Incident Response Lifecycle Identify

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 54 minutes
Difficulty
Advanced
CEU/CPE
4
Video Transcription
00:04
okay, The next step in our instant response life cycle is identification, so we've prepared. Now it comes down to identifying an actual incident. And, you know, we have to consider the fact that the mechanisms and devices that we use in order to detect incidents,
00:23
I could be wrong.
00:24
Right intrusion, detection and prevention systems can have false positives. We can have activities that were monitoring that might indicate an incident, but it might turn out to be something accidental, or it might turn out to be legitimate activity. That's just a little out of the norm.
00:44
So we have to before running full steam ahead into our instant response plan.
00:49
We have to make sure that what we're dealing with truly is an incident. And sometimes you'll hear that refer to his violation analysis. Has a violation really happened? What's the nature of the violation? Is there any chance it's a false positive or some other eyes? There's some other explanation for what's going on.
01:08
We need to be able to do that very quickly because we want to move into responding to the incidents
01:14
very quickly, so we're gonna look for things we've set triggers. We have configured monitoring tools and alerts so that we can be notified with specific details in the event that some sort of malicious activity or some sort of incident would be taking place.
01:32
So we have tools like honey pots.
01:34
Honey pots detect activities by providing a decoy for an attacker often will put these in our demilitarized zones, and they look appealing because they appears that they're vulnerable. Host. Actually, there is honey pot software that collects a lot of information
01:53
about the proposed attack
01:56
with the, uh, with the origin what tools were being used? Honey pots are very, very hopeful in detection and gathering information,
02:04
Um, will conduct network stands looking for unauthorized host for unauthorized service's regular basis. We have intrusion detection systems and intrusion prevention systems and were alerted,
02:23
um, analyzed performance network traffic system performance because when we see something out of line like No, no, no, look, att network traffic increasing as people go home. That should be I should know what in
02:43
and the various from that
02:45
that's gonna indicate that some sort of action or activity is going on
02:50
Cool, right? I want to be proactive as much as possible, so we want live time monitoring of our environment and our network.
03:00
But also, we need reactive monitoring as well. We need to be able to go back and look ATT, audit logs and audit files and, um
03:12
and really go back and understand. Um,
03:15
you know, even if it's after the fact, what are the characteristics of this attack? We want to make sure that we have a regular schedule which we view these logs because many times we can see the steps leading up to an attack. Sadly, many times we think about checking the logs after the fact.
03:36
So this step with identifying
03:38
is all about determining. Is this really an attack, or is it a false positive and then as much information as we can gain on the attack itself?
Up Next