SlideShare uma empresa Scribd logo
1 de 11
Phil Huggins
February 2004
   Reporting Methods
   Intrusion Detection Systems (IDS)
   Log Processing
   IT Reports / System Problems
   User Reports / Help Desk
   Public Relations / Media
   Call Tree
 Business Units should have some uniform way to
  report incidents
 The implementation of such will depend on the
  Business Unit size
 Examples include:
     General IT Helpdesk: Attendants must know who to
      contact for incidents
     Incident Hotline: Dedicated staff that only take incident
      reports, usually tied directly to the Response Team
     Head of IT Security: The least formal approach, not ideal
      for large organizations
   IDS systems attempt to identify an attack on
    a network or host as it is occurring
   Events are issued when attacks are detected
   A policy should exist for how to report &
    handle events
   We will look at these in more technical detail
    tomorrow.
 Unless specifically configured, auditing systems will
  not pro-actively warn a system administrator. Logs
  must be checked !
 Preparation is vital
     Most systems are capable of producing logs of activity.
     Many systems do not log by default, or do not log security
      events by default.
   Good system logs are more useful than anything
    else for incident response.
   IT commonly detects incidents while
    troubleshooting other problems (crashed
    server or application problems)
   What to Report:
       Identification
       Contact information
       Observations
       Evidence of observations
       IP Addresses or network ranges
   Users may issue reports to a Help Desk related to
    security incidents:
     Virus or worms
     Downed server
     Slow or no Internet access
   What to Report:
     Full name, user name, and location
     System type
     Observations
     Evidence of observations
 An attacker may alert the media that he has broken into a
  network
 The media will likely contact PR for a comment
 This could be the first report of an incident, so PR must be
  ready to ask the right questions
 What to ask:
       How did the attacker notify the media (email, IRC)
       Is the email or nickname of the attacker known
       What are the hostnames of the systems that were compromised
       How did the attacker gain access
       Did they steal sensitive information
       What do they want (publicity, money ..)
       Does the reporter trust the attacker is telling the truth
   A single method of reporting incidents will make
    responding easier
   Awareness is needed to educate employees on how
    and when to report incidents
   There are several types of IDS sensors
   IDS and logs require people to process the data for
    potential incidents
   PR could be the first point of contact and they
    typically are the least technical, awareness is
    needed so all information is collected
 After the incident has been detected, the proper
  people must be notified
 If a Call Tree has been created, it will now be used
 As a review, we may want to contact:
       Response Team
       Legal
       Public Relations
       Other IT groups
   For internal incidents, the number of people that are
    contacted should be limited
 Other security groups may need to know about the
  incident so they can be on alert
 Examples include:
     Firewall Team: Watch logs more closely and maybe restrict
      access
     IDS Team: Watch logs more closely and increase logging
      levels
     Remote Access Team: Watch logs more closely and
      increase logging levels
     Physical Security: Be on alert if an insider is suspected

Mais conteúdo relacionado

Mais procurados

2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
rajkumar jonuboyena
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 

Mais procurados (20)

Ids
IdsIds
Ids
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENTINFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
information security technology
information security technologyinformation security technology
information security technology
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 

Destaque

Destaque (18)

First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]
 
Practical Security Architecture Analysis
Practical Security Architecture AnalysisPractical Security Architecture Analysis
Practical Security Architecture Analysis
 
First Responders Course - Session 6 - Detection Systems [2004]
First Responders Course - Session 6 - Detection Systems [2004]First Responders Course - Session 6 - Detection Systems [2004]
First Responders Course - Session 6 - Detection Systems [2004]
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]
 
Diet Solution Reviews
Diet Solution ReviewsDiet Solution Reviews
Diet Solution Reviews
 
Intelligence-led Cybersecurity
Intelligence-led Cybersecurity Intelligence-led Cybersecurity
Intelligence-led Cybersecurity
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
 
First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]First Responder Course - Session 10 - Static Evidence Collection [2004]
First Responder Course - Session 10 - Static Evidence Collection [2004]
 
Security Metrics [2008]
Security Metrics [2008]Security Metrics [2008]
Security Metrics [2008]
 
First Responders Course - Session 7 - Incident Scope Assessment [2004]
First Responders Course - Session 7 - Incident Scope Assessment [2004]First Responders Course - Session 7 - Incident Scope Assessment [2004]
First Responders Course - Session 7 - Incident Scope Assessment [2004]
 
http://Chiropractor.forbostonmassachusetts.com
http://Chiropractor.forbostonmassachusetts.comhttp://Chiropractor.forbostonmassachusetts.com
http://Chiropractor.forbostonmassachusetts.com
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Managing Insider Risk
Managing Insider RiskManaging Insider Risk
Managing Insider Risk
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Resilience is the new cyber security
Resilience is the new cyber securityResilience is the new cyber security
Resilience is the new cyber security
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Shri krishna
Shri krishnaShri krishna
Shri krishna
 

Semelhante a First Responders Course - Session 5 - First Response [2004]

29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
joeymar143
 
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdfWhy Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
expressionnoveltiesk
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
Satyanandan Atyam
 

Semelhante a First Responders Course - Session 5 - First Response [2004] (20)

Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdfWhy Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
Why Use an IDPSSolutionPurpose and ScopeThis publication se.pdf
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Power of logs: practices for network security
Power of logs: practices for network securityPower of logs: practices for network security
Power of logs: practices for network security
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

First Responders Course - Session 5 - First Response [2004]

  • 2. Reporting Methods  Intrusion Detection Systems (IDS)  Log Processing  IT Reports / System Problems  User Reports / Help Desk  Public Relations / Media  Call Tree
  • 3.  Business Units should have some uniform way to report incidents  The implementation of such will depend on the Business Unit size  Examples include:  General IT Helpdesk: Attendants must know who to contact for incidents  Incident Hotline: Dedicated staff that only take incident reports, usually tied directly to the Response Team  Head of IT Security: The least formal approach, not ideal for large organizations
  • 4. IDS systems attempt to identify an attack on a network or host as it is occurring  Events are issued when attacks are detected  A policy should exist for how to report & handle events  We will look at these in more technical detail tomorrow.
  • 5.  Unless specifically configured, auditing systems will not pro-actively warn a system administrator. Logs must be checked !  Preparation is vital  Most systems are capable of producing logs of activity.  Many systems do not log by default, or do not log security events by default.  Good system logs are more useful than anything else for incident response.
  • 6. IT commonly detects incidents while troubleshooting other problems (crashed server or application problems)  What to Report:  Identification  Contact information  Observations  Evidence of observations  IP Addresses or network ranges
  • 7. Users may issue reports to a Help Desk related to security incidents:  Virus or worms  Downed server  Slow or no Internet access  What to Report:  Full name, user name, and location  System type  Observations  Evidence of observations
  • 8.  An attacker may alert the media that he has broken into a network  The media will likely contact PR for a comment  This could be the first report of an incident, so PR must be ready to ask the right questions  What to ask:  How did the attacker notify the media (email, IRC)  Is the email or nickname of the attacker known  What are the hostnames of the systems that were compromised  How did the attacker gain access  Did they steal sensitive information  What do they want (publicity, money ..)  Does the reporter trust the attacker is telling the truth
  • 9. A single method of reporting incidents will make responding easier  Awareness is needed to educate employees on how and when to report incidents  There are several types of IDS sensors  IDS and logs require people to process the data for potential incidents  PR could be the first point of contact and they typically are the least technical, awareness is needed so all information is collected
  • 10.  After the incident has been detected, the proper people must be notified  If a Call Tree has been created, it will now be used  As a review, we may want to contact:  Response Team  Legal  Public Relations  Other IT groups  For internal incidents, the number of people that are contacted should be limited
  • 11.  Other security groups may need to know about the incident so they can be on alert  Examples include:  Firewall Team: Watch logs more closely and maybe restrict access  IDS Team: Watch logs more closely and increase logging levels  Remote Access Team: Watch logs more closely and increase logging levels  Physical Security: Be on alert if an insider is suspected