Chapter 8
Chapter 8
First Responders
those individuals who must ascertain whether it truly is an incident or a false alarm
Chain of Custody
the Who, What, When, Where, and Why of evidence storage
Computer Forensics
Order of Volatility
• The order in which you need to recover data after an incident before the data deteriorates, is erased, or is
overwritten is known as the order of volatility
• Data is volatile, and the ability to retrieve or validate data after a security incident depends on where it is
stored.
Damage Assessment
• During or after a security incident, a damage assessment should be done to determine the extent of damage,
the origin or cause of the disaster, and the amount of expected downtime.
• The assessment can help determine the appropriate response strategy.
Recovery Methods
After assessing the damage, you will know the extent of recovery that can be done.
Recovery methods can also involve replacing hardware in the case of a physical security incident.
An Incident Report
Guidelines for Recovering from a Security Incident
Assess the damage:
Assess the area of damage.
Determine damage to facilities, hardware, systems, and networks.
For digital damage, examine log files, identify compromised accounts, and identify modified files.
For physical damage, perform inventory to identify stolen or damaged devices, and areas affected by intruders.
Verify that the attack has ended.
Guidelines for Recovering from a Security Incident (cont.)
Recover:
Replace damaged or stolen cabling.
Detect and delete malicious code from affected systems and media.
Disconnect affected systems from servers and shut down the server.
Disable access to user accounts used in the attack and search for backdoor software.
Scan networks and systems with an IDS.
Reconnect servers.
Restore data and systems from backups.
Replace compromised data and applications, or rebuild the system with a fresh OS installation.
Harden networks and servers.
Notify officials and stakeholders.
Document the recovery process.
Guidelines for Recovering from a Security Incident (cont.)
Report:
Organization name
Name and phone number of the person who discovered the incident
Names and phone numbers of first responders
Event type (physical, malicious code, or network attack)
Date and time of event
Source and destination of systems and networks
OS and antivirus software used, including version information
Methods used to detect the incident
Business impact of the incident
What steps were taken to resolve the incident