SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Security Incident Handling for
Schools
Bernard Kan
Senior Consultant
HKCERT
Agenda
•About HKCERT
•Security Incidents that Impact Schools
•Incident Handling Life Cycle
•Challenge of Security Incident Handling
•Key Take Away
Hong Kong Computer Emergency
Response Team Coordination Centre
•Established in 2001
•Funded by the HKSAR Government
•Operated by Hong Kong Productivity Council
(香港生產力促進局)
•Mission
–As the coordination of local cyber security incidents,
serving Internet Users and SMEs in Hong Kong
–As the Point of Contact of cyber security incidents
across the border
香港電腦保安事故協調中心
Security Incidents that
Impact Schools
4
What is a Security Incident
Security incident broadly refer to those
incidents resulting from deliberate malicious
technical activities
Can result from a malware (ransomware, worm,
virus, etc.), other malicious codes, or a system
intruder, either insider or outsider
5
Security Incidents that
Impact Schools
6
Ransomware Incident
Hacking Extortions
WWPKG 縱橫遊 (Nov 2017)
Affected 200,000 Hong Kong users
Attacker demanded millions of HKD in Bitcoins
BigLine 大航假期 (Jan 2018)
Goldjoy 金怡假期 (Jan 2018)
Attacker claimed to compromise system obtaining
customer data and demanded ransom
Ransomware via RDP –
CrySIS / Dharma
Encrypted files with extension .aerna
10
DDoS Attack
Ransom E-mails
Information Leakage
•Loss of devices
–Disks / USB
Thumb Drive
–Mobile Devices
Loss of Notebook
How Do We Handle
Incidents?
14
Incident Handling Life Cycle
Preparation (1)
•Senior management assign someone responsible for security
incident (e.g. IT staff, security staff, etc.) & setup an incident
response team
•Design the flow and process of incident handling, tools & resources
needed
–R&R of staff
–Contact list (senior management, staff, vendors, etc.)
–Incident report mechanisms – forms, emails, IM, etc.
–Secure communication channels & storage
–War room & conference equipment (e.g. con call no.)
Preparation (2)
•Implement monitoring & response capability
–Centralized logging (e.g. server logs, IDS/IPS logs, MRTG, anti-
virus, etc.)
–Prepare forensic tools & skills (forensic workstations, backup
devices, USBs, packet sniffers / protocol analyzers, forensic
software, skills) – can consider outsource to vendor
–System documentations (e.g. system manuals, network
diagrams, hardware & software inventory, firewall rules, etc.)
–Need to build a baseline: what is normal & abnormal
Detection and Analysis (1)
•Detection:
–Users (teachers, students, etc.) needed be aware of incident
handling flow and report to helpdesk or IT staff when
abnormality is detected
–IT staff needed be aware of abnormality happened in systems &
network (from logs, system alerts, user reports, etc.)
–IT or security staff needed be aware of publicly available or
external intelligence (e.g. new vulnerabilities & attack
information, incidents of related organizations, external reports,
etc.) – HKCERT plays a role here
Detection and Analysis (2)
•Analysis
–Need someone understand the normal behavior & determine if
reported behavior is abnormal - a process called “Triage”
–If confirmed to be a security incident, then handle the incident
according to pre-defined incident handling process
–Centralized logs can be used in “event correlation” (need time
synchronization as well)
–Determine of the scope of impact (what systems are involved,
what data is involved, what users are involved, etc.) - an
important process called “Impact Assessment”
Detection and Analysis (3)
•Analysis (con’t)
–Documentation & logging during handling is important
(especially for potential court cases)
–Document discovered events & time, phone conversations, file
changes made, etc.
–Work in team of two, one do the work, one check the work (or
sign)
–Maintain the “Chain of Custody”
–Keep senior management informed of the progress
Detection and Analysis (4)
•Prioritization
–If many events happen in quick succession then need to
prioritize them
•root compromise vs worm spreading
•public web server vs internal file server
–Need to consider service level agreement SLA (if any)
•Maximum down time
•Minimum respond time
Detection and Analysis (5)
•Notifications
–Senior Management
–Head of information security
–Other incident teams
–System owner
–Human resources (if it involves employees)
–Public affairs (if it might generate publicity)
–Legal dept
–Public stake holders
–HKCERT, EDB ITE Section and/or HKPF if necessary
Containment, Eradication and
Recovery (1)
•Containment Strategy
–Method
•Shut down
•Disconnect from the network (wired or wireless)
•Segment the network
•Disable functions
•Block hosts or ports at the perimeter
•Rebuild or clean
•Check with HKCERT for malware/ransomware solution (if any)
Containment, Eradication and
Recovery (2)
•Containment Strategy
–Considerations
•Potential damage to and reduce of resources
•Need for evidence preservation
•Service availability
•Time needed to implement the strategy
•Effectiveness of the strategy
•Duration of the solution
–Emergency work around (several hours)
–Temporary work around (several weeks)
25
Post Incident Activities
•Lessons learned
•Policy updates
•Improvements be made to Preparation phase
•Pursue legal action (work with HKPF)
26
Challenges of Incident Handling
•Users awareness problem – incidents keep on repeating
•New system vulnerabilities discovered frequently –
difficulties in keep up with security patches
•New security issues with new technologies e.g. mobile
devices, IoT devices, etc.
•Lack of security resources e.g. budget & personnel
27
Points to Take Away
• Security incidents are common nowadays in organizations and
schools are also impacted by incidents
• Security incident handling capability needed be setup in order to
minimize risk and impact when incidents happened
• Incident Handling Life Cycle involved 4 phases: Preparation,
Detection & Analysis, Containment Eradication & Recovery and Post
Incident Activities
• Organizations / Schools need to allocate appropriate security
resources to get prepared for potential security incidents
Thanks
28

Mais conteúdo relacionado

Mais procurados

5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
isc2-hellenic
 

Mais procurados (20)

What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Digital Forensics Triage and Cyber Security
Digital Forensics Triage and Cyber SecurityDigital Forensics Triage and Cyber Security
Digital Forensics Triage and Cyber Security
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Ch01
Ch01Ch01
Ch01
 
Larry fermi generic nac overview-expanded - atlseccon2011
Larry fermi   generic nac overview-expanded - atlseccon2011Larry fermi   generic nac overview-expanded - atlseccon2011
Larry fermi generic nac overview-expanded - atlseccon2011
 
9780840024220 ppt ch12
9780840024220 ppt ch129780840024220 ppt ch12
9780840024220 ppt ch12
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
Select idps
Select idpsSelect idps
Select idps
 
CNIT 121: 16 Report Writing
CNIT 121: 16 Report WritingCNIT 121: 16 Report Writing
CNIT 121: 16 Report Writing
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Emerging Threats and Strategies of Defense
Emerging Threats and Strategies of Defense Emerging Threats and Strategies of Defense
Emerging Threats and Strategies of Defense
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
MineMeld and the Importance of Centralized Threat Intelligence
MineMeld and the Importance of Centralized Threat IntelligenceMineMeld and the Importance of Centralized Threat Intelligence
MineMeld and the Importance of Centralized Threat Intelligence
 
9780840024220 ppt ch11
9780840024220 ppt ch119780840024220 ppt ch11
9780840024220 ppt ch11
 

Semelhante a Security Incident Handling for Schools

Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
cavapyta
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
cavapyta
 

Semelhante a Security Incident Handling for Schools (20)

Incident Response
Incident ResponseIncident Response
Incident Response
 
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract OralsGSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
 
FireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesFireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slides
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
Incident response
Incident responseIncident response
Incident response
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)
 
Network security
Network securityNetwork security
Network security
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 

Mais de eLearning Consortium 電子學習聯盟

Mais de eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 

Último

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 

Último (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

Security Incident Handling for Schools

  • 1. Security Incident Handling for Schools Bernard Kan Senior Consultant HKCERT
  • 2. Agenda •About HKCERT •Security Incidents that Impact Schools •Incident Handling Life Cycle •Challenge of Security Incident Handling •Key Take Away
  • 3. Hong Kong Computer Emergency Response Team Coordination Centre •Established in 2001 •Funded by the HKSAR Government •Operated by Hong Kong Productivity Council (香港生產力促進局) •Mission –As the coordination of local cyber security incidents, serving Internet Users and SMEs in Hong Kong –As the Point of Contact of cyber security incidents across the border 香港電腦保安事故協調中心
  • 5. What is a Security Incident Security incident broadly refer to those incidents resulting from deliberate malicious technical activities Can result from a malware (ransomware, worm, virus, etc.), other malicious codes, or a system intruder, either insider or outsider 5
  • 8. Hacking Extortions WWPKG 縱橫遊 (Nov 2017) Affected 200,000 Hong Kong users Attacker demanded millions of HKD in Bitcoins BigLine 大航假期 (Jan 2018) Goldjoy 金怡假期 (Jan 2018) Attacker claimed to compromise system obtaining customer data and demanded ransom
  • 9. Ransomware via RDP – CrySIS / Dharma Encrypted files with extension .aerna
  • 12. Information Leakage •Loss of devices –Disks / USB Thumb Drive –Mobile Devices
  • 14. How Do We Handle Incidents? 14
  • 16. Preparation (1) •Senior management assign someone responsible for security incident (e.g. IT staff, security staff, etc.) & setup an incident response team •Design the flow and process of incident handling, tools & resources needed –R&R of staff –Contact list (senior management, staff, vendors, etc.) –Incident report mechanisms – forms, emails, IM, etc. –Secure communication channels & storage –War room & conference equipment (e.g. con call no.)
  • 17. Preparation (2) •Implement monitoring & response capability –Centralized logging (e.g. server logs, IDS/IPS logs, MRTG, anti- virus, etc.) –Prepare forensic tools & skills (forensic workstations, backup devices, USBs, packet sniffers / protocol analyzers, forensic software, skills) – can consider outsource to vendor –System documentations (e.g. system manuals, network diagrams, hardware & software inventory, firewall rules, etc.) –Need to build a baseline: what is normal & abnormal
  • 18. Detection and Analysis (1) •Detection: –Users (teachers, students, etc.) needed be aware of incident handling flow and report to helpdesk or IT staff when abnormality is detected –IT staff needed be aware of abnormality happened in systems & network (from logs, system alerts, user reports, etc.) –IT or security staff needed be aware of publicly available or external intelligence (e.g. new vulnerabilities & attack information, incidents of related organizations, external reports, etc.) – HKCERT plays a role here
  • 19. Detection and Analysis (2) •Analysis –Need someone understand the normal behavior & determine if reported behavior is abnormal - a process called “Triage” –If confirmed to be a security incident, then handle the incident according to pre-defined incident handling process –Centralized logs can be used in “event correlation” (need time synchronization as well) –Determine of the scope of impact (what systems are involved, what data is involved, what users are involved, etc.) - an important process called “Impact Assessment”
  • 20. Detection and Analysis (3) •Analysis (con’t) –Documentation & logging during handling is important (especially for potential court cases) –Document discovered events & time, phone conversations, file changes made, etc. –Work in team of two, one do the work, one check the work (or sign) –Maintain the “Chain of Custody” –Keep senior management informed of the progress
  • 21. Detection and Analysis (4) •Prioritization –If many events happen in quick succession then need to prioritize them •root compromise vs worm spreading •public web server vs internal file server –Need to consider service level agreement SLA (if any) •Maximum down time •Minimum respond time
  • 22. Detection and Analysis (5) •Notifications –Senior Management –Head of information security –Other incident teams –System owner –Human resources (if it involves employees) –Public affairs (if it might generate publicity) –Legal dept –Public stake holders –HKCERT, EDB ITE Section and/or HKPF if necessary
  • 23. Containment, Eradication and Recovery (1) •Containment Strategy –Method •Shut down •Disconnect from the network (wired or wireless) •Segment the network •Disable functions •Block hosts or ports at the perimeter •Rebuild or clean •Check with HKCERT for malware/ransomware solution (if any)
  • 24. Containment, Eradication and Recovery (2) •Containment Strategy –Considerations •Potential damage to and reduce of resources •Need for evidence preservation •Service availability •Time needed to implement the strategy •Effectiveness of the strategy •Duration of the solution –Emergency work around (several hours) –Temporary work around (several weeks)
  • 25. 25 Post Incident Activities •Lessons learned •Policy updates •Improvements be made to Preparation phase •Pursue legal action (work with HKPF)
  • 26. 26 Challenges of Incident Handling •Users awareness problem – incidents keep on repeating •New system vulnerabilities discovered frequently – difficulties in keep up with security patches •New security issues with new technologies e.g. mobile devices, IoT devices, etc. •Lack of security resources e.g. budget & personnel
  • 27. 27 Points to Take Away • Security incidents are common nowadays in organizations and schools are also impacted by incidents • Security incident handling capability needed be setup in order to minimize risk and impact when incidents happened • Incident Handling Life Cycle involved 4 phases: Preparation, Detection & Analysis, Containment Eradication & Recovery and Post Incident Activities • Organizations / Schools need to allocate appropriate security resources to get prepared for potential security incidents