Troubleshooting & Managing Security Incidents 9 Flashcards
What is a computer crime
A criminal act that involves using a computer as a source or target.
Can involve stealing restricted information by hacking into a system, compromising national security, perpetuating fraud, conducting illegal activity, or spreading malicious code.
Describe security incident management
The set of practices and procedures that govern how an organization will respond to an incident in progress.
Goals are to contain the incident appropriately and minimize any damage that may occur as a result of the incident.
What is an IRP, Incident Response Policy
The security policy that determines the actions that an organization will take following a confirmed or potential security breach.
What are first responders
The first experienced person or team trained professionals that arrive on an incident scene. Can include security professionals, human resource personnel, or IT support professionals.
What is the chain of custody
The record of evidence handling from collection through presentation in court. The evidence can be hardware components, electronic data, or telephone systems.
Describe incident isolation
When a computer crime is reported the first thing to do is quarantine the affected devices. Then tag with a chain of custody record to secure the evidence for future presentation in court.
What is computer forensics
Deals with collecting and analyzing data from storage devices, computer systems, networks, wireless communications and presenting the information as evidence in a court of law.
What is order of volatility
The order in which data needs to be recovered after an incident before the data is erased or overwritten.
The ability to retrieve or validate data after a security incident depends on where it is stored In a location of a computer or external device.
Describe the general order of volatility for storage devices
Registers, cache, RAM
network caches and virtual memory
Hard drives anf flash drives
CD-ROMs, DVD-ROMs and printouts
Describe the four basic phases in a forensics process
Collection phase: id the attacked system an label it. Record details from those who have access to the system
Examination phase: forensically process collected data. Assess and extract the evidence.
Analysis phase: analyze results. Justify the reason for collecting and examining the data
Reporting phase: report result. Include tools and methods used and why things were done a certain way. Provide recommendations for better policies. Tools, procedures, and other methods in a forensic process.
Describe the basic forensic response procedures of IT
Capture system image. Make a bit-for-bit copy of a piece of media as an image file with high accuracy. A forensic image.
Examine network traffic and logs. Logs record everything that happens in an IPS or IDS and provide the evidence needed.
Capture video. Video forensics scrutinizes video for clues
Record time offset. The format in which time is recorded against a file activity. Local time offset against GMT
Take hashes. Hash codes generated by a file or software can be compared to the list of known file hashes
Take screenshots. Capture screenshot of each step of a forensic procedure.
Identify witnesses. A computer forensics expert witness is someone who has experience in handling computer forensics tools and to establish validity of evidence
Track man hours. Takes less than 40 man hours to complete a forensic investigation of a single computer. The increase in storage device capacities and encryption affect the amount of man hours that it can take to assess any damage.
Capturing this expense is part of the overall damage assessment for the incident.
What is big data analysis or general characteristics to look for when responding to a data breach
Difficult to forensically investigate
Unformatted or incorrectly formatted data Incomplete or missing data Invalid data Data that is out of range Data this is duplicated.
Describe the guidelines for responding to security incidents
If an IRP exists follow the guidelines outlined to respond to the incident
If an IRP does not exist, determine a primary investigator who will lead the team through the investigation process
Determine if events actually occurred and to what extent a system or process was damaged
Document the incident
Assess the damage and determine the impact on affected systems
Determine if outside expertise is needed
Notify local law enforcement if needed
Secure the scene so the hardware is contained
Collect all the necessary evidence. Observe the order of volatility as you gather electronic data from various media
Interview personnel to collect additional info pertaining to the crime
Report the investigation findings to the required people
Describe the basic incident recovery process
- Asses the level of damage caused by the incident
- Recover from the indecent
- Report the incident.
What is damage assessment
Done to determine the extent of damage, the origin or cause of the incident and the amount of expected downtown. Can determine the appropriate strategy to employ as you move into the recovery phase