Domain 7: Security Operations Flashcards
Process at an incident scene
Ensure you identify the scene, protect the environment, identify evidence and potential sources of evidence, collect evidence (hash) and minimise the degree of contamination
Locard’s Exchange Principle
Perpetrator of a crime will bring something into the crime scene and leave with something from it
Sufficient: Evidence
Persuasive enough to convince one of its validity
Reliable: Evidence
Consistent with fact, evidence has not been tampered with or modified
Relevant: Evidence
Relationship to the findings must be reasonable and sensible, proof of crime, documentation of events, proof of acts and methods used, motive proof, identification of acts
Permissible: Evidence
Lawful obtaining of evidence, avoid: unlawful search and seizure, secret recording, privacy violations, forced confessions
Techniques to Identify Evidence
Labeling, recording serial number. Evidence must be preserved and identifiable.
Evidence lifecycle
- Discovery
- Protection
- Recording
- Collection and identification
- Analysis
- Storage, preservation, transportation
- Present in court
- Return to owner
Witnesses that evidence is trustworthy, description of procedures, normal business methods collections, error precaution and correction
Best Evidence
Primary evidence is used at the trial because it is the most reliable. Original documents are used to document things such as contracts. This means NO COPIES. Further, oral evidence is not the best evidence, however, it can be used for interpretation of documents.
Secondary Evidence
Not as strong as best evidence, a copy is not permitted if the original is available. Further examples include, oral evidence like Witness testimony.
Direct Evidence
Can prove fact by itself and does not need any type of backup. Testimony from a witness - one of their five senses. Oral evidence is a type of secondary evidence so the case can’t simply stand on it alone. But it is Direct Evidence and does not need other evidence to substantiate.
Conclusive Evidence
Irrefutable and cannot be contradicted. Requires no other corroboration.
Circumstantial Evidence
Used to help assume another fact, however, cannot stand on its own to directly prove a fact
Corroborative Evidence
Supports or substantiates other evidence presented in a case
Hearsay Evidence
Something a witness hears another one say. Also business records are hearsay and all that’s printed or displayed. One exception to business records: audit trails and business records are not considered hearsay when the documents are created in the normal course of business.
Interviewing
Gather facts and determine the substance of the case
Interrogation
Evidence retrieval method, ultimately obtain a confession
The process - Due Care
- Prepare questions and topics, put witness at ease, summarise information - interview/interrogation plan
- Have one person as lead and 1-2 others involved aswell
- Never interrogate or interview alone
Opinion Rule
Requires witnesses to testify only about the facts of the case, cannot be used as evidence in the case
Expert Witnesses
Used to educate the jury, can be used as evidence
Six Principles of Digital Evidence
- Ensure you apply all of the general forensic and procedural principles
- Upon seizing digital evidence, ensure evidence is not changed
- When it is necessary for a person to access original digital evidence, that person should be trained for the purpose
- All activity relating to the seizure, access, storage, or transfer of digital evidence must be fully documented, preserved and available for review
- An individual is responsible for all actions taken to the digital evidence while it is in their possession
- Any agency seizing, accessing, storing, or transferring digital evidence is responsible for compliance with these principles.
Media Analysis
Involves the identification and extraction of information from storage media, such as hard disks and RAM. This may include recovery of deleted files or static analysis of forensic images of storage media.
Network Analysis
Analysis of network activity, such as network logs, packet captures. Focus is on collecting and correlating information from these disparate sources and produce as comprehensive a picture of network activity as possible.
Hardware/Embedded Device Analysis
Review the contents of hardware and embedded devices, such as phones and laptops.
Admissible Evidence
- Evidence must be relevant to determining a fact
- The fact that the evidence seeks to determine must be material (that is, related) to the case
- The evidence must be competent, meaning it must have been obtained legally. Evidence that results from an illegal search would be inadmissible because it is not competent.
Five rules of Evidence
- Be authentic; evidence tied back to scene
- Be accurate; maintain authenticity and veracity
- Be complete; all evidence collected, for and against view
- Be convincing; clear and easy to understand for jury
- Be admissible; be able to be used in court
Forensic Disk Controller
Intercepting and modifying or discarding commands sent to the storage device. This includes:
- Write blocking, intercepting write commands sent to the device and prevents them from modifying data on the device
- Return data requested by a read operation
- Returning access-significant information from device
- Reporting errors from device to forensic host
MOM: Investigation
Means, opportunity and motive. Determine suspects
Victimology
Why certain people are victims of crime and how lifestyle affects the changes that a certain person will fall victim to a crime investigation
Types of Investigation
- Operational
- Criminal
- Civil
- eDiscovery
Slack space
Slack space on a disk should be inspected for hidden data and should be included in a disk image
Common Law
Used in USA, UK, Australia and Canada (judges)
Civil Law
Europe, South America
Islamite and other Religious Laws
Middle East, Africa and Indonesia
USA’s 3 Branches of Law
- Legislative: writing laws (statutory laws)
- Executive: enforces laws (administrative laws)
- Judicial: interprets laws (makes common laws out of court decisions)
3 Categories of Laws
- Criminal Law
- Civil Law
- Administrative/Regulatory Laws
Criminal Law
Individuals that violate Government laws. Punishment is typically imprisonment
Civil Law
Wrongs against individual or organisation that result in a damage or loss. Punishment can include financial penalties. AKA tort law where jury decides liability
Administrative/Regulatory Laws
How the industries, organisations and officers have to act. Wrongs can be penalised with imprisonment or financial penalties.
Uniform Computer Information Transactions Act (UCITA)
Federal law which provides common framework for conduct of computer related business transactions. Provides basis for software licensing.
Types of computer crime
- Unauthorised intrusion
- Unauthorised alteration or destruction
- Malicious code
Enticement
is the legal action of luring an intruder, like in a honeypot.
Entrapment
Is the illegal act of inducing a crime, the individual had no intent of committing the crime at first
Federal Sentencing Guidelines
Provides judges and courts procedures on the prevention, detection and reporting
Purpose of Security Incident and Event Management (SIEM)
Automating much of the routine work of log review. Provide real-time analysis of events occurring on systems throughout an organisation but don’t necessarily scan outgoing traffic
Intrusion
Occurs when an attacker is able to bypass or thwart security mechanisms and gain access to an organisation’s resources
Intrusion Detection
Monitors recorded information and real-time events to detect abnormal activity indicating a potential incident or intrusion
IDS
Intrusion detection system automates inspection of logs and real-time system events to detect intrusion attempts and system failures
IPS
Intrusion prevention system includes all the capabilities of an IDS but can also take additional steps to stop or prevent intrusions.
DLP
Data Loss Prevention systems attempt to detect and block data exfiltration attempts. These systems have the capability of scanning data looking for keywords and data patterns.
Network Based DLP
Scans all outgoing data looking for specific data. Administrators would place it on the edge of the network to scan all data leaving the organisation. The system will scan, block and alert if a file was leaving the system.
Endpoint Based DLP
Can scan files stored on a system as well as files sent to external devices, such as printers. For example, an organisation endpoint-based DLP can prevent users from copying sensitive data to USB flash drives or sending sensitive data to a printer
3 States of Information
- Data at Rest (storage)
- Data in Transit (moving through network)
- Data being processed (must be decrypted) / in use / end-point
Configuration item (CI)
Component whose state is recorded. Version: recorded state of the CI
Configuration
Collection of component CI’s that make another CI
Building
Assembling a version of a CI using component CI’s
Build list
Set of versions of component CI’s used to build a CI software library
CI Software Library
Controlled area only accessible for approved users
Artifacts
Configuration Management
Recovery Procedures
System should restart in secure mode, startup should occur in maintenance mode that permits access only by privileged users from privileged terminals
Fault-tolerant
Systems continue to function despite failure
Fail safe system
Program execution is terminated and system protected from compromise when hardware or software failure occurs
Fail Closed/secure
Most conservative from a security perspective. Denies all further access.
Fail Open
Permits all access
Fail Hard
Such as BSOD, where human intervention to see why it failed is required
Fail soft or resilient system
Reboot, selected, non-critical processing is terminated when failure occurs
Failover
Switches to hot backup
Fail Safe
Doors UNLOCK
Fail Secure
Doors LOCK
Trusted Path
Protected data between users and a security component. Channel established with strict standards to allow necessary communication to occur without exposing the TCB to security vulnerabilities. A trusted path also protects system users (sometimes known as subjects) from compromise as a result of a TCB interchange. This is the only way to cross security boundary appropriately.
Events
Anything that happens. Can be documented, verified and analysed
Incident
Event or series of events that adversely impact the ability of the organisation to do business.
Security Incident
This could be a suspected attack.
Security Intrusion
Evidence attacker attempted or gained access
Lifecycle of incident
- Detection
- Response
- Mitigation
- Reporting
- Recovery
- Remediation
- Lessons Learned
It is all about response capability (policy, procedures a team) –> incident response and handling (triage, investigation, containment, and analysis of and tracking) –> Recovery (recovery/repair), –> debriefing/feedback (external communications) –> Mitigation: limit the effect or scope of an incident
RCA
Tree/Boolean - Fault Tree Analysis, such as:
- 5Ways
- Failure Mode and Effects Analysis
- Pareto Analysis
- Fault Tree Analysis
- Cause Mapping
HIDS: Firewalls
Host Based IDS, monitors activity on a single computer, including process calls and information recorded in firewall logs. Can examine events in more detail than NIDS. Benefits of HIDS include that it can detect anomalised on the host system that NIDS cannot detect
NIDS: Firewalls
Network based IDS, monitors and evaluates network activity to detect attacks or event anomalies. It cannot monitor the content of encrypted traffic but can monitor other packet details.
Full: Backup Type
All files, archieve bit and modify bit are cleared. Advantage: only previous day needed for full restore, disadvantage: time consuming
Incremental: Backup Type
Only backups modified files, archieve bit cleared. Advantage: least time and space, Disadvantage: first restore full then all incremental backups, thus less reliable because it depends on more components
Differential: Backup Type
Backups only modified files, doesn’t clear archive bit. Advantage: full and only last difference needed, intermediate time between full and diff
Redundant Servers
Applies RAID 1 mirroring concept to servers. On error servers can do a fail-over. This AKA server fault tolerance
Server clustering
Group of independent servers which are managed as a single system. All servers are online and take part in processing service requests. Individual computing devices on a cluster vs. a grid system - cluster devices all share the same OS and application software but grid devices can have different OSs while still working on same problem
Tape Rotation Schemes
Grandfather/Father/Son, Tower of Hanoi, Six Cartridge Weekly
RAIT
Robotic mechanisms to transfer tapes between storage and drive mechanisms
Mutual Aid Agreement: DRP
Arrangement with another similar corporation to take over processes. Advantage: cheap, disadvantage, must be exact same, is there enough capability, only for short term, and what if disaster affects both corporations. Is not enforceable.