SlideShare a Scribd company logo
Operations Security
Week 5
Incident Management, Investigations, and Physical Security
Incidence Response
Incident response is an organized approach to addressing and
managing the aftermath of a security breach or attack (also
known as an incident).
The Steps of Incidence Handling
Triage – Is it an actual incident or a false alarm? How serious is
it?
Investigation – Gathering evidence
Containment – Limit the damage by isolation and mitigation
Analysis – Reconstruct the incident. Who is responsible? How
did they do it? When did it occur? Why did they do it?
Tracking – Document the incident and determine the source
Recovery – Mitigate the incident and apply lessons learned to
reduce risk of recurrence
Triage
The term Triage is used within the medical community. Triage
is the art of rapidly assessing the severity of the incident and
following the right protocols, in the right order, to reduce the
consequences of the incident and doing it all in the midst of
crisis, when every second counts.
Different incidents require different responses – A Denial of
Service attack (DOS) has to be addressed differently than a
malware infection.
Establishing baselines can help identify unusual activity. The
number of indicators to potential incidents are very high, so
false positives are common.
Investigation
The Incident Scene – The Environment where potential
evidence may exist
Principles of criminalistics apply
Identify the scene
Protect the Environment
Identify evidence and potential sources of evidence
Collect Evidence
Minimize the degree of contamination
General Guidelines
All general forensic and procedural procedures must be applied
Seizing digital evidence must not alter the evidence
Any person accessing original digital evidence must be trained
All activity relating to seizure, access, storage, or transfer of
digital evidence must be fully documented, preserved, and
available for review
While an individual is in possession of digital evidence, he or
she is responsible for all actions
Any agency responsible for seizing, accessing, storing, or
transferring digital evidence is responsible for compliance with
these principles
Roles and Responsibilities
A solid foundation of knowledge and policy
A properly trained response team
Core areas must be represented
Chain of Custody
Tracks Evidence Handling
A formal, well-documented procedure MUST be followed – NO
EXCEPTIONS
Locard’s Exchange Principle
When a crime is committed, the perpetrators leave something
behind and take something with them.
Digital Forensics
Be Authentic
Be Accurate
Be Complete
Be Convincing
Be Admissible
Live Evidence
Data that is dynamic and exists in processes that disappear in a
relatively short time frame once the system is powered down
Short Term Containment
The short term goal is to prevent more damage from occurring
and provide time for additional analysis and mitigation. Isolate
the system from the production network and create a backup
copy for investigation.
Possible short term containment steps include
Remove power
Unplug the NIC
Change DNS entries
Apply new ACL filters
Isolate network segments
Disconnect Internet access
Apply null routing
Long Term Containment
If an affected system is a critical system, it may be necessary to
keep it in production while a new system is built to take over its
functions. After a backup of the system has been made for
investigation, steps must be taken to mitigate the incident while
leaving the system available.
Long term containment steps include:
Remove compromised accounts
Apply security patches
Alter firewall rules
Remove Malware
Place in a Dirty VLAN
Analysis
Media Analysis
Recovery of information or evidence from information media
The media may have been overwritten, damaged, degaussed, or
re-used
Network Analysis
Analysis and examination of network logs and activity for
potential evidence
The critical phase of the process is proper evidence handling
and processing
Software Analysis
Encompasses investigative activity
Malware analysis
Intellectual property disputes
Copyright infringements
Goals
Author identification
Content Analysis
Payload and context Analysis
Recovery
Eventually the necessary steps to resolve the incident will be
preformed.
Recovery simply implies the amount of time it may take for
operations to be fully restored
Reporting and Documenting
One of the most important, yet overlooked, phases is the
debriefing and feedback phase
Security Policy Review
Which controls were inadequate or failed?
How can we improve our controls?
Did the Incident Management Plan function as intended?
Physical Security
Deter
Delay
Detect
Assess
Respond
Defense in Depth
The Practice of placing multiple layers of defenses (security
controls) to provide redundancy in the event a control fails or a
vulnerability is exploited
Layered barrier designs are advantageous when they require
increased knowledge, skill, and talent to circumvent them
Important concept borrowed from the military and has been
used since at least 216 BCE
Access Control
Ensures that only authorized personnel are permitted inside the
controlled area
Persons subject to control include employees, visitors,
customers, vendors, and the general public
Authorization Mechanisms typically include Identification
Badges or Cards – Something you have
Magnetic Stripe, Proximity Cards, or Smart Cards
Closed Circuit TV (CCTV)
A collection of cameras, recorders, switches, keyboards, and
monitors that allow viewing and recording of security events
Provides a highly flexible method of surveillance and
monitoring
Can provide deterrence, detection, and Evidentiary Archives
External Monitoring
Infrared (IR) sensors
Microwave
Coaxial strain-sensitive cable
Lighting
Cameras
Monitor displays
Guards
Alarm
Internal Access
Doors
Turnstiles
Mantraps
Keys
Locks
Safes
Fire Prevention
Classes of fires
Data center requirements
VESDA devices
Classes of Fire
Stages of a Fire
A fire normally goes through four stages of development:
Incipient (Pre-combustion)
Visible smoke
Fast flaming
Heat
Data Center Requirements
Have suppression agents such as water, carbon dioxide, FM-200
(the industry-recognized replacement for Halon 1301), etc., on
hand.
Install alarms and sensors (i.e., ion-based or optical smoke
detectors), and fixed, or rate-of-rise temperature sensors.
Data centers require particularly sensitive alarms. Instead of
commercial- grade fire alarms, data centers should have devices
that signal the early stages of a fire through optical or chemical
sensors that may sound an alarm before a fire even starts.
VESDA Detectors
VESDA (an abbreviation of Very Early Smoke Detection
Apparatus) is a laser based smoke detection system.
Fire Protection
Heating, ventilation, and air conditioning systems maintain
appropriate humidity and temperature controls as well as a
contaminant-free air supply
Monitoring systems can detect abnormal data center
temperatures, humidity, or other factors
HVAC Systems
Heating, ventilation, and air conditioning systems maintain
appropriate humidity and temperature controls as well as a
contaminant-free air supply.
Monitoring systems can detect abnormal data center
temperatures, humidity, or other factors. Monitoring devices
alert you to a potential problem before there is a disruption in
service.
Ideally, HVAC systems will have backup power and be isolated
from the rest of the building.
Power
Electric power goals – Provide clean and steady power for data
centers and include UPS (uninterruptible power supply) surge
protectors and protection from transient noise, etc.
Ensure that a proper electrical infrastructure is in place, and
have this validated by a certified electrician.
Mission-critical data centers should have alternate power
sources, such as emergency generators, as well as a minimum
24-hour fuel supply.

More Related Content

Similar to Operations SecurityWeek 5Incident Management, Investigatio.docx

Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
Infocyte
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 
Incident response Process in information security .pptx
Incident response Process in information security .pptxIncident response Process in information security .pptx
Incident response Process in information security .pptx
SarwatDilawaiz
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
Philippe A. R. Schaeffer
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
moggdede
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
MAHESHUMANATHGOPALAK
 
Microsoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdfMicrosoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdf
Snarky Security
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
LokNathRegmi1
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec SysMicheal Isreal
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
gurneyhal
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
Anton Chuvakin
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
Phil Huggins FBCS CITP
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse
EMC
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
Symantec
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Gary Bahadur
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
CheapSSLsecurity
 

Similar to Operations SecurityWeek 5Incident Management, Investigatio.docx (20)

Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Incident response Process in information security .pptx
Incident response Process in information security .pptxIncident response Process in information security .pptx
Incident response Process in information security .pptx
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
Microsoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdfMicrosoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdf
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 

More from cherishwinsland

Based on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docxBased on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docx
cherishwinsland
 
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docxBased on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docx
cherishwinsland
 
Based on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docxBased on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docx
cherishwinsland
 
Based on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docxBased on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docx
cherishwinsland
 
Based on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docxBased on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docx
cherishwinsland
 
Based on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docxBased on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docx
cherishwinsland
 
Based on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docxBased on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docx
cherishwinsland
 
Based on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docxBased on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docx
cherishwinsland
 
Based on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docxBased on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docx
cherishwinsland
 
Based on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docxBased on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docx
cherishwinsland
 
Based on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docxBased on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docx
cherishwinsland
 
Based on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docxBased on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docx
cherishwinsland
 
Based on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docxBased on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docx
cherishwinsland
 
Based on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docxBased on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docx
cherishwinsland
 
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docxBased on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
cherishwinsland
 
Based on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docxBased on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docx
cherishwinsland
 
Based on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docxBased on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docx
cherishwinsland
 
Based on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docxBased on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docx
cherishwinsland
 
Based on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docxBased on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docx
cherishwinsland
 
Based on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docxBased on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docx
cherishwinsland
 

More from cherishwinsland (20)

Based on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docxBased on your course reading assignments and your pending research p.docx
Based on your course reading assignments and your pending research p.docx
 
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docxBased on yesterday Assignment  (Green Machine)1. Provide a Com.docx
Based on yesterday Assignment  (Green Machine)1. Provide a Com.docx
 
Based on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docxBased on what youve learned from the material on incidental teachin.docx
Based on what youve learned from the material on incidental teachin.docx
 
Based on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docxBased on what you have learned related to cybercrime and technol.docx
Based on what you have learned related to cybercrime and technol.docx
 
Based on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docxBased on what you have learned in this class, write a letter to a fu.docx
Based on what you have learned in this class, write a letter to a fu.docx
 
Based on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docxBased on what you have learned about using unified communication.docx
Based on what you have learned about using unified communication.docx
 
Based on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docxBased on what you have learned about using cloud-based office pr.docx
Based on what you have learned about using cloud-based office pr.docx
 
Based on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docxBased on week 13 reading assignment wh,describe an IT or simil.docx
Based on week 13 reading assignment wh,describe an IT or simil.docx
 
Based on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docxBased on the video, how do we make ourselves vulnerable or not so vu.docx
Based on the video, how do we make ourselves vulnerable or not so vu.docx
 
Based on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docxBased on the video (specifically Section 1 Understanding the Comm.docx
Based on the video (specifically Section 1 Understanding the Comm.docx
 
Based on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docxBased on the texts by Kafka and Eliot, (writing on one or the other .docx
Based on the texts by Kafka and Eliot, (writing on one or the other .docx
 
Based on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docxBased on the texts by Kafka and Eliot, (writing on one or the ot.docx
Based on the texts by Kafka and Eliot, (writing on one or the ot.docx
 
Based on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docxBased on the techniques discussed for hiding data on a computer, w.docx
Based on the techniques discussed for hiding data on a computer, w.docx
 
Based on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docxBased on the readings, there are specific components that encompass .docx
Based on the readings, there are specific components that encompass .docx
 
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docxBased on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
Based on the readings titled ‘Lost Trust’, ‘Chinese Port Cities’ a.docx
 
Based on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docxBased on the readings this week, answer the two following questions .docx
Based on the readings this week, answer the two following questions .docx
 
Based on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docxBased on the readings for the week, discuss your opinion on the need.docx
Based on the readings for the week, discuss your opinion on the need.docx
 
Based on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docxBased on the reading assignment, your experience, and personal r.docx
Based on the reading assignment, your experience, and personal r.docx
 
Based on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docxBased on the reading assignment (and in your own words), why are MNE.docx
Based on the reading assignment (and in your own words), why are MNE.docx
 
Based on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docxBased on the primary documents from chapter 23 of AmericanYawp, plea.docx
Based on the primary documents from chapter 23 of AmericanYawp, plea.docx
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Operations SecurityWeek 5Incident Management, Investigatio.docx

  • 1. Operations Security Week 5 Incident Management, Investigations, and Physical Security Incidence Response Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The Steps of Incidence Handling Triage – Is it an actual incident or a false alarm? How serious is it? Investigation – Gathering evidence Containment – Limit the damage by isolation and mitigation Analysis – Reconstruct the incident. Who is responsible? How did they do it? When did it occur? Why did they do it? Tracking – Document the incident and determine the source Recovery – Mitigate the incident and apply lessons learned to reduce risk of recurrence Triage The term Triage is used within the medical community. Triage is the art of rapidly assessing the severity of the incident and following the right protocols, in the right order, to reduce the consequences of the incident and doing it all in the midst of crisis, when every second counts. Different incidents require different responses – A Denial of Service attack (DOS) has to be addressed differently than a malware infection. Establishing baselines can help identify unusual activity. The
  • 2. number of indicators to potential incidents are very high, so false positives are common. Investigation The Incident Scene – The Environment where potential evidence may exist Principles of criminalistics apply Identify the scene Protect the Environment Identify evidence and potential sources of evidence Collect Evidence Minimize the degree of contamination General Guidelines All general forensic and procedural procedures must be applied Seizing digital evidence must not alter the evidence Any person accessing original digital evidence must be trained All activity relating to seizure, access, storage, or transfer of digital evidence must be fully documented, preserved, and available for review While an individual is in possession of digital evidence, he or she is responsible for all actions
  • 3. Any agency responsible for seizing, accessing, storing, or transferring digital evidence is responsible for compliance with these principles Roles and Responsibilities A solid foundation of knowledge and policy A properly trained response team Core areas must be represented Chain of Custody Tracks Evidence Handling A formal, well-documented procedure MUST be followed – NO EXCEPTIONS Locard’s Exchange Principle When a crime is committed, the perpetrators leave something behind and take something with them. Digital Forensics Be Authentic Be Accurate Be Complete Be Convincing Be Admissible
  • 4. Live Evidence Data that is dynamic and exists in processes that disappear in a relatively short time frame once the system is powered down Short Term Containment The short term goal is to prevent more damage from occurring and provide time for additional analysis and mitigation. Isolate the system from the production network and create a backup copy for investigation. Possible short term containment steps include Remove power Unplug the NIC Change DNS entries Apply new ACL filters Isolate network segments Disconnect Internet access Apply null routing Long Term Containment If an affected system is a critical system, it may be necessary to keep it in production while a new system is built to take over its functions. After a backup of the system has been made for investigation, steps must be taken to mitigate the incident while leaving the system available. Long term containment steps include: Remove compromised accounts Apply security patches Alter firewall rules Remove Malware Place in a Dirty VLAN
  • 5. Analysis Media Analysis Recovery of information or evidence from information media The media may have been overwritten, damaged, degaussed, or re-used Network Analysis Analysis and examination of network logs and activity for potential evidence The critical phase of the process is proper evidence handling and processing Software Analysis Encompasses investigative activity Malware analysis Intellectual property disputes Copyright infringements Goals Author identification Content Analysis Payload and context Analysis Recovery Eventually the necessary steps to resolve the incident will be preformed. Recovery simply implies the amount of time it may take for operations to be fully restored Reporting and Documenting One of the most important, yet overlooked, phases is the debriefing and feedback phase Security Policy Review
  • 6. Which controls were inadequate or failed? How can we improve our controls? Did the Incident Management Plan function as intended? Physical Security Deter Delay Detect Assess Respond Defense in Depth The Practice of placing multiple layers of defenses (security controls) to provide redundancy in the event a control fails or a vulnerability is exploited Layered barrier designs are advantageous when they require increased knowledge, skill, and talent to circumvent them Important concept borrowed from the military and has been used since at least 216 BCE Access Control
  • 7. Ensures that only authorized personnel are permitted inside the controlled area Persons subject to control include employees, visitors, customers, vendors, and the general public Authorization Mechanisms typically include Identification Badges or Cards – Something you have Magnetic Stripe, Proximity Cards, or Smart Cards Closed Circuit TV (CCTV) A collection of cameras, recorders, switches, keyboards, and monitors that allow viewing and recording of security events Provides a highly flexible method of surveillance and monitoring Can provide deterrence, detection, and Evidentiary Archives External Monitoring Infrared (IR) sensors Microwave Coaxial strain-sensitive cable Lighting Cameras Monitor displays Guards Alarm Internal Access Doors
  • 8. Turnstiles Mantraps Keys Locks Safes Fire Prevention Classes of fires Data center requirements VESDA devices Classes of Fire Stages of a Fire A fire normally goes through four stages of development: Incipient (Pre-combustion) Visible smoke Fast flaming Heat
  • 9. Data Center Requirements Have suppression agents such as water, carbon dioxide, FM-200 (the industry-recognized replacement for Halon 1301), etc., on hand. Install alarms and sensors (i.e., ion-based or optical smoke detectors), and fixed, or rate-of-rise temperature sensors. Data centers require particularly sensitive alarms. Instead of commercial- grade fire alarms, data centers should have devices that signal the early stages of a fire through optical or chemical sensors that may sound an alarm before a fire even starts. VESDA Detectors VESDA (an abbreviation of Very Early Smoke Detection Apparatus) is a laser based smoke detection system. Fire Protection Heating, ventilation, and air conditioning systems maintain appropriate humidity and temperature controls as well as a contaminant-free air supply Monitoring systems can detect abnormal data center temperatures, humidity, or other factors HVAC Systems Heating, ventilation, and air conditioning systems maintain appropriate humidity and temperature controls as well as a contaminant-free air supply. Monitoring systems can detect abnormal data center temperatures, humidity, or other factors. Monitoring devices alert you to a potential problem before there is a disruption in service.
  • 10. Ideally, HVAC systems will have backup power and be isolated from the rest of the building. Power Electric power goals – Provide clean and steady power for data centers and include UPS (uninterruptible power supply) surge protectors and protection from transient noise, etc. Ensure that a proper electrical infrastructure is in place, and have this validated by a certified electrician. Mission-critical data centers should have alternate power sources, such as emergency generators, as well as a minimum 24-hour fuel supply.