Reproduction is Strictly ProhibitedCopyright © byEC-CouncilIncident Specific Procedures Best Practices for Creating a CSIRT Procedure for Handling Incident Types of Incidents and Level
Trang 1Ethical Hacking and Countermeasures
Version 6
Module LVIIComputer Forensics and Incident Handling
Ethical Hacking and Countermeasures v6
Module LVII: Computer Forensics and Incident handling
Exam 312-50
Trang 2EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Scenario
OrientRecruitmentInc is an online human resource recruitment firm
The web server of the firm is a critical link.
Neo, the network administrator sees some unusual activity that is targeted towards the web server The web server is overloaded with connection requests from huge number of different sources.
Before he could realize the potential of the attack, the website of OrientRecruitmentInc falls prey to the much famous Denial of Service Attack.
The company management calls up the local Incident Response Team to look into the matter and solve the DoS issue.
What steps will the incident response team take to investigate the attack?
Before he could realize the potential of the attack, the website of Orient Recruitment Inc falls to the famous Denial-of-Service attack
The company management calls up the local Incident Response Team to look into the matter and solve the DoS issue
What steps will the incident response team take to investigate the attack?
Trang 3EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Module Objective
• Computer Forensics
• What is an Incident
• Categories of Incidents
• Incident Response Checklist
• Procedure for Handling Incident
• Incident Management
• Incident Reporting
• What is CSIRT
• Types of Incidents and Level of Support
• Incident Specific Procedures
• Best Practices for Creating a CSIRT
Trang 4EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Incident Specific Procedures
Best Practices for Creating a CSIRT Procedure for
Handling Incident
Types of Incidents and Level of Support
What is CSIRT What is an Incident
Module Flow
Trang 5EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
To Know More About Computer Forensics, Attend EC-Council’s CHFI
Program
Trang 6EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Computer Forensics
Trang 7EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
What is Computer Forensics
“The preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.”
"Forensic Computing is the science of capturing, processing and investigating data from computers using a methodology whereby any evidence discovered is acceptable in a Court of Law.”
According to Steve Hailey of Cyber Security Institute, computer forensics is:
“The preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting
of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.”
Preservation
The forensic investigator must preserve the integrity of the original evidence The original evidence should not be modified or damaged The forensics examiner must make an image or a copy of the original evidence and then perform his analysis He must also compare the copy with the original evidence to identify any modifications or damages
Identification
The first and foremost step that a forensics examiner needs to take before starting with his investigations is that he must identify the evidence and its location For example, evidence may be contained in hard disks, other removable media, or even log files Every forensic examiner must understand the difference between actual evidence and evidence containers Locating and identifying information/data is a challenge for the digital forensics investigator Various examination processes such as keyword search, log files analysis, and system check help in investigation
Extraction
The immediate step after identifying the evidence is to extract data from them as soon as they are located Since volatile data can be lost at any point of time, the forensic investigator must extract these data from the copy he had made from the original evidence This extracted data must be compared with the original evidence and analyzed
Interpretation
The most important role played by a forensic examiner during investigations is to interpret what
he has actually found The analysis and inspection of the evidence must be interpreted in a lucid manner
Documentation
Trang 8Documentation relating to evidence must be maintained from the beginning of the investigation till the end where the evidence is presented before the court of law The documentation will comprise the chain of custody form and documents relating to evidence analysis
The basic methodology consists of what one can think of as the three A’s:
Due to the growing misuse of computers in criminal activities, there must be a proper set of methodologies for investigation Apart from methodologies, forensic tools also play an important role during investigations such as enabling the forensic examiner to recover deleted files, hidden files, and temporary data that the user may not locate The evidence acquired from computers are fragile and can be easily erased or altered There is another possibility where the seized computer can be compromised if not handled using proper methodologies
The methodologies involved in computer forensics may differ depending upon the procedures, resources, and target of the company Stand-alone computers, workstations, servers and online channels are some fundamental areas; a forensic investigator must concentrate on Investigation
of stand-alone computers, workstations and other removable media can be simple, whereas examination of servers and online channels can be complicated and tricky
Auditing and logging during investigations are often not executed They play a key role during investigations They must be given due importance, as they will provide leads to the case
Trang 9EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Need for Computer Forensics
“Computer forensics is equivalent of surveying a crime scene or performing an autopsy on a victim”
{Source: James Borek 2001}
Presence of a majority of electronic documents
Search and identify data in a computer
Digital Evidence can be easily destroyed, if not handled properly
For recovering Deleted, Encrypted, or Corrupted files from a system
According to James Borek (2001), “Computer Forensics is the equivalent of surveying a crime scene or performing an autopsy on a victim.”
The importance of computer forensics has developed in the present day scenario where computers are vulnerable to malicious purposes Computers are either used as a tool to commit a crime or have become a target for these attacks Computers are used to commit crimes, and crimes can be recorded on computers, including company policy breaches, fraud records, email crimes, revealing of valuable proprietary information and even terrorist activities
Law enforcement officials, network and system administrators of IT firms, attorneys and also private investigators depend upon qualified computer forensic experts to investigate their criminal and civil cases
A majority of documents these days exist in electronic format Computer evidence is delicate in nature; therefore they must be recorded to avoid loss of valuable evidence Computer forensics includes locating and recovering data that resides in a computer system and also recovering deleted, encrypted or damaged data This data will be helpful during presenting testimony before the court of law
Trang 10EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Objectives of Computer Forensics
To recover, analyze and present based material in such a way that it can be presented as evidence in a court of law
computer-To identify the evidence in short time, estimate potential impact of the malicious activity on the victim, and assess the intent and identity of the perpetrator
The critical phase of a computer forensic investigation is presenting the inferences of the previous phases (acquiring and analyzing) The objective is obvious; you must present the discoveredevidence in a way that is accepted by the court of law, which increases your chances of winning the case
Other objective is to discover the evidence in short time with accuracy The impact of the crime on the victim, such as loss of reputation and data has to be estimated along with intent and identity
of the intruder
Trang 11EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Stages of Forensic Investigation in Tracking Cyber Criminals
An Incident occurs in Which, the Company’s Server is compromised
The Client contacts the Company’s Advocate for Legal Advice
The Advocate contracts
an External Forensic Investigator
The Forensic Investigator Prepares First Response
of Procedures (FRP)
The FI seizes the evidences in the Crime scene & transports them to the Forensics Lab
The Forensic Investigator (FI) prepares the Bit-Stream images of the files
The Forensic Investigator creates an MD5 #
of the files
The Forensic Investigator examines the evidence files for proof of a Crime
The FI prepares Investigation reports and concludes the Investigation, enables the Advocate identify required proofs
The FI handles the sensitive Report to the Client in a secure manner
The Advocate studies the report and might press charges against the offensive in the Court of Law
The Forensic Investigator usually destroys
Trang 12EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Key Steps in Forensic Investigations
1 • Computer crime is suspected
2 • Collect preliminary evidence
3 • Obtain court warrant for seizure (if required)
4 • Perform first responder procedures
5 • Seize evidence at the crime scene
6 • Transport them to the forensic laboratory
7 • Create 2 bit stream copies of the evidence
EC-Council Copyright © by
EC-Council All Rights Reserved Reproduction is Strictly Prohibited
Key Steps in Forensic Investigations (cont’d)
8 • Generate MD5 checksum on the images
9 • Prepare chain of custody
10 • Store the original evidence in a secure location
11 • Analyze the image copy for evidence
12 • Prepare a forensic report
13 • Submit the report to the client
14 • If required, attend the court and testify as expert witness
The general procedure in forensic investigation is as follows:
Trang 1310 Store the original evidence in a secure location, preferably away from an easily accessible location
11 Analyze the image copy for evidence
12 Prepare a forensic report that describes the forensic method used, recovery tools used
13 Submit the report to the client
14 If required, attend the court and testify as an expert witness
Trang 14EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
List of Computer Forensics Tools
Process Explorer Autoruns Irfan View Adapterwatch Necrosoft Dig Visual TimeAnalyzer Evidor
Ontrack Forensic Sorter Directory Snoop
Helix Pslist Fport Psloggedon RegScanner X-Ways Forensics Traces Viewer
Sleuth Kit SMART Penguin Sleuth Kit
The following is a list of forensics tools:
Trang 15EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Incident Handling
Trang 16EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Present Networking Scenario
Increase in the number of companies venturing into e-business coupled with high Internet usage
Decrease in vendor product development cycle and product testing cycle
Increase in the complexity of Internet as a network
Alarming increase in intruder activities and tools, expertise of hackers, and sophistication of hacks
Lack of thoroughly trained professionals as compared to the number and intensity of security breaches
The network of the present age is growing at somewhat at the rate of growth of the universe, propounded by the Big Bang theory The Internet as a world wide web is growing at a very fast rate, and there are lots of applications running on the Internet growing at a faster rate resulting in the increase in complexities in the Internet
Reduction in the product development cycle, coupled with a decreased testing cycle, has given way to increase in the number of bugs in software Unchecked vulnerability in a network or weakness in design paves way to intruder activities
The learning curve for carrying out network attacks is decreasing rapidly due to easy availability
of hacking tools The denial-of-service (DoS) attack directed against major websites a few years ago have brought to light the security flaws
Until recently, the need for an incident response team within every organization was never given a serious thought There is a lack of trained professionals who can respond to incidents and minimize the effects Organizations are opting for in-house incident response team This module highlights the need for an incident response team, basic procedures in handling incidents, various CSIRTs present in the world and more
Trang 17EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
What is an Incident
Computer security incident is defined as “Any real or suspected adverse event in relation to the security of computer systems or computer networks”
• Source: www.cert.org
It also includes external threats such as gaining access to systems, disrupting their services through malicious spamming, execution of malicious codes that destroy or corrupt systems
An incident can be an event or set of events that threatens the security in computing systems and networks in any organization It also includes system crashes, packet flooding within a network, and unauthorized use of other user’s account, gaining access to unauthorized network privilege specially the administrator’s privilege
There are various types of incidents, which are found out after a comprehensive study of security attacks and security breaches occurred from time to time in the various organizations A standard qualification of the incidents is classified in following forms:
Trang 18These attempts are growing more now in the cyber world.
Pornographic trafficking:
The networks have become a natural source to store and transmit pornographic material The Internet governing bodies have banned pornography, and anything that involves this is therefore, illegal The electronic pornographic activity is common and is braking in everywhere
The computer and networks are being used worldwide to store, send, and receive child pornography also
The law broker’s embed the pornographic images to other images thus, making it difficult to track One famous technology used for this purpose is steganography
Organized crime activity:
Some of the organized illegal activities are done with the help of computers, such as drug trafficking making of illegal passports, running prostitution rackets and online smuggling, and providing unauthentic and illegal visas to people It also involves the illegal immigration of people without proper identity proof
Subversions:
A subversion is an incident in which a system does not behave as it was expected to It is supposed that the reason behind this kind of behavior of the system or the network is because of an attack
on the integrity of the system, network, or application, but in reality it is something more
Example of which can be putting bogus financial server to discover credit card or illegal indexing
of web pages In the case of subversion, the preparator modifies the web links so that whenever anyone connects to link he is transferred to any other location, which is unrelated or false Hoaxes:
A hoax is an email warning of some virus that may have devastating affect on the system This will
be posed as a new virus, which is unknown to anyone These emails provide false information about the virus and they also mention a company or an institution whose name is known by public to defame the company
Trang 19EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Category of Incidents: Low Level Low level incidents are the least severe kind of incidents
They should be handled within one working day after the event occurs They can be identified when there is:
Loss of personal password Suspected sharing of organization’s accounts Unsuccessful scans and probes Presence of any computer virus or worms
All incidents are of different intensity and complexity and occur under different situations or conditions also known as vulnerability The incidents are then classified according to the level of their intensity and affect on the network and systems
They are classified into three levels; these are low-level incidents, mid-level incidents, and level incidents The least harmful incidents are low-level incidents and it is better to handle them within one working day
high-The low level incidents can be identified by the following symptoms:
Trang 20EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Category of Incidents: Mid Level
The incidents at this level are comparatively more serious and thus, should be handled the same day the event occurs
• Violation of special access to a computer or computing facility
• Unfriendly employee termination
• Unauthorized storing and processing data
• Destruction of property related to a computer incident (less than $100,000)
• Personal theft of data related to computer incident($100,000)
• Computer virus or worms of comparatively larger intensity Illegal access to buildings
They can be identified by observing:
Mid-level incidents are more serious kind of incidents They should be handled within the same day the event occurs, that is normally two to four hours of the event that has occurred
Medium level incidents are identified by the following symptoms:
processing or storing the organization’s data
incidents
Trang 21EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Category of Incidents: High LevelThese are the most serious incidents and are considered as “Major” in nature
High level incidents should be handled immediately after the incident occurs
• Denial of Service attacks
• Suspected computer break-in
• Computer virus or worms of highest intensity; e.g Trojan back door
• Changes to system hardware, firmware, or software without authentication
• Destruction of property exceeding $100,000
• Personal theft exceeding $100,000 and illegal electronic fund transfer or download/sale
• Any kind of pornography, gambling, or violation of any law
These include:
High-level incidents are the most severe kind of incidents They are considered major in nature
These incidents should be handled as soon as possible, due to their high intensity and risk to a
company’s operation
The following can identify high-level incidents:
data
pornography is a severe crime and promoting it through computer and networks
is also considered under high-level incident
materials
high-level incidents
to the computer security officer for cyber security/designate
Other kind of incidents includes isolated viruses or misuse of computer equipment and
unintentional actions, along with common, unsuccessful scans or probes The organizations
should consult with the officer of cyber security in determining whether these “other” incidents
are high, medium, or low
Trang 22EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
How to Identify an Incident
A system alarm from an intrusion detection tool indicating security breach
Suspicious entries in a network Accounting gaps of several minutes with no accounting log Other events like unsuccessful login attempts, unexplained new user or files, attempts to write system files, modification, or deleting of data
Unusual usage patterns, such as programs being compiled in the account of users who are non-programmers
The use of intrusion detection tools is advisable as they aid the network administrator or staffs to warn them about the security breach encountered It is a very cumbersome task to identify any intrusion manually and also it may take a lot of time, which can be saved by employing an intrusion detection system The network administrator should be alert and check the suspicious entries in the network if any Though an intrusion detection system detects incidents, relying totally on IDS’s does not ensure 100% guarantee to the systems and networks
The symptoms are:
Trang 23EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
How to Prevent an Incident
A key to preventing security incidents is to eliminate as many vulnerabilities
as possible
Intrusions can be prevented by:
• Scanning the network/system for security loopholes
• Auditing the network/system
• Deploying Intrusion Detection/Prevention Systems on the network/system
• Establishing Defense-in-Depth
• Securing Clients for Remote Users
A key to preventing security incidents is to eliminate the maximum possible vulnerabilities
vulnerabilities are to be placed Scanning should be performed on regularly basis People are to be trained to handle the vulnerabilities
measure is taken when the level of noncompliance surpasses the set tolerance level for vulnerabilities on that part of the network
(ISA) logs and conducts remote access audits in order to ensure that access to remote accounts is enabled to authentic owners of those accounts
defense strategy, called defense in depth that can keep the network from threats rather than a single point of protection
users trying to remotely access the network are denied if they do not have correct patches, programs, and security settings
Trang 24EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Defining the Relationship between Incident Response, Incident Handling, and Incident
Management
Incident Management
Trang 25EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Incident Response Checklist
Potential Incident Verified Contact department/agency security staff
• I.T Manager
• [designee/others by department procedure]
-Security designee will contact CSIRT member
• Call 802-250-0525 (GOVnet Beeper)
• GOVnet will then contact CSIRT members (csirt@.state.vt.us)
• If no response within ten minutes call the Office of the CIO
Isolate system(s) from GOVnet [unless CSIRT decision is to leave the system connected to monitor active hacker]
Begin a log book - who/ what / when / where Identify the type of Incident - Virus, worm, and hacker Preliminary estimation of extent of problem, number of systems
EC-Council Copyright © by
EC-Council All Rights Reserved Reproduction is Strictly Prohibited
Incident Response Checklist
monitor active hacker]
Trang 26 Preliminary estimation of extent of problem, number of systems
CSIRT
Trang 27EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Incident handling is a set of procedures done to overcome the various kinds of incidents caused
by the various vulnerabilities in the systems To overcome those vulnerabilities the network administrator has to take some considerations for making the network of an organization safe, secure and free form vulnerabilities, which encourages the hackers to attack
Incident handling involves three basic functions:
Salient features of incident handling:
occurred
recover from the losses
with the help of incident reporting process
case of a severe incident
Trang 28EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Procedure for Handling IncidentThe incident handling process is divided into six stages
Whenever an incident is encountered a certain set of procedures should be followed to keep track
of the activities or events that occur and an analysis should be performed over the incident happened that up to what extent the damage has occurred and what made the incident happened and also what security measures should be taken so that the same incident doesn’t happens in the same way
There is a particular, standardized set of activities or steps that should be taken in order to handle the incident The incident response handling process is a 6-stage process Following are the six stages:
Trang 29EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Stage 1: PreparationPreparation enables easy coordination among staff Create a policy
Develop preventive measures to deal with threats Obtain resources required to deal with incidents effectively
Develop infrastructure to respond and support activities related to incident response Select team members and provide training
The company staffs should be notified for the regular changes to be taken place with the help of bulletin boards, notices and making the staffs familiar with the latest kind of virus worms and Spam and there affects and also how are they spread
Some special tools should be used to avoid potential damage and threats by the virus and worms.The systems should always be updated with the new virus detections and eradication tools to keep the systems and the network safe from the possible damages caused by these
Proper training should be provided to the staffs so that they are aware of the latest trends in the security configuration and management Periodic mock test for incidents should be conducted as
a matter of training given to the staff
Trang 30EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Incident identification involves four main steps, they are:
The first thing that is to be done, when there is a chance of an incident, the symptoms of the incidents should be analyzed according to the manual present with the employees to check whether an incident has really occurred or not
Some of the important symptoms that relate to the occurrence of an incident are given under:
anomaly in the data packets sent across the network where it is placed
Trang 31or intruders who can damage the systems, which contain important data or are important
as with respect to networking needs
Identifying nature of an incident:
The nature of incident should also be taken care of in order to take necessary action rightly suitable for particular kind of incidents It helps the incidence response team to take right kind of actions because a particular set of action had worked on an incident before So a lot of time and effort can be saved while identifying the nature of incident
Identifying the evidence:
Identifying the evidence is important in order to protect the date, number, evidence, and sign notes and printouts
Protecting the evidence:
The evidence must be preserved and proper documentation should be done indicting the sequence of individuals who had handled the incidence The exact sequence of incident handling should be maintained and evidence must be stored in a secure place
It should be taken care that there should not be any lapse of in maintaining date and time The integrity of the evidence should be taken care of well by keeping it in tamper proof media or by generating the cryptographic checksum or hash checksum
The full backup of system should be maintained The hackers are aware of the fact that there evidence is being captured so they tend to destroy the every trace of data kept in system by searching them out
Trang 32EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Stage 3: ContainmentContainment limits the extent and intensity of an incident
It avoids logging as root on the compromised system
Avoid conventional methods to trace back as this may alert the attackers
Perform the backup on the system to maintain the current state of the system for facilitating the post-mortem and forensic investigation later
Change the system passwords to prevent the possibility of Spywares being installed
It is the third stage of the incident handling procedure The first step that is taken in the containment stage is dealing with the critical information obtained from identification stage about the critical information and services provided by the computer It is the job of the CSO, the computer security officer to investigate and discuss with the management to find out where to keep the organization’s sensitive data
The information should be kept in a CD or any other system that may be disconnected with the network or to pass on the relevant information data and information to any other safer network
In case, simple or well known virus is found to be the culprit who does not pose any severe threat, then the organization should use the well known and effective virus eradication and detection tools and software to get rid of them
Changing passwords:
The password on all the affected systems should be changed to minimize any further loss of data
in the network and systems Also, the passwords of all the rest of the systems, which interact with the affected system, should be changed so that there are no more infected systems The uniqueness of the password for particular system should be taken care of
Backing up the infected systems:
Damaging code should be avoided:
Trang 33EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Stage 4: Eradication
Investigate further to uncover the cause of the incident by analyzing system logs
of various devices such as firewall, router, and host logs
Improve defenses on target host such as:
• Reloading of a new operating system
• Enabling firewalls
• Assigning new IP address
Install all the latest patches
Disable any unnecessary services
Install anti-virus software
Apply the Company’s security policy to the system
After the incident is identified and contained the next job is to eradicate the incident encountered
In the case of virus, the incident response team should remove the virus from all systems and media (e.g floppy disks and backup media) with the help of any of the proven virus eradication tool There are various kinds of incidents, which leave behind malicious objects that are hard to be located
Therefore the main job of the Incident response team is to locate malicious objects (like; Trojan horses) and to remove the residual of attacks done by hackers only if their presence poses a serious risk to justify the cost
Determining the cause and symptoms:
The data and information gathered during the containment phase serves as an aid in this step Most of the information regarding the type of incident, which is gathered, is useful in the eradication phase
This information can result into the termination and removal of these artifacts It may help to trace out the method by which an incident can be overcome
Improve Defenses:
The right kind of protection tools and techniques should be used such as firewalls, routers and router filters The new systems should be pointed to a new/IP address, or in extreme cases porting machines can be safer to an operating system
Vulnerability analysis:
Use real and secure or a comparable product as a vulnerability analysis tool to scan for vulnerable systems that are connected to affected systems The vulnerability tools are necessary concerning
to the intensity and capacity that an incident has or have
The vulnerability analysis is also necessary because it also provides the important information of the vulnerable points and areas present in the systems
It helps the team of professionals to track the weak areas in network designs so that it can be corrected The correction done according to vulnerabilities shown by the vulnerability tools helps
to make an effective design and it also helps to remove the anomalies present in it
Trang 34EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Stage 5: RecoveryDetermine the course of actions
Monitor and validate systems
Determine integrity of the backup itself by making an attempt to read its data
Verify success of operation and normal condition of system
Monitor the system by network loggers, system log files, and potential back doors
This is the stage in which the affected system is restored to its normal form There is again some standard set of steps, which ensures that the system infected is now secure Recovery of systems involves validating the systems and monitoring them for any further infection
The recovering actions are supposed to be restored only when it found out that the vulnerability has been removed
The two steps are as follows:
The intrusion in any enterprise or any organization can be simple or complex depending upon the amount of damage or potential damage posed by the incident
First of all the integrity of the systems is determined The integrity of the backup is also determined by attempting to read its data After the data is recovered from the systems and backups, they are verified to check the success of the operations of the system and check if the system is back to normal task monitoring This is a combination of the network loggers and system log files
The system is monitored for potential back doors, which can result into the loss of data Incident recovery doesn’t deal with forensics, but it includes tools for analysis and shows readers how to use them Different incidents have different response to different systems and therefore, the
Trang 35EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
• Extent to which the incidents disrupted the organization
• Data lost and its value
• Damaged hardware and its cost
Determine the staff time required and perform the following cost analysis:
EC-Council Copyright © by
EC-Council All Rights Reserved Reproduction is Strictly Prohibited
Stage 6: Follow-up (cont’d)
Document the response to incident by finding answers to the following:
Was the preparation for the incident sufficient?
Whether the detection occurred promptly or not, and why?
Using additional tools could have helped or not?
Was the incident contained?
What practical difficulties were encountered?
Was it communicated properly?
The process of following up an incident as soon as it recovers from the incident helps the incident response team to handle the incident in a very effective manner If more of the resources are employed than it may lead to flow large amount of money and funds into it, which will be a waste
of resources Hence, it is not cost-effective to devote more resources after an incident recovery process is over
The time required by the staff should be calculated in order to find out the correct cost A brief cost analysis should be done to find out the cost associated with the several events The cost analysis is done to determine the cost associated with the following:
organization
Trang 36 A separate analysis should be done to find out the amount of data lost and cost incurred on that
equipments incurred due to the incidents
The time required by the internal response team to respond to the incident and associated cost should be calculated
These may lead to the following cost analysis:
The process of documentation comes to great help to the organization as it not only helps in driving the financial cost associated with the system but also helps to find the budget that is to
be associated with the future security efforts
The incident response team is also concerned with the preparation of report that is including the lessons learned from and cost analysis described above The reports obtained from these can be used for training of staffs and professionals for this purpose
The important portion of the report specified, should be reported that could be used to further the staff’s awareness without making any changes to the security changes
Policy and procedure related to systems should be revised in accordance with the change in technology
The document that is prepared regarding obtaining the information is checked that how the response team has reported to the incident
The following questions should be imposed to get the relevant information
Trang 37EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Incident Management
Incident management is not just responding to an incident when it happens but includes proactive activities that help prevent incidents by providing guidance against potential risks and threats
Includes the development of a plan of action, a set of processes that are consistent, repeatable, of high quality, measurable, and understood within the constituency
Who performs Incident Management?
Human resource personnel Legal council
The firewall manager
An outsourced service provider
Incident management not only responds to the incidents but also gives alert to prevent potential risks and threats For example, the software that is open for the attacks is recognized before someone takes advantage of it
Below are the incident management activities and functions:
Conducting training sessions to spread awareness among users is a part of incident management plan This will help the end users to know more about computer security Users will be able to recognize suspicious events/incidents with ease and report the behavior of the attacker to the higher authority
The activities of the incident management are performed by the following:
he/she is suspected in doing the harmful computer activities in the organization
organization These rules can impact the security policies and practices of the organization internally when any system is used for harmful or malicious activities in the organization
made frequently So thereby he/she can prevent the attacks from proceeding further
harmful virus/malware
Trang 38Figure source:
http://www.cert.org/archive/pdf/04tr015.pdf#search=%22Incident%20Management%20CER T%22