IncidentResponse
IncidentResponse
c idents
ses Ac
u
Vir Soc
Stolen Laptop ial
E ngi
ne e
Theft of Proprietary Information ring
System Failure pe
Hac
ker p Ta
Intr
usio ck u
Fire! n B a
Lo st
Incident Response vs.
Business Continuity
Incident Response Business Continuity
Planning (IRP) Planning
Security-related Disaster Recovery
threats to systems, Plan
networks & data Continuity of
Data confidentiality Business Operations
Non-repudiable IRP is part of BCP
transactions and can be *the first
step*
Recovery Terms
Interruption Window: Time duration organization can wait
between point of failure and service resumption
Service Delivery Objective (SDO): Level of service in Alternate
Mode
Maximum Tolerable Outage: Max time in Alternate Mode
Disaster
Recovery
Plan Implemented
Regular Service Regular
Service
SDO Alternate Mode
Time… Restoration
Interruption (Acceptable) Plan Implemented
Interruption
Window
Copy disk
Computer Forensics
Did a crime occur?
If so, what occurred?
4) One-way Copy:
Original Cannot modify Mirror
original Image
5) Bit-by-Bit Copy:
Mirror image 3) Forensically Sterile:
1) & 6) Calculate Message Digest: Wipes existing data;
Before and after copy Records sterility
7) Calculate Message Digest
Validate correctness of copy
Computer Forensics
Data Protection: Notify people that evidence cannot be
modified
Data Acquisition: Transfer data to controlled location
Copy volatile data
Interview witnesses
Write-protect devices
Imaging: Bit-for-bit copy of data
Extraction: Select data from image (logs, processes, deleted
files)
Interrogation: Obtain info of parties from data (phone/IP
address)
Ingestion/Normalization: Convert data to an understood
format (ASCII, graphs, …)
Reporting: Complete report to withstand legal process
Legal Report
Describe incident details accurately
Be understandable and unambiguous
Offer valid conclusions, opinions, or
recommendations
Fully describe how conclusion is reached
Withstand legal scrutiny
Be created in timely manner
Be easily referenced
Forensics:
Chain of Custody Forms
Chain of Custody Form: Tracks where & how evidence
was handled. Includes:
Name & Contact info of custodians
Detailed identification of evidence (e.g, model, serial #)
When, why, and by whom evidence was acquired or moved
Where stored
When/if returned
Detailed Activity Logs
Checklists for acquiring technicians
Signed non-disclosure forms
Forensics: Case Log
Case log includes:
Case number
Case basic notes, requirements, procedures
Dates when requests were received
Dates investigations were assigned to
investigators
Date completed
Name and contact information for investigator
and requestor
Forensics:
Investigation Report
Name and contact info for investigators
Case number
Dates of investigation
Details of interviews or communications
Details of devices or data acquired (model, serial #)
Details of software/hardware tools used (must be
reputable in law)
Details of findings, including actual data
Signature of investigator
Question
Authenticity requires:
1. Chain of custody forms are completed
2. The original equipment is not touched during
the investigation
3. Law enforcement assists in investigating
evidence
4. The data is a true and faithful copy of the crime
scene
Question
You are developing an Incident Response Plan. An
executive order is that the network shall remain up, and
intruders are to be pursued. Your first step is to…
1. Use commands off the local disk to record what is in
memory
2. Use commands off of a memory stick to record what is in
memory
3. Find a witness and log times of events
4. Call your manager and a lawyer in that order
Question
What is NOT TRUE about forensic disk copies?
1. The first step in a copy is to calculate the message
digest
2. Extraction and analysis for presentation in court
should always occur on the original disk
3. Normalization is a forensics stage which converts
raw data to an understood format (e.g., ASCII,
graphs, …)
4. Forensic copies requires a bit-by-bit copy
Reference
Slide # Slide Title Source of Information
6 Recovery Terms CISM: page 230
8 Incident Response Plan (IRP) CISM: page 221, 222
9 Stage 1: Preparation CISM: page 221, 223
10 (1) Detection Technologies CISM: page 222
14 Stage 2: Identification CISM: page 222, 223
15 (2) Triage CISM: page 222
17 Stage 3: Containment CISM: page 223
18 (3) Containment – Response CISM: page 222
19 Stage 4: Analysis & Eradication CISM: page223 , 224
22 Stage 5: Recovery CISM: page 224
24 Stage 6: Lessons Learned CISM: page 224
25 Planning Processes CISM: page 228
26 Training CISM: page 227
27 Type of Penetration Tests CISA: page 378
28 Incident Management Metrics CISM: page 220
29 Challenges CISM: page 227
37 Computer Crime Investigation CISA: page 380
39 Chain of Custody CISA: page 380
43 Computer Forensics CISA: page 380, 381
44 Legal Report CISA: page 381
45 Forensics: Chain of Custody Forms CISA: page 375 and CISM: page 239
46 Forensics: Case Log CISM: page 239
47 Forensics: Investigation Report CISM: page 239