkit Options • System Tools • Fport,, Process Explorer , Netstat , PsList , PsService • Network Tools • Wireshark, Arp , Kismet , TCPDump , Cain and Abel • Post-Restoration Tools • Nessus , NMap , Snort , NetStumbler , Nikto
  • 15. THE CYBER ATTACK METHOD • Cyber attacks typically follow logical patterns: • –Target Research • Review of available information regarding potential target(s) • Public data, Google hacking, corporate records, etc. • –Information Gathering and Reconnaissance • Slow, precise discovery of target’s footprint • Creating an electronic blueprint • –Vulnerability Assessments • Methodical discovery of potential weaknesses • Time consuming and deliberate step in the process • –Exploitation of Vulnerabilities • Subtle exploitation to avoid discovery • Establishing the initial entry point
  • 16. THE CYBER ATTACK METHOD • Cyber attacks typically follow logical patterns: • –Privilege Escalation • Turning initial entry point into elevated access • Reinforcing access and providing improved expansion opportunities • –Conducting Breach Goals • Data or monetary theft, service disruption or elimination, etc. • –Maintaining Access • Anticipating the discovery and removal of the initial ingress point, the attacker will create a point of return • Backdoors with possible outbound connections • –Anti-Forensics • Working to eliminate responders’ research tools such as event logs, alert messages, etc. • Eliminating evidence
  • 17. ATTACK INDICATORS • Attack steps have notable traits, and learning these traits can help you more quickly identify a potential problem. • Know your enemies and know yourself! • Learning how an attack is conducted and knowing how tools appear when used against your environment will help you more quickly respond. • For example, consider what is done for information gathering and reconnaissance: • –Fast-paced port scanning versus slow, methodical probing • Precursors and Indicators: Certain events or anomalies can indicate the existence of a potential cyber threat. • There are few specific, definitive notices of a breach, but a collection of indicative activities can be correlated to determine that a security event has occurred (or is currently occurring). Initially, the incident may be reported by an end user, detected by a system administrator, identified by IDS alerts, or discovered by many other means.
  • 18. IDENTIFICATION • Look for system anomalies, deviations • Unusual network traffic patterns • Notable IDS/IPS alerts • Logon attempts/activities (failed or successful) • Newly active services or open ports • Newly created user accounts • Newly installed programs • Related system alerts, warnings (SIEM) • Spiked CPU, memory, or hard drive utilization
  • 19. CONTAINMENT • The primary goal of containment is to quickly track down, identify, and isolate a breach or threat. • –Once the impacted systems have been identified, the scope of the review can be more targeted. • –Identification of the breach will lead to the proper containment and eradication steps. • –Isolation of the breach will prevent a potential spread or relocation of the infection/breach. • –Isolation of the breach will also ensure that additional data loss or progressive system loss is minimized. • Tracking down impacted systems • –Information gathered during the emergency assessment process will help to determine breached systems. • –IP addresses, system names, logical/physical network locations, and impacted databases or applications can be used to locate breached systems. • –Assumptions must be made that similarly configured systems with similar connections and similar protective mechanisms may also have been targeted. • –Systems on the same network segments or systems that are logically connected to impacted systems must also be assumed to have been breached.
  • 20. ERADICATION • The most critical and difficult step of the FR response methodology is the removal of the breach from the impacted network/systems, regardless of type. • Eradication is not limited to only initial removal of a threat, but can also include the ongoing review of the impacted network/systems to prevent a recurring breach. • Eradication processes can consist of two primary removal methods: • –“The scalpel versus the machete” VS.
  • 21. ERADICATION • Network-based eradication • –If multiple systems within the same network segments have been breached, a full network compromise must be suspected. • –A network eradication process can entail a variety of actions to eliminate continued unwanted access. • Changing SNMP strings • Changing device passwords (standard, enable, etc.) • Changing IP address schemes, assignments • Changing centralized network management tool accounts • Modifying firewall rules, IPS scanning filters • Server/Desktop-based eradication • –If a system is known to have been compromised, eradication steps must include a review of connected systems to ensure a spread is contained. • –Removing a breach against a server or desktop can entail multiple steps, with variations based on OS. • Deleting any non-mandatory accounts • Changing system passwords (local and domain) for ALL accounts on the impacted systems • Running full anti-virus scans for possible malware • Thoroughly reviewing all running processes and listening ports, while looking for correlated file activity
  • 22. RESTORATION • Restoration from Backup • If adequate backups are available, system restoration from tape (or other storage media) will likely be the second most desirable option. • Tape/media restoration from backup should be quickly reviewed in an offline test environment to ensure that a breach and/or infection was not backed up. • This restoration may be for an entire system, specific operating systems files, or specific database or application files. • –Correlated to the Emergency Eradication technique selected; Scalpel versus Machete • –Reinstallation of system files • Another emergency restoration technique is the reinstallation of verified, valid operating systems, applications, etc. • Attention to software versions, patch levels, protective applications.
  • 23. POST-EMERGENCY RESPONSE • After emergency steps 1-4 are completed, follow-up activities are necessary to ensure that the existing threat is completely eliminated. • –Conduct ongoing system monitoring for pending new or returned threats. • –Conduct fast-paced vulnerability assessments to make sure systems are appropriately patched, secure after conclusion of emergency response activities. • –Gather additional logs, records for more in-depth review • –Findings and associated activities conducted during the emergency response activities should be analyzed to begin standard, complex incident response. • Lessons Learned • –Convey knowledge and responsibility for ongoing activities to secondary response personnel • –Respond to questions, concerns, needs of investigative personnel for possible prosecution, legal recourse • –Educate on-site security operations personnel about the breaches found, characteristics and similarities of the targeted systems, and the successful countering methods conducted during the CFR process. • In short, impart knowledge to those responsible for ensuring that a similar breach does not happen again