1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Security+ Certification: Chapter 11 - Trung tâm Athena

90 59 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 90
Dung lượng 1,51 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.

Trang 1

Chapter 11

Incident Response

Trang 2

 Incident Response Overview

Trang 3

Incident Response –

Why is it Critical?

• Find out what happened

• How it happened

• Who did it

 Create a record of the incident for later use

ATHENA

• Find out what happened

• How it happened

• Who did it

 Create a record of the incident for later use

Trang 4

Elements of Incident Response

Trang 6

The process of determining whether or not anincident has occurred and the nature of anincident Identification may occur through theuse of automated network intrusion

equipment or by a user or SA

Identification is a difficult process Noticing thesymptoms of an incident is often difficult

There are many false positives However,noticing an anomaly should drive the observer

to investigate further

ATHENA

The process of determining whether or not anincident has occurred and the nature of anincident Identification may occur through theuse of automated network intrusion

equipment or by a user or SA

Identification is a difficult process Noticing thesymptoms of an incident is often difficult

There are many false positives However,noticing an anomaly should drive the observer

to investigate further

Trang 7

Who can identify an Incident

my files have changed

files missing, accounts add/deleted, weird stuffhappening , anomalies in the logs

Automatically ID violations to policies

ATHENA

my files have changed

files missing, accounts add/deleted, weird stuffhappening , anomalies in the logs

Automatically ID violations to policies

Trang 8

Possible Incident Classifications

 Unauthorized Privileged (root) Access – Access gained to a system and the use of root privileges without authorization.

 Unauthorized Limited (user) Access – Access gained to a system and the use of user privileges without authorization.

 Unauthorized Unsuccessful Attempted Access – Repeated attempt to gain access as root or user on the same host, service, or system with a certain number of connections from the same source.

Trang 9

Possible Incident Classifications

(cont.)

 Unauthorized Probe – Any attempt to gather information about

a system or user on-line by scanning a site and accessing ports through operating system vulnerabilities.

 Poor Security Practices – Bad passwords, direct privileged

logins, etc, which are collected from network monitor systems.

 Denial of Service (DOS) Attacks – Any action that preempts or degrades performance of a system or network affecting the mission, business, or function of an organization.

ATHENA

 Unauthorized Probe – Any attempt to gather information about

a system or user on-line by scanning a site and accessing ports through operating system vulnerabilities.

 Poor Security Practices – Bad passwords, direct privileged

logins, etc, which are collected from network monitor systems.

 Denial of Service (DOS) Attacks – Any action that preempts or degrades performance of a system or network affecting the mission, business, or function of an organization.

Trang 10

 Malicious Logic – Self-replicating software that is

viral in nature; is disseminated by attaching to ormimicking authorized computer system files; or acts

as a trojan horse, worm, malicious scripting, or a logicbomb Usually hidden and some may replicate

Effects can range from simple monitoring of traffic tocomplicated automated backdoor with full system

rights

Possible Incident Classifications (cont.)

ATHENA

 Malicious Logic – Self-replicating software that is

viral in nature; is disseminated by attaching to ormimicking authorized computer system files; or acts

as a trojan horse, worm, malicious scripting, or a logicbomb Usually hidden and some may replicate

Effects can range from simple monitoring of traffic tocomplicated automated backdoor with full system

rights

Trang 11

Possible Incident Classifications

Trang 12

The process of limiting the scope and magnitude of anincident

As soon as it is recognized that an incident has occurred

or is occurring, steps should immediately be taken tocontain the incident

ATHENA

The process of limiting the scope and magnitude of anincident

As soon as it is recognized that an incident has occurred

or is occurring, steps should immediately be taken tocontain the incident

Trang 13

Containment - Example

 Incidents involving using malicious code are common, and since malicious code incidents can spread rapidly, massive destruction and

compromise of information is possible.

 It is not uncommon to find every workstation connected to a LAN infected when there is a virus outbreak.

• Internet Worm of 1988 attacked 6,000 computers in the U.S in one day.

• LoveBug Virus affected over 10Million computers with damage estimated between $2.5B-$10B US

• Kournikova worm affects still being analyzed

ATHENA

 Incidents involving using malicious code are common, and since malicious code incidents can spread rapidly, massive destruction and

compromise of information is possible.

 It is not uncommon to find every workstation connected to a LAN infected when there is a virus outbreak.

• Internet Worm of 1988 attacked 6,000 computers in the U.S in one day.

• LoveBug Virus affected over 10Million computers with damage estimated between $2.5B-$10B US

• Kournikova worm affects still being analyzed

Trang 14

• For a virus – anti-virus software is best

• For a network may involve block/filter IP address at the router/firewall

• Ideally, but difficult, best eradicated by bringing the perpetrators into legal custody and convicting them in a court of law.

ATHENA

• For a virus – anti-virus software is best

• For a network may involve block/filter IP address at the router/firewall

• Ideally, but difficult, best eradicated by bringing the perpetrators into legal custody and convicting them in a court of law.

Trang 16

 Critical

 Activities Include:

• Analyze the Incident and the Response

• Analyze the Cost of the Incident

• Prepare a Report

• Revise Policies and Procedures

ATHENA

 Critical

 Activities Include:

• Analyze the Incident and the Response

• Analyze the Cost of the Incident

• Prepare a Report

• Revise Policies and Procedures

Trang 17

What is Computer Forensics?

Computer Forensics can be defined simply,

as a process of applying scientific and analytical techniques to computer

Operating Systems and File Structures in determining the potential for Legal

Evidence.

ATHENA

Computer Forensics can be defined simply,

as a process of applying scientific and analytical techniques to computer

Operating Systems and File Structures in determining the potential for Legal

Evidence.

Trang 18

Why is Evidence important?

 In the legal world, Evidence is

EVERYTHING.

 Evidence is used to establish facts.

 The Forensic Examiner is not biased.

ATHENA

Trang 19

Who needs Computer Forensics?

Trang 20

Who are the Victims?

Trang 21

ATHENA

Trang 24

 ID the perpetrator.

 ID the method/vulnerability of the network that allowed the perpetrator to gain access into the system.

victimized network.

 Preserve the Evidence for Judicial action.

Reasons for a Forensic Analysis

ATHENA

 ID the perpetrator.

 ID the method/vulnerability of the network that allowed the perpetrator to gain access into the system.

victimized network.

 Preserve the Evidence for Judicial action.

Trang 25

 Disk Forensics

 E-mail Forensics

 Internet (Web) Forensics

Types of Computer Forensics

ATHENA

 Disk Forensics

 E-mail Forensics

 Internet (Web) Forensics

Trang 26

Disk Forensics

 Disk forensics is the process of acquiring and analyzing the data stored on some form of physical storage media.

deleted data

• Includes file identification, which is theprocess used to identify who created aparticular file or message

– Melissa Virus

ATHENA

 Disk forensics is the process of acquiring and analyzing the data stored on some form of physical storage media.

deleted data

• Includes file identification, which is theprocess used to identify who created aparticular file or message

– Melissa Virus

Trang 27

Network Forensics

 Network forensics is the process of examining network traffic It includes:

• After the fact analysis of transaction logs

• After the fact analysis of transaction logs

– Sniffers

– Real-time tracing

Trang 28

E-mail Forensics

content of electronic mail as evidence

• It includes the process of identifying the actual sender and recipient of a message, the date and time it was sent, and where it was sent from.

• E-mail has turned out to be the Achilles Heal for many individuals and organizations.

• Many time issues of sexual harassment, racial and religious prejudice, or unauthorized activity are tied to e-mail.

ATHENA

content of electronic mail as evidence

• It includes the process of identifying the actual sender and recipient of a message, the date and time it was sent, and where it was sent from.

• E-mail has turned out to be the Achilles Heal for many individuals and organizations.

• Many time issues of sexual harassment, racial and religious prejudice, or unauthorized activity are tied to e-mail.

Trang 29

Internet Forensics

 Internet or Web forensics is the process ofpiecing together where and when a user hasbeen on the Internet

• For example, it is used to determine whether the download of pornography was accidental or not.

ATHENA

 Internet or Web forensics is the process ofpiecing together where and when a user hasbeen on the Internet

• For example, it is used to determine whether the download of pornography was accidental or not.

Trang 30

Source Code Forensics

 Source code forensics is used to determine software ownership or software liability issues.

• It is not merely a review of the actual source code.

• It is an examination of the entire development process, including development procedures, review

of developer time sheets, documentation review and the review of source code revision practices.

ATHENA

 Source code forensics is used to determine software ownership or software liability issues.

• It is not merely a review of the actual source code.

• It is an examination of the entire development process, including development procedures, review

of developer time sheets, documentation review and the review of source code revision practices.

Trang 31

Technological Progress

Sense of Anonymity

Sense of Anonymity

Trang 32

Technological Progress

Albert Einstein said “Technological

progress is like an axe in the hands

of a pathological criminal.”

ATHENA

Albert Einstein said “Technological

progress is like an axe in the hands

of a pathological criminal.”

Trang 33

• Crime Without Punishment

• Crime Without Punishment

• Media Sensationalism

• Public Apathy

• Easy to Commit

Trang 34

What is Cyber Crime?

 A crime in which technology plays

an important, and often a necessary, part.

• The computer is:

– the target of an attack

– the tool used in an attack

– used to store data related to criminal activity

ATHENA

 A crime in which technology plays

an important, and often a necessary, part.

• The computer is:

– the target of an attack

– the tool used in an attack

– used to store data related to criminal activity

Trang 35

Types of Cyber Crime

 Forgery and Counterfeiting

 Internet Fraud – “Imposter Sites”

 SEC Fraud and Stock Manipulation

 Child Pornography

 Stalking & Harassment

 Credit Card Fraud & Skimming

 Forgery and Counterfeiting

 Internet Fraud – “Imposter Sites”

 SEC Fraud and Stock Manipulation

 Child Pornography

 Stalking & Harassment

 Credit Card Fraud & Skimming

Trang 36

Contemporary Issues in Computer Forensics

Handle High-Tech Crime

• Shortage of Trained Investigators & Analysts

• Lack of Forensic Standards

• Large Disk Drives and Disk Arrays

• High Speed Network Connections

ATHENA

Handle High-Tech Crime

• Shortage of Trained Investigators & Analysts

• Lack of Forensic Standards

• Large Disk Drives and Disk Arrays

• High Speed Network Connections

Trang 37

Contemporary Issues in Computer Forensics

Must not Violate the following:

ATHENA

Must not Violate the following:

Trang 39

 Ensure that all software tools utilized for the analysisare tested and widely accepted for use in the forensicscommunity.

 Ensure that all software tools utilized for the analysisare tested and widely accepted for use in the forensicscommunity

Trang 40

 Protect the integrity of the evidence Maintain control until final disposition.

 Prior to Booting target computer,

DISCONNECT HDD and verify CMOS.

ATHENA

Trang 41

 Utilize disk “imaging” software to make an

exact image of the target media Verify the image.

 When conducting an analysis of target media, utilize the restored image of the target media; never utilize the actual target media.

ATHENA

 Utilize disk “imaging” software to make an

exact image of the target media Verify the image.

 When conducting an analysis of target media, utilize the restored image of the target media; never utilize the actual target media.

Trang 45

 “The Scene”

 Utilize Screen Capture/Copy Suspected files

 All apps for Analysis/apps on Examined

 Utilize Screen Capture/Copy Suspected files

 All apps for Analysis/apps on Examined

system.

Trang 46

Forensic Tools

 Forensic Tool Kit

 Forensic Software

ATHENA

 Forensic Tool Kit

 Forensic Software

Trang 47

Forensic Tool Kit

ATHENA

Trang 48

Forensic System Hardware

• Image MASSter 500 & 1000

• Image MASSter 500 & 1000

Strap

 UPS

Trang 49

Media Options

room for expansion and external media

Systems

ATHENA

Trang 50

Media Options

 Internal Hard Disk

 Tape Media

• QIC Tape Drive

• Travan Tape Drive

• QIC Tape Drive

• Travan Tape Drive

Trang 52

Disk Imaging Hardware

 Supports IDE & SCSI

 Sector by Sector Copy

• DOS, Windows 3.1,

• Windows 95, NT, SCO,

• UNIX, OS/2 & Mac O/S

 Full Read/Write Verification &

Reporting

 Logging Capability

 No Writing to Master Disk

ATHENA

 Supports IDE & SCSI

 Sector by Sector Copy

• DOS, Windows 3.1,

• Windows 95, NT, SCO,

• UNIX, OS/2 & Mac O/S

 Full Read/Write Verification &

Reporting

 Logging Capability

 No Writing to Master Disk

Trang 53

Forensic Software

 Search & Recovery Utilities

 File Viewing Utilities

 Cracking Software

 Archive & Compression Utilities

ATHENA

 Search & Recovery Utilities

 File Viewing Utilities

 Cracking Software

 Archive & Compression Utilities

Trang 55

Disk Imaging Software

 Bit Level Copy of the Disk, not File Level

 Bit Level Copy of the Disk, not File Level

• EnCase

• SafeBack

• SnapBack

Trang 56

Search Utilities

 Forensic Software

 File System Utilities

 Norton Utilities

ATHENA

 Forensic Software

 File System Utilities

 Norton Utilities

Trang 57

File Viewing Utilities

 Quick View Plus

 Drag & View

ATHENA

Trang 58

Forensic Analysis

• Lock the Disk

• Create an Image of the Disk(s)

• File System Authentication

• List Disk Directories and File Systems

• Locate Hidden or Obscured Data

• Cluster Analysis

ATHENA

• Lock the Disk

• Create an Image of the Disk(s)

• File System Authentication

• List Disk Directories and File Systems

• Locate Hidden or Obscured Data

• Cluster Analysis

Trang 59

File System Authentication

 Integrity of data related to any seizure is

Trang 60

File System Authentication

ATHENA

Trang 61

List Directories and Files

ATHENA

Trang 62

Identify Suspect Files

Trang 63

Hidden & Obscure Data

 Hidden File Attributes

Trang 64

Steganography Denies the Data Exists

ATHENA

Steganography Denies the Data Exists

Trang 65

Slack Space

ATHENA

Trang 67

Evidence Protection

• Provides shielding from electrostatic discharge by safely enveloping static sensitive devices in a

humidity-independent Faraday cage The nickel

shielding layer creates a Faraday type shield Meets

MIL-B-81705 and DoD-STD-1686A

ATHENA

• Provides shielding from electrostatic discharge by safely enveloping static sensitive devices in a

humidity-independent Faraday cage The nickel

shielding layer creates a Faraday type shield Meets

MIL-B-81705 and DoD-STD-1686A

Ngày đăng: 30/01/2020, 12:19

TỪ KHÓA LIÊN QUAN