Time
12 hours 41 minutes
Difficulty
Advanced
CEU/CPE
13

Video Description

The first topic we examine in this module is that of incident response. We make the distinction between events and incidents and discuss the importance of alerts. An event is an observable change in state of something within the environment being monitored. It is neither positive or negative. An event becomes an incident when it meets certain criteria indicating further investigation. Examples are unauthorized access or inappropriate usage. Alerts are flagged events signalling that closer examination is required. We then discuss several types of attacks such as DoS and DDoS attacks. The goal of these attacks is to affect the availability of a system. They don't typically look to compromise data and often come under the practice of "hacktivism" practiced by such groups as Anonymous in order to make a political statement. Other forms of attacks come in the form of malicious code such as viruses, worms, and logic bombs. Attacks with the goal of obtaining unauthorized access utilize social engineering, password guessing, and exploiting race conditions typically with the goal of stealing data or taking over systems. This section concludes with examining the four steps associated with incident response along with the steps for problem management.

Video Transcription

00:04
Now we're gonna move on to talking about incident management
00:07
and let's get a couple of terms to find out of the way first, because a lot of times these terms were used interchangeably. We have events alerts in incidents,
00:18
so an event is an observable change in state. It's neither positive nor negative. So when a system starts or service starts, that's an event. A. It's a change in ST
00:30
now, when we have multiple events that have an adverse effect on the system or network, that becomes an incident
00:39
and many times alert, sir configured to let us know if certain incidents have taken place. So that's how the three work together. An event really is neutral, but multiple negative events. Macon Incident and alerts are used to help us trigger a warning. In case these incidents happened, so
00:58
and alert might be set up to send me an email message.
01:02
Should we run out of space on our hard drive or whatever, that might
01:07
all right. So
01:07
many, many different incidents usually and certainly on this place. When we talk about cyber incidents or incident response, I always want you to think about an attack. I always want you to think about malicious, malicious intrusion. Whether it's not love surfaces. Packer distributed denial of service attack
01:27
and you'll hear those pronounced dos attacks or de dos attacks.
01:32
The main purpose of these types of attacks is to affect the availability of a system that's really all the Attackers looking to do is they're looking. And sometimes it's just for bragging rights, you know? Hey, I took the Google server down for two minutes or,
01:49
you know, if you're familiar with the Group Anonymous that's been in the news a lot lately
01:53
on they bring the form of, um,
01:57
of vigilante ism that we call hacktivism. So they're expressing their political frustration right now by hacking into servers of people that they, they believe are worthy of attack. So, you know, Anonymous started to come on the scene back with Wiki leaks
02:15
and the founder of Wikileaks, They felt like he was being unfairly persecuted and prosecuted.
02:21
And so they did a distributed denial of service attack,
02:24
uh, where they took several of the major credit card companies off line for a period of time one morning.
02:31
So, again, the whole purpose there wasn't really to steal data or divulge private information. It was just to cause that organization to suffer loss based on its time off line.
02:44
You know, for my company to be off line two minutes Wouldn't be such a big deal. But you taken Amazon or Visa MasterCard and you knock them off line for 2345 minutes now, suddenly have a tremendous loss of income.
03:00
All right, Another term malicious code. A code that sort of an all size fits one size fits all term. So whether we're talking about viruses or worms, Trojan horses, logic bombs, those all fall under the category of malicious code. So it's any type of code
03:19
that, uh, looks at exploiting vulnerabilities on the system.
03:22
Other types of incidents. Unauthorized access to resource is so a subject that shouldn't be at authorized
03:30
access. Something gets authorized. You know, it could be something as basic as, um, social engineering. I've gotten you to divulge your password to me.
03:39
Maybe I have guessed your password.
03:43
Maybe I have,
03:46
uh,
03:47
created some mechanism. We talked about a race condition where authentication happens, actually after authorization. Whatever the means is, somehow a subject has gotten access to a resource that they shouldn't have. You know, when we talk about biometrics,
04:04
biometrics, maybe we're gonna use
04:08
signature.
04:09
So my signature is gonna authenticate me.
04:12
Well, when I sign the sheet of paper or I signed the digital register, whatever it is I'm signing,
04:17
if my signature looks close enough to the temperature to the baseline signature, you're gonna allow me to gain access.
04:27
So maybe I've created a reasonable forgery and I've gained access to an object based on, you know, this forged access of Tim. So however it's
04:38
whatever means makes its successful, we refer to that as unauthorized access someone that shouldn't be allowed. Access is given access.
04:46
We can also talk about inappropriate system usage. Um, the acceptable use policies of a system or of a service or a mechanism when those air violated, we refer to that is inappropriate. Inappropriate usage. OK, so with incident response, we have a four step
05:05
process that would be followed to prepare our incident response.
05:10
And the first step is preparation.
05:13
Now, with preparation, I have to pull together a team. I have to train the team. I have to have a set of policies and procedures in place. I have to have the necessary tools. Preparation is where we're gonna spend a lot of work, a lot of time and effort, because if we're not well prepared, we will make mistakes
05:32
and we won't wind up
05:34
losing. Valuable evidence will wind up. Perhaps losing valuable data
05:41
will wind up notifying an attacker that we're onto them and maybe give them opportunity to erase any sort of trail they may have left behind. If we're unprepared, we need to really look att, outsourcing our incident response because we could do more damage from an UN prepared response,
05:58
then we can really, almost from no response at all.
06:01
Okay, After we prepare, we look to detect and analyze the incident. So we want to figure out what systems are affected, and we want to start looking at the root calls and doing the analysis there and figure out, you know, how did this code and get on their network? What's the scope of the damage? What
06:20
did the activity, you know, what was the nature of this attack?
06:25
Then we move on to containment eradication and recovery that's more focused about getting back up and running. So we recorded our information with documented We have done our analysis. Now let's get back up and let's get restored to the environment, which we were before the attack. And then, of course,
06:44
after we're done, there will always be a post incident review.
06:48
Where we take our team members, we debrief them and we want to create a document called Lessons Learned. And with those lessons learned, we want a document. How was that attacker successful? To what degree were they successful? What tools did they use? What internal vulnerability did they export?
07:06
Because we want to become a better a stronger environment as we move forward, so we can't guarantee that incidents won't happen. But what we do want is for every incident that is successful, we want to become stronger because our knowledge increases.
07:24
Now. An incident with an unknown calls or an unknown origin is called a problem,
07:30
and problem management really has several of the same
07:34
steps and factors involved. One of the things you'll see, though, is root cause analysis because we don't really understand what the source of this Maybe we've lost power to our building. We have no idea why. So we've got to notify and incidents happened and now we've got to get to the root of it because I can't fix the problem
07:55
unless I know the source of the problem.
07:57
So we do that root cause analysis that would lead us to a solution.
08:01
And then we implement a request for change. The solution gets implemented, then we continue to monitor so a problem. It's just simply an incident with an unknown origin.

Up Next

ISC2 CISSP

Our free online CISSP (8 domains) training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor