Incident response and intrusion detection

Slides:



Advertisements
Similar presentations
Identifying and Responding to Security Incidents in the Law Firm
Advertisements

WINDOWS FORENSICS FOR INCIDENT RESPONSE CHRISTIAN KOPACSI CISSP CISM CEH CHFI SECURITY+
Separate Domains of IT Infrastructure
System and Network Security Practices COEN 351 E-Commerce Security.
Incidence Response & Computer Forensics, Second Edition
Computer Security: Principles and Practice
Network security policy: best practices
Incident Response Updated 03/20/2015
Cyber Security Audit and Network Monitoring P.D. Mynatt Doug Brown March 19 th 2015.
APA of Isfahan University of Technology In the name of God.
SEC835 Database and Web application security Information Security Architecture.
General Awareness Training
Intrusion Detection MIS ALTER 0A234 Lecture 11.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Information Systems Security Operational Control for Information Security.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Incident Response November 2015 Navigating a Cybersecurity Incident.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Role Of Network IDS in Network Perimeter Defense.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Incident Response Christian Seifert IMT st October 2007.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
2015 TCPA WASHINGTON SUMMIT | SEPT. 27TH-29TH | WASHINGTON DC The Anatomy of a Breach Phillip Naples, Pritchard & Jerden, Inc. Jeremy Henley, ID Experts.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Washington State Auditor’s Office Cybersecurity Preparing for the Inevitable Washington State Auditor’s Office Peg Bodin, CISA, Local IS Audit Manager.
Prof. I. J. Chung Dept. of Computer & Information Science, Korea Univ. 컴퓨터와 인터넷 윤리 Professor I. J. Chung.
Important Information Provided by Information Technology Center
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Proactive Incident Response
Security Incident Handling
Firmware threat Dhaval Chauhan MIS 534.
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Building A Security Program From The Ground Up
Critical Security Controls
ISYM 540 Current Topics in Information System Management
Responding to Intrusions
Data Compromises: A Tax Practitioners “Nightmare”
Agenda Equifax data hack Best Buy stops selling Kaspersky
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Joe, Larry, Josh, Susan, Mary, & Ken
Forensics Week 11.
Security in Networking
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
4 ways to stay safe online 1. Avoid viruses and phishing scams
Information Security Awareness
Keeping your data, money & reputation safe
Ransomware and Data breaches in public libraries
Anatomy of a Large Scale Attack
Clemson University Red Flags Rule Training
Data Breach of United States Office of Personnel Management
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Data Breach of United States Office of Personnel Management
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Incident response and intrusion detection Eli mattrick and gus pessolano

Define incident Incident: “a violation or threat of violation of computer security policies, acceptable use policies, or standard security practices” – NIST SP 800-61 Should not have an overly broad definition of incident, but it also should not be overly concise The definition of an incident will vary from organization to organization

Define incident response An organized approach to addressing and managing the aftermath of incidents.

Goals of IR Mitigate damage done Reduce recovery time (business continuity) Minimize financial loss Verify incidents occurred Determine how the incident happened Prevent future attacks and improve security

IR Handling Phases Preparation Identification Containment Eradication Recovery Lessons learned

Preparation Readiness to handle an incident at a moments notice Policies Rules/guidelines Must have clear policies This will help define what is classified as an incident Legal reinforcement Response Strategy Classify levels of severity Communication Documentation – Who? What? When? Where? Why? How? Team, Tools, Training Testing

Identification Incident is detected What is the scope of the incident? Severity? Communication is critical Gather events/logs from systems (IDS, Firewalls, etc) Start documentation

Containment Limit damage and prevent further damage The faster the response, the more likely you can minimize damage done Short-term Isolate the infection – limit damage asap Back-up Take forensic images of affected systems (Preserve the evidence) Long-term Remove accounts/backdoors left by attackers. Install security patches Anything else to prevent escalation, as long as business operations continue

eradication Complete removal of malicious content Usually done by reimaging affected systems Harden systems (security patches, unused services) Double-check everything

Recovery Putting the previously affected systems back into production Test the system Make sure everything is in working order Monitor the system Watch for any abnormal activity as the system is reinstated Validate Assure that the system isn’t being reinfected with malware, or compromised by other means Purpose is to make sure the incident has been resolved, and there is no lingering threat waiting to reinfect the systems

Lessons Learned Review the incident step by step What went well during the response? What didn’t? Were there preexisting procedures in place for responding to this type of incident? Scope of the incident? This is the time for discussion on how to improve the IR process

Playbooks Predefined policies and procedures on how to handle a certain type of incident (phishing, malware, etc) Playbook Resource

Data collection – IR techniques Professor Messer

Case Study #1 - Equifax How…Why? Poor security posture Timeline ‘admin’ – ‘admin’ Apache Struts vulnerability– ‘took efforts to identify and to patch any vulnerable systems in the company's IT infrastructure’ Timeline July 29th – InfoSec team first notices suspicious traffic August 1s & 2nd – Equifax execs sell $2 million in company stock, but apparently did not know anything about the breach (right…). At this point the breach was still not disclosed. August 2nd -- Mandiant is hired. The investigation showed attackers had access to sensitive data starting on May 13th. Mandiant indicated there was an additional breach in March, likely by the same attackers, but Equifax denied knowledge of this.

Equifax cont. Equifax’s IR / Intrusion Detected No clear policies/procedures are apparent. Why did the InfoSec team only notice the suspicious traffic, almost 7 weeks after it began? They also did not notice the breach in March? Created a SEPARATE DOMAIN for customers to check whether they had been affected– www.equifaxsecurity2017.com . Why not just use the official domain? Their social media account then proceeded to tweet out the WRONG website, at least THREE times.

Case Study #2 – Eli’s internship - Phishing Preparation – Users know to send suspected phishing emails to Abuse Mailbox. InfoSec team has a phishing playbook for investigation procedures. Identification – User suspects an email of being a phish, and sends it to the Abuse Mailbox. Analyst confirms or denies whether it is a phishing email. Checks for attachments. Containment – Block the sending email address, or any links within the email. Remove email from affected person(s) mailbox. Transfers attachments to malware analysis lab. Eradication – Malware analysis. Find Indicators of Compromise (IoC). Block any IoC found. Email users to make sure they did not open attachments/links. Recovery – Monitor Abuse Mailbox for any similar reports. Lessons Learned – Review documentation / write up

Case Study #2 Cont. An IoC from this case: 185.165.29.78 Petya/NotPetya ransomware

https://www.youtube.com/watch?v=GhuJFuzgj- k Handling a breach https://www.youtube.com/watch?v=GhuJFuzgj- k

Questions, comments, concerns?