Incident Response Updated 03/20/2015

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Data Transfer Data Import Data Export Database Backup and Restore Uninstalling and re-installing LIMS.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Auditing Computer-Based Information Systems
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
System and Network Security Practices COEN 351 E-Commerce Security.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Computer Security: Principles and Practice
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Website Hardening HUIT IT Security | Sep
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer & Network Security
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Updating FireRMS Presented by Dan Cook Implementation Team Lead ZOLL.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Note1 (Admi1) Overview of administering security.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Incident Response Christian Seifert IMT st October 2007.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
2015 TCPA WASHINGTON SUMMIT | SEPT. 27TH-29TH | WASHINGTON DC The Anatomy of a Breach Phillip Naples, Pritchard & Jerden, Inc. Jeremy Henley, ID Experts.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Joomla Awdhesh Kumar Singsys Pte Ltd. What is Joomla? Joomla is an award-winning content management system (CMS), which enables you to build Web sites.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Upgrade & Patching of Kentico CMS …without any much pain.
Securing Network Servers
Critical Security Controls
Security Standard: “reasonable security”
Responding to Intrusions
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Determined Human Adversaries: Mitigations
Red Flags Rule An Introduction County College of Morris
Information Security Awareness
Incident response and intrusion detection
Determined Human Adversaries: Mitigations
6. Application Software Security
Presentation transcript:

Incident Response Updated 03/20/2015

Topics Definition of Terms Purpose Incident Response Flow Chart Tips to mitigate future incidents

Definition of Terms Incident Security Incident Incident Response A security breach or attack Security Incident A change in the everyday operations of your network, service, or website, indicating that a security policy may have been violated or a security safeguard may have failed Incident Response An organized approach to addressing and managing the aftermath of a security breach or attack

Purpose Provide systematic methods that website administrators should follow when responding to a security incident The incident response that will be outlined here may be interchangeable depending on the process that will work best for your agency and the nature of the attack that you will face.

Incident Response Flow Chart

Incident Response Flow Chart

Incident Response Flow Chart Upon confirmation, communicate the breach to other people who are part of your incident response team and your hosting provider to make them aware of the situation Gain an idea of the nature of the attack. Identify the type and severity Determine the intent of the attack

Incident Response Flow Chart Common signs that your website has been compromised Your website has been defaced Your website redirects to another site Your browser may indicate that your site may be compromised Your web logs has unexplained big spikes in network traffic

Incident Response Flow Chart Upon confirmation, communicate the breach to other people who are part of your incident response team and your hosting provider to make them aware of the situation Gain an idea of the nature of the attack. Identify the type and severity Determine the intent of the attack

Incident Response Flow Chart

Incident Response Flow Chart Begin containing the damage and minimizing the risk Record your actions thoroughly as this may be used for documenting the incident Compare the cost of taking the compromised site offline against the risk of continuing operations or keeping systems online with limited connectivity

Incident Response Flow Chart Require an immediate change of password for all site users and accounts – CMS, DBS, FTPs, hosting control panel Identify compromised data Review and examine logs Check for permission changes or elevated user permissions Check for new accounts, new URLs, new pages, new files and directories Check databases for suspicious content and values

Incident Response Flow Chart Identify compromised data Look for unauthorized process or applications that are currently running Compare your site to a clean backup copy Use version control, if available

Incident Response Flow Chart Depends on the extent of the security breach Restore existing system? Completely rebuild it?

Incident Response Flow Chart Recovery steps for sites that have clean and updated backup Restore clean backups Install any software/system upgrades, updates, or patches Asses installed applications and consider deleting those not in use Change the passwords one more time for all accounts Implement measures to prevent future access then bring your site back online Monitor for any signs of recurrence

Incident Response Flow Chart Recovery steps for sites that have clean but outdated backup Make a complete backup of your site, as reference. Mark it as “infected” Restore the clean backup Assess installed applications and consider deleting those that are not in use Upgrade all applications Identify the files that you'd like to copy from the infected copy and remove all traces of malicious code identified

Incident Response Flow Chart Recovery steps for sites that have clean but outdated backup Upload the clean content to your clean copy Verify that file permissions are appropriate Change the passwords one more time for all accounts Implement measures to prevent future access Bring your site back online Monitor for nay signs of weakness or recurrence

Incident Response Flow Chart Recovery steps for sites that have no backup available Make two full backups of your site. Mark each backup as “infected” Clean the site's content on one of the backups by removing all traces of the incident Verify that all file permissions are appropriate Clean up hacker-modified records in your databases. Perform a sanity check to make sure it looks clean

Incident Response Flow Chart Recovery steps for sites that have no backup available Correct vulnerabilities that have been found in your applications Change the passwords one more time. At this point, one infected backup copy should only contain clean data Assess installed applications and consider deleting those not in use Upgrade all applications Implement measures to prevent future access Monitor for signs of recurrence

Incident Response Flow Chart Analyze the incident and how and why it took place Assess the damage and make recommendations for better future response for preventing a recurrence of the attack

Incident Response Flow Chart Consider whether you need to notify and report the incident to other staff

Tips to mitigate future incidents

Tips to mitigate future incidents Enforce the use of strong passwords to all users who have access to your site Passwords should be unique and should not be reused throughout the web Routinely check that all systems are up to date and have the latest patches installed Understand the security practices of all applications before you install them on your site A security vulnerability in one application can compromise the safety or your entire site

Tips to mitigate future incidents Make regular, automated backups of your site Be aware of where backups are maintained, who can access them, and procedures for data restoration and system recovery Maintain also an offline copy of your backup Keep all devices that you use to log in to your site secure. Keep your operating system and web browsers up to date Routinely monitor and analyze site traffic and activity logs

End