450 likes | 557 Views
In the name of God. APA of Isfahan University of Technology. Management of incident Preventing. Computer Security Incident
E N D
In the name of God APA of Isfahan University of Technology Management of incident Preventing
ComputerSecurityIncident • The term “security incident” is defined as the act of non-compliance with the security policy, procedure, or a core security requirement that impacts the confidentiality, integrity and availability of health information. Introduction
StepS Containment, Eradication, Recovery Post-Incident Activities Detection And Analysis Preparation • The organization is ready to respond to incidents, • and also prevents incidents by ensuring that systems, • networks, and applications are sufficiently secure. • The organization get the incident report or • sign of incident searching for type • and cause of it. • The organization can act to mitigate the impact of the incident by containing it and ultimately recovering from it. • The organization members share “lessons learned” from the incident .
2)Preventing Incidents • Recommended practices for securing networks : • Patch Management • Host Security • Network Security • Malicious Code Prevention Preparation
Types of Incidents • Denial of Service • Unauthorized Access • Inappropriate Usage • Malicious Code • Multiple Component Incidents Overview
Definition : A Denial of Service (DoS) is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources. Denial Of Service Incidents
DDos: Distributed Denial of Service Denial Of Service Incidents
Types Of DDos Attacks : 1)Reflector Attack Denial Of Service Incidents
Types Of DDos Attacks : 2)Amplifier Attack Denial Of Service Incidents
Types Of DDos Attacks : 3)Flood Attack Denial Of Service Incidents
Step 1 :Preparation • Preparation • ISP • IDS Configuration • Resource Monitoring • Maintain Paper Copy of Handling Documents Denial Of Service Incidents
Step 1 :Preparation • Prevention • Control Traffic • On Internet-accessible hosts, disable all unneeded services • Implement redundancy for key functions • Ensure that networks and systems are not running near maximum capacity Denial Of Service Incidents
Step2: Detection and Analysis Precursors and Reactions : • Low Volume of Traffic Caused by Reconnaissance Activities Block ways of attack • A new DoS tool Investigate it and change configurations Denial Of Service Incidents
Step2: Detection and Analysis Indication Of Each Type of DoS: • Network Based DoS against a host • Network Based DoS against network • DoS against OS of A host • DoS against an application on a particular host Denial Of Service Incidents
Step2: Detection and Analysis • IP address in most cases is spoofed Logs may be helpful to find the Attacker. • When an outage occurs, no one may realize that a DoS attack caused it Outages are so common! • Network-based DoS attacks are difficult for IDPS sensors to detect with a high degree of accuracy User Get False alerts so disable it. • Attacker use zombies Agents are not sinful. Denial Of Service Incidents Notice !
Step3: 1)Containment Strategies Simple Solution : Filtering All Traffic by IP Spoofed Ips Most of the time not possible Solution : Filtering based on Characteristics (port, Protocol ,…) Denial Of Service Incidents
Step3: 1)Containment Strategies Other Strategies : • Correct vulnerability • Relocate The Target • Attack the Attacker ! Denial Of Service Incidents
Definition : An unauthorized access incident occurs when a person gains access to resources that the person was not intended to have Unauthorized Access Incidents
Special Characteristic : • These kinds of Attacks mostly occur in several steps. • First The attacker gain limited access through a vulnerability then try to gain higher level of access. • So : Tracking The Incident is Important. Unauthorized Access Incidents
Step 1 :Preparation • Preparation • Education • Configuration • Control • Prevention • Network Security • Host Security • Authentication and Authorization • Physical Security Unauthorized Access Incidents
Step2: Detection and Analysis • Have many types of occurrence. • Lots of Precursors and Indications • Must be customized to environment-specific Unauthorized Access Incidents
Step2: Detection and Analysis Precursors: Unauthorized Access Incidents • Detecting reconnaissance activities through IDPS • A failed physical access attempt to a system. • A user report of a social engineering attempt. • A new exploit for gaining unauthorized access is released publicly
Step2: Detection and Analysis Types of unauthorized access and possible Indications: • Root compromise of a host • Unauthorized data modification • Unauthorized usage of standard user account • Physical Intruder • Unauthorized data access Unauthorized Access Incidents
Step2: Detection and Analysis Problem: • It is difficult to distinguish malicious activity from benign one Solution: • Change management process Unauthorized Access Incidents
Step2: Detection and Analysis Prioritization Problem: • Calculating current and future impact is difficult Solution: • The incident may need to be prioritized before the analysis is complete • It Must be done based on an estimate of the current impact Next Step:Considering the criticality of the resources Unauthorized Access Incidents
Step3: 1)Containment Strategies Problem: • Response time is important. Analyzing step may take a long time Solution: • Perform an initial analysis, then prioritize, response and another analysis stage Unauthorized Access Incidents
Step3: 1)Containment Strategies Easy Solution : Shutting down the system !!! The Moderate one: • A combination of: • Isolate the affected systems • Disable the affected service • Eliminate the attacker’s route into the environment. • Disable user accounts that may have been used in the attack • Enhance physical security measures Unauthorized Access Incidents
Step3: 2)Eradication And Recovery • Recovery is based on level of access • In case of root access system restore • Mitigate the vulnerability Unauthorized Access Incidents
Definition : An Inappropriate Usage incident occurs when a user performs actions that violate acceptable computing use policies. Inappropriate Usage Incidents
Examples: • Download password cracking tools. • Send spam promoting a personal business • Email harassing messages to coworkers • Set up an unauthorized Web site on one of the organization’s computers • Use file sharing services to acquire or distribute pirated materials • Transfer sensitive materials from the organization to external locations. Inappropriate Usage Incidents
Examples: (Attack annoying outside entities from inside Organization) • An internal user • Defacing another organization’s public Web site. • Purchasing items from online retailers with stolen credit card numbers . • A third party • Sending spam emails with spoofed source email addresses that appear to belong to the organization. • Performing a DoS against an organization by generating packets with spoofed source IP addresses that belong to the organization. Inappropriate Usage Incidents
Types of Inappropriate use : • Personal e-mail • Deliberate Disclosure of Sensitive information • Inadvertent Misuse Inappropriate Usage Incidents
Impacts of inappropriate Usage on Organization: • Loss of productivity • Increased risk of liability and legal action • Reduction (or loss)of network bandwidth • Increased risk of virus infection and other malicious code Inappropriate Usage Incidents
Step 1 :Preparation • Preparation • Coordinate with : • representatives of the organization’s human resources • Physical security team • Set Proxy and Log users activities • Configure IDPS Software Inappropriate Usage Incidents
Step 1 :Preparation • Prevention • Configure: • Firewall • Email Server • Set: • URL filtering Rule • Limitation on use of Encrypted Protocols Inappropriate Usage Incidents Access Denied
Step2: Detection and Analysis • Usually no precursor, Just users report • Analyzing Reports(is a report real or no?) Problem: • Incidents Reported from outside Solution: • Accurate and complete Logging Inappropriate Usage Incidents
Step2: Detection and Analysis Different activities and Indication: • Attack against external party IDPS alerts and Logs • Access to inappropriate materials Users report, IDPS alerts and Logs • Unauthorized Access Usage Unusual Traffic, New Process, New Files, Users report, IDPS alerts and Logs. Inappropriate Usage Incidents
Step2: Detection and Analysis Prioritization: • Business impact of these incidents is different • It depends on: • Whether the activity is criminal • How much damage the organization’s reputation may sustain Inappropriate Usage Incidents
Step2: Detection and Analysis Prioritization: Example of Response time table Inappropriate Usage Incidents
Step3: Containment, Eradication And Recovery • Generally no such step is needed • May be just reinstalling uninstalled software • Evidence gathering is Important Inappropriate Usage Incidents