Time
7 hours 36 minutes
Difficulty
Advanced
CEU/CPE
7

Video Description

This lesson discusses forensics in support of an incident response. The role of forensics in incident response is to identify: · Extent · Timeline · Action · Damage · Tell a story and answer basic questions In addition, participants learn about the Golden Rules during incident response.

Video Transcription

00:04
Hello, Siberians and welcome back to Incident response and advanced forensics.
00:09
My name is Max Alexander,
00:11
and I'll be your subject matter expert for today's lesson, which is forensics and support of incident response.
00:19
So
00:20
what does forensics have to do with incident response
00:24
so beyond your traditional incident response. Charles Just doing a cursory investigation
00:31
UPS and basic incidents Forensics can help identify the total extent of an incident.
00:37
So by looking at maybe more of the operating system and machine
00:42
incident responders could get a better idea of exactly what happened during this incident.
00:50
Forensics can also identify a timeline of the death of events, so just merely knowing that malware infected system may not be enough going back and reconstructing that timeline of when the malware took place. What it did
01:07
or not even mount where. But maybe if you're looking at some type of insider threat investigation,
01:11
helping to establish a timeline puts a person behind the keyboard
01:18
during maybe an incident of theft occurring.
01:22
Forensics can also help identify actions taken by malware and malicious users. So what did the malware do when it was on the system? What did that militia shoots or do when he or she was using the system.
01:34
Forensics can also help with damage assessments,
01:38
so helping to determine what data was taken, what did the malware do when it was on the system? What files did it package up?
01:48
And lastly, forensics can help tell a story and answer the basic in Iraq motives. Who, what, when, where, why and how
01:56
so Forensics should build that picture. It should help tell that story that complete picture
02:01
of exactly what happened during unsteadiness.
02:06
So
02:07
before we go on any further and discuss how to do forensics there some basic golden rules that must be followed when doing any forensic investigation in support of an incident.
02:21
So the first rule is securing the scene and making it safe. So from a law enforcement perspective securing the scene that's making sure that there's no suspect there who could potentially cause injury or death to responders. But that could also be extended into the greater sense of
02:38
making sure that the scene is safe
02:40
from potential hazards of could be fire, electrical hazards, anything that could put the responders at risk. You essentially want to make sure that scene is safe, and if it is not. Try and make it say to the best of your ability.
02:58
Further, if you believe that the computer which is involved in the incident you're investigating is somehow destroying evidence or you found the computer that you think may be involved in the particular incident that you're investigating,
03:15
you should take immediate steps to preserve
03:19
that computer and preserve that evidence. Or if you find the thumb drive, you should take caution. And to preserve that thumb, direct any type of digital evidence that you find during your investigation. You should take steps to ensure that that device that that computer is going to be uncontaminated
03:38
during your investigation process.
03:40
The next thing that you should ask is that do you happen? Legal basis to seize this computer received this evidence
03:47
now in corporate environments. More than likely, you are the data owner. You own the computer system, so generally you do have that legal right to seize the computers and the data that is on. However, there are caveats to that, especially when we talk about B Y o D devices
04:06
on bringing those to work.
04:09
If you have company data on those devices, what authority do you have
04:15
to seize that data? Also, I look at this from US perspective, but if you're overseas, there are laws outside of the United States that many people may not be aware of. And then you have to abide and apply the laws to your forensic investigation process.
04:34
The next rule is Do not access any computer files. If the computer's off, leave it off. If it's on, don't start searching through the computer now. This is mainly geared toward your first responder, who is really unaware of basic forensic principles,
04:53
often times a train forensic investigator. Forensic ater may not be the person who is going to respond to this incident.
05:01
It may be someone who has minimal knowledge of computer systems, middle knowledge of forensics, and they think that they're trying to help on. They're going to start searching through the computer, which is something you don't want to do because you could essentially contaminate damage. Any evidence that you have.
05:19
If you hoped to take this case to court,
05:23
it would essentially put the kibosh on doing that.
05:27
The next Golden rule is that the computers on take appropriate steps, as we're gonna discuss later on how to shut down properly the computer and prepare for transportation evidence. And then I'll caveat that with if there are any type of volatile memory that you're going to take from that system,
05:46
we would want to collect that bottle to memory end or the Windows
05:49
Recovery encryption keys for bit locker. We may also want to take those as well, so I will go ahead and caveat that rule.
05:59
The golden rules continued.
06:01
If you reasonably believe that a computer strong evidence immediately shut down the computer but pulling the power forward from the back of the computer.
06:09
Um,
06:11
obviously, if it's a laptop from the Power Court's not gonna do any good, would more than likely want Thio shut the system down, either by pushing the power button, are clicking on the Windows icon and selecting power down? We didn't have a whole section that does cover that.
06:27
Living on the cameras available the computers on taking pictures of the screen at the computer's off, take pictures of the computer, its location and any electronic media attached, and or cables or other devices. Again, we have another section devoted entirely to taking photographs,
06:46
pictures worth 1000 words quite literally
06:49
saves time in an investigation. When you're doing this forensic investigation and you're doing this incident response, the last thing that you have time to do sit around and write extensively. Although you do have to take notes taking a picture,
07:08
simplify and speed up that process,
07:12
and then the last building rule is asking yourself, Do special legal considerations apply? Argue doing an incident response and in forensic investigation on someone who may have dr Attorney, clergy, psychiatrist, newspaper publisher privileges, et cetera.
07:31
So depending on where you work in the type of incidents that you're going to respond to,
07:36
some of those caveats may apply. And those individuals may be afforded different privacy rights than your standard users. Again. Consult your legal counsel when encountering any types of situations, such as those

Up Next

Incident Response and Advanced Forensics

In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery.

Instructed By

Instructor Profile Image
Max Alexander
VP, Cybersecurity Incident Response Planning at JPMorgan
Instructor