#CompTIA Security+ 501 exam Chapter10 Responding to Security Incidents Part 1
Posted by Superadmin on November 16 2018 16:22:07

Responding to Security Incidents

 

In this chapter, we will be looking at incident response, particularly with regard to the collection of volatile evidence for forensic analysis.

We will cover the following exam objectives in this chapter:

 

Incident response procedures

 

There are many different incidents, and each of them requires a different incident response plan. For example, dealing with a flood or the failure of a server's hardware is totally different. The first stage of an incident response plan is to collect any volatile evidence so that the source of that incident can be identified, followed by containment of the incident itself, followed by the recovery procedures. Let's look in more detail at the components required to make incident response successful:

 

 

Incident response process

 

While responding to an incident, the following processes are followed:

Figure 1: Incident response process

Exam tip: 
Lessons learned is a detective control where the incident is reviewed and changes are made to prevent it happening again.

 

 

Understanding the basic concepts of forensics

 

Forensics is used by the police when they are investigating crimes and need to find as much evidence as they can to secure a conviction. We will be looking at computer and web-based attacks. There are many different components, therefore we will look at each of these in turn:

Exam tip: 
Order of volatility is collecting the most perishable evidence first.

 

 

Five minute practical

 

Open up the command prompt on your computer, and type netstat -an. You should now see the listening and established ports; count them, and write the numbers down. Run the command shutdown /r /t 0 to immediately reboot the machine. Log back in, go to the command prompt, and run netstat -an; what is the difference? You will see that you have lost information that could have been used as evidence:

Volatile evidence summary

Web-based attack

Computer attack

Removable drive

Command line

Capture network traffic

CPU cache then

RAM

Volatile memory using RAM

Netstat-an

Exam tip: 
Capturing the network traffic is the first step in remote or web-based attacks so that you can identify the course.

Date

From

To

Evidence

1st August

Sgt Smith

Sgt Jones

15 kg cocaine

2nd August

Sgt Jones

Property room

14 kg cocaine

Exam tip: 
Chain of custody must show who has handled the evidence until it is presented to the courts. The evidence must not leave the possession of the person who has signed for it, otherwise it needs to be investigated.

Example: Dr. Death has been prescribing new drugs to patients in a large hospital who have been dying. An auditor has been sent to investigate the possibility of foul play, and then following the audit, the FBI are notified. The doctor has been emailing a pharmaceutical company that has been supplying the drugs for a trial. The FBI does not want the doctor to be alerted, so they have the hospital's IT Team put his mailbox on legal hold. When the mailbox is on legal hold, the mailbox limit is lifted; the doctor can still send and receive email, but cannot delete anything. This way, he is not alerted to the fact that he is under investigation.

Exam tip: 
Recording the time offset is used for time normalization across multiple time zones.

Example: The police in three separate countries are trying to identify where the data started from in a chain, then who handled the data along the line. They have the following information of when it was first created:

New York: Created 3 a.m

Without recording the time offset, it looks as if it started off in New York, but if we apply regional times, when it is 4 a.m. in London, the time in New York is 11 p.m. the day before, so it cannot be New York. When it is 4.30 a.m. in Berlin, it is only 3.30 a.m. in London, therefore, it originated in Berlin. However, with the record time offset, it looked the least unlikely before the time offset was applied.

Exam tip: 
Taking a system image or a forensic copy of a hard drive is the first stage in forensic investigation.

Exam tip:
Hashing data before and after investigation can prove data integrity.

Example: Your company uses an account lockout of three attempts. If an attacker tries to log in once to three separate computers, each computer would not identify it as an attack, as it is a single attempt on each computer, but a SIEM system would pick up these attempts as three failed login attempts and alert the administrators in real time.

Exam tip:
Re-imaging computers and restoring data is part of the recovery phase.

 

 

Software tools to assess the security posture of an organization

 

Security teams are constantly under attack from cyber criminals and threat actors, and therefore they need to be able to use a mixture of different security tools so that they can identify attacks before they have a chance to cause grave damage to the business. We will now look at each of these tools to see the benefits of each:

Example: Someone within the company is not working as they should be but has been surfing the web, and the manager has called you in as the security administrator to gather evidence. You decide that a protocol analyzer or packet sniffer is the best tool to track the information. You run a Wireshark session and capture the visits to the NFL website. When you analyze the trace, you notice that the request is using the HTTP GET verb. This is the request for a page on www.nfl.com. When we drill down further into the analysis of the request, we are looking at a page with an article, Josh Hobbs and Mike Glennon drawing trade interest, as shown here:

Figure 2: Protocol analyzer

Exam tip: A protocol analyzer can detect the operating system of a host and commands being sent across the network to any applications.

Figure 3: Network scanner

Exam tip:A network mapper can identify the operating systems and services running on a computer.

The vulnerability scanner is passive and does not cause damage to the systems. An example is Microsoft Baseline Analyzer—see the following screenshot. Although the computer was fully patched, as it was a credentialed scan, it gave me some information:

Figure 4: Credentialed vulnerability scan

Exam tip:A credentialed vulnerability scanner can audit files and examine permissions.

Exam tip:A compliance scanner can ensure that all of the settings on computers are compliant and as they should be.

 

 

Backup utilities

 

Backing up data is very important so that if the systems fail, then a copy of the data can be obtained from a previous backup. A company cannot put a cost on its most critical data, and if it was to lose it, this would cause grave damage to the company, especially if the data was the Financial, or Research and Development Department, which make new prototypes of products.

There are various ways that we can back up the data—we can take snapshots of virtual machines, back up to a network, back up to tape, or a removable device. Let's look at these in turn.

Exam tip:A honeypot can be used to track the attack methods being used against websites.

 

 

Backup types

 

There are various types of backups and these are full, incremental, and differential. Let's look at these in turn:

Example: We will compare the different types of backup. We will start the backup each day, but will suffer data loss on the Friday, and we will see how many tapes we need to recover our data. Our full backup will be 50 GB of data and each day we will produce 5 GB of data. You can see this from the following chart, how many tapes are needed for each type of backups to recover your data:

Full: The latest full backup is 65 GB; each day we back up more and more

Backup

Mon

Tues

Wed

Thurs

Fri

Tapes to recover

Full (F)

F 50 GB

F 55 GB

F 60 GB

F 65 GB

X

F 65 GB thurs

Incremental (I)

F 50 GB

I 5 GB

I 5 GB

I 5 GB

X

F 50 GB Mon

3 X I—tues, wed, thurs

Differential (D)

F 50 GB

D 5 GB

D 10 GB

D 15 GB

X

F 50 GB mon

D 15 GB thurs

Exam tip:Symptoms of steganography is that an image is lighter or a file is larger than it should be.