incident response & evidence management presentation.pdf · no defenses are fool proof...

27
Incident Response & Evidence Incident Response & Evidence Management Management CIPS Brandon Chapter November 28 2002 Dr. Marc Rogers PhD, CISSP

Upload: others

Post on 17-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Incident Response & Evidence Incident Response & Evidence ManagementManagement

CIPS Brandon ChapterNovember 28 2002

Dr. Marc Rogers PhD, CISSP

Page 2: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

AgendaAgenda

Current State of the IT WorldWhat is Incident ResponseWhat is Evidence Management & HandlingTie into DRP/BCPSummary

Page 3: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has
Page 4: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Hong Kong Reuters Office Hacked:

Traders at 5 banks lose price data for 36 hours

PA Teenager Charged With 5 Counts of Hacking:Southwestern Bell, BellCore, Sprint, and SRI hit

Costs to Southwestern Bell alone exceed $500,000

Citibank Hit in $10 Million Hack:Russian hacker had inside help.

Several $100K not yet recovered.

Compaq Ships Infected PCs:

Virus Taints Big Japanese Debut

Computer Attack Knocks Out 3,000 Web Sites40 hour shutdown during busiest shopping season

Page 5: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has
Page 6: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Consumer eConsumer e--Commerce Commerce ConcernsConcerns

0%

10%

20%

30%

40%

50%

60%

Security Navigation Selection Trust High Price No Touch

Privacy/Security issues could potentially put an $18 billion dent in the projected

$40 billion 2002 e-Commerce revenue (Jupiter Communications, 2000).

Page 7: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

AttackersAttackersAttacks are becoming more sophisticatedAttacks are becoming more sophisticatedProgressed from simple user Progressed from simple user command, script and command, script and password cracking (password cracking (snifferssniffers, , crackers) in 1993crackers) in 1993--94, to 94, to intricate techniquesintricate techniquesthat fooled the basic that fooled the basic operations of IP (spoofing operations of IP (spoofing etc.)etc.)

But Attackers less skilledBut Attackers less skilled

Page 8: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

CSI/FBI 2002 SurveyCSI/FBI 2002 Survey

90% of respondents (primarily large corporations and government agencies) detected computer security breaches within the last twelve months.

80% acknowledged financial losses due to computer breaches.

223 respondents reported $455,848,000 in financial losses.

74% cited their Internet connection as a frequent point of attack than cited their internal systems as a frequent point of attack (33%).

34% percent reported the intrusions to law enforcement. (In 1996, only 16% acknowledged reporting intrusions to law enforcement.)

Page 9: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Incident Response GoalsIncident Response Goals

Provide an effective and efficient means of dealing with the situation in a manner that reduces the potential impact to the organization.Provide management with sufficient information in order to decide on an appropriate course of action.Maintain or restore business continuity.Defend against future attacks.Deter attacks through investigation and prosecution.

Page 10: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Relationship to InfoSecRelationship to InfoSec

The IAC triad can be expanded to include:Non-repudiationAccountability

Incident Response is directly linked to InfoSec goalsIt can help restore the IAC

Page 11: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Information Security LifecycleInformation Security Lifecycle

CountermeasuresDefenses that counter threatsNo defenses are fool proof

DetectionIndicates that security has been breached

Incident ResponseAfter the incident has been noticed responding to it is critical

Page 12: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Information Security LifecycleInformation Security Lifecycle

CountermeasuresDetection

Incident Response

Page 13: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

SevenSeven--Stage MethodologyStage Methodology

Methodology has been around since about 1989DOE under Dr. Schultz matured the modelDefinitely not the only methodHas become part of the Common Body of Knowledge Very pragmatic & logical approach Although presented as a linear model some stages may happen in parallel or like the “waterfall” method feedback into the previous stages

Page 14: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Response Methodology Response Methodology (PDCAERF)(PDCAERF)

Preparation Detection Containment Analysis Eradication Recovery Follow-up

Feed Back

Page 15: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Response MethodologyResponse Methodology

Why use a methodology?Structure/Organization

Dealing with incidents can be chaoticSimultaneous incidents occurHaving a predefined methodology lends structure to the chaos

EfficiencyTime is often of the essence when dealing with incidentsIncidents can be costly both financially and organizationally

Page 16: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Response MethodologyResponse Methodology

Process oriented approachBreaks incidents into small manageable chunksLogical order of dealing with issuesIncludes methods for improving the overall process

Dealing with the unexpectedProvides a mental framework for dealing with incidents in generalPromotes flexible thinking to deal with novel situations

Page 17: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Response MethodologyResponse Methodology

Legal ConsiderationsCan demonstrate due care or due diligenceMay limit liabilityMay reduce insurance premiums

Page 18: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Evidence ManagementEvidence Management

During an incident, evidence may be collected during any of the 7 phases.In early stages we may not know what the final outcome might be (e.g., Job Termination, Civil or Criminal Litigation).Network/Computer Forensics may become an issueMust collect data in a “Forensically Friendly” mannerMust maintain the chain of custodyImportant to understand the evidence lifecycle

Page 19: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

ForensicsForensics

Computer Forensics: The study of computer technology as it relates to the law.

Forensic Analysis: Examination of material and/or data to determine its essential features and their relationship in an effort to discover evidence in a manner that is admissible in a court of law; post-mortem examination.

Page 20: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

ForensicsForensics

Electronic Evidence:

Evidence relating to the issue that consists of computer files, or data, in their electronic state.

Electronic Media Discovery:

The discoverability of electronic data or files.

Page 21: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

ForensicsForensicsChain of Custody: A means of accountability, that shows who obtained the evidence, where and when the evidence was obtained, who secured the evidence, who had control or possession of the evidence.

Rules of Evidence: Evidence must be competent, relevant, and material to the issue.

Page 22: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Evidence Life CycleEvidence Life Cycle

Collection & identification

Storage, preservation, and transportation

Presentation in court

Return to victim or court

Page 23: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

IR & DRP/BCPIR & DRP/BCP

Both IR & DRP/BCP use planning and preparation to mitigate the damage of an negative event after it occurs.Both require fore thought, formal written policies, procedures, and budgets.Both rely on periodic testing and maintenance of the plan.IR can be a subset of DRP/BCP process.

Page 24: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

SummarySummary

The rate of network/computer intrusions is increasingMost companies/organizations have safeguards such as firewalls, Anti-virus, IDSWe need to know what to do when the alarms go offLike DRP/BCP we must have a IR plan in place before handProper evidence management & handling procedures are important during the response escalation processIR is the next evolution of the IT Security Industry

Page 25: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Contact InformationContact InformationDr. Marc Rogers PhD., CISSP

Ph: 989-8750

E-mail: [email protected]: www.manageworx.com

Page 26: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Book ReferencesBook References

Kruse, W. & Heiser, J. (2002). Computer forensics: Incident response essentials. Boston: Addison Wesley.Mandia, K. & Prosise, K. (2002). Incident response: Investigating computer crime. New York: Osborne/McGraw Hill.Northcutt, S., & Novak, J. (2002). Network intrusion detection: An analyst’s handbook 2nd edition. Boston: New RidersSANS. (2001). Computer security incident handling: Step-by-step. The SANS Institute.Schultz, E., & Shumway, R. (2002). Incident response: A strategic guide to handling system and network security breaches. Boston: New Riders.

Page 27: Incident Response & Evidence Management presentation.pdf · No defenses are fool proof Detection Indicates that security has been breached Incident Response After the incident has

Web ReferencesWeb References

CERT/CC www.cert.orgCERT/AU www.auscert.org.auOCIPEP www.ocipep-bpiepc.gc.caCERIAS www.cerias.purdue.eduFIRST www.first.orgSANS www.sans.orgINCIDENTS www.incidents.orgCCIPS www.cybercrime.govIIC www.iic.umanitoba.caRCMP www.rcmp-grc.gc.caFORENSICS www.incident-response.org