+ All Categories
Home > Education > Računalna forenzika i automatizirani odgovor na mrežne incidente

Računalna forenzika i automatizirani odgovor na mrežne incidente

Date post: 19-Jun-2015
Category:
Upload: damir-delija
View: 1,968 times
Download: 1 times
Share this document with a friend
Popular Tags:
21
i n t e g r i r a n a s i g u r n o s t Computer Forensic and Automated IR Damir Delija Dr.Sc.E.E
Transcript
Page 1: Računalna forenzika i automatizirani odgovor na mrežne incidente

i n

t e

g r

i r

a n

a s

i g

u r

n o

s t

Computer Forensic and Automated IR

Damir Delija Dr.Sc.E.E

Page 2: Računalna forenzika i automatizirani odgovor na mrežne incidente

2

Presentation plan

Introduction into computer forensic and incident response

• what it is • legal and organisational issues

EnCase approach• Arhitecture, tools, methods • approach forensic and incident response • How it is done

Page 3: Računalna forenzika i automatizirani odgovor na mrežne incidente

3

Computer Forensic – a Definition

A practical definition:

“Computer Forensics is simply the application of computer investigation and analysis techniques in the interest of determining potential legal evidence (Judd Robbins).”

Page 4: Računalna forenzika i automatizirani odgovor na mrežne incidente

4

Legal Definition of Forensics Daubert/Frye: The most important decisions governing the

use of scientific evidence in court are those of Daubert(Federal)/Frye(California).

There are four primary factors according to Daubert/Frye that should be considered before ruling on the admissibility of scientific evidence:

• Whether the theory or technique has been reliably tested;

• Whether the theory or technique has been subjected to peer review and publication;

• What is the known or potential rate of error of the method used;

• Whether the theory or method has been generally accepted by the scientific community.

Page 5: Računalna forenzika i automatizirani odgovor na mrežne incidente

5

Role of the EnCase suite EnCase Suite - Guidance Software

www.guidancesoftware.com

Central point in the system security, other usual security related tools are subordinates (feeds and actuators)

Act as standalone or as enterprise wide tool

It is supposed to react on incidents or to control system, both in same sound digital forensic way

Examiner wokstation is a workplace for incident responder, examiner, auditor, controler - all in same consitent manner, legaly acceptable

Predefined roles, ranges, users and events

Use other parts of incident response infrastructure like ticketing system, help desk, IPS, IDS, etc ...

Page 6: Računalna forenzika i automatizirani odgovor na mrežne incidente

6

Unauthorised software

Human error

Inappropriate content

Deliberate attack (hackers)

Competitors

Virus outbreaks

Regulatory compliance IP theft (eg. external consultants)

Fraud

What are our threats?

Disgruntled employeesClassifiedData leakage

Others (Unknown)

Client

Page 7: Računalna forenzika i automatizirani odgovor na mrežne incidente

7

Integrating Forensic into IR

What is an incident to you?

Virus outbreak? Stolen laptop? Inappropriate usage? Legal requirement for

electronic data? Unauthorised software? Inappropriate content? Classified data appearing in

the wrong environments? Data leakage? IP theft? Disgruntled employee?

How do you respond? Manual processes? Take Computers off the

network? Suspend Employees? External investigative

consultancy? Outsource data collection? Press release / PR? Hope and Pray? Ignore?

Page 8: Računalna forenzika i automatizirani odgovor na mrežne incidente

8

Latest analytics (1)

Who is behind data breaches? 73% resulted from external sources 18% were caused by insiders 39% implicated business partners 30% involved multiple parties

How do breaches occur? 62% were attributed to a significant error 59% resulted from hacking and intrusions 31% incorporated malicious code 22% exploited a vulnerability 15% were due to physical threats

Source: "2008 DATA BREACH INVESTIGATIONS REPORT", A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM, 10th June 2008

Page 9: Računalna forenzika i automatizirani odgovor na mrežne incidente

9

Latest analytics (2)

What commonalities exist?

66% involved data the victim did not know was on the system

75% of breaches were not discovered by the victim 83% of attacks were not highly difficult 85% of breaches were the result of opportunistic attacks 87% were considered avoidable through reasonable

controls

Source: "2008 DATA BREACH INVESTIGATIONS REPORT", A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM, 10th June 2008

Page 10: Računalna forenzika i automatizirani odgovor na mrežne incidente

10

Latest analytics (3)

Nine out of 10 data breaches incidents involved one of the following:

• A system unknown to the organization (or business group affected)

• A system storing data that the organization did not know existed on that system

• A system that had unknown network connections or accessibility

• A system that had unknown accounts or privileges

Source: "2008 DATA BREACH INVESTIGATIONS REPORT", A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM, 10th June 2008

Page 11: Računalna forenzika i automatizirani odgovor na mrežne incidente

11

Reactively• We manually investigate incidents, which is time consuming

• We employ 3rd party consultancies to collect data for compliance

• We quarantine computers from the network (disrupting operations)

• We need multiple tools to investigate and solve problems

• We have to wait for our AV vendor to supply signatures for new outbreaks

Proactively• We cannot search the network for IP or other sensitive data

• We cannot search for unauthorised software or malicious code

• We cannot forensically remove data or malicious processes

• We don’t have time to investigate disgruntled employees

• We can’t identify potential risks comprehensively

How do we deal with these threats today?

Page 12: Računalna forenzika i automatizirani odgovor na mrežne incidente

15

Implement Incident Response infrastructure

Implement Encase Enterprise as a core • define additional funcionalities and plugins for Encase• trainig, testing, support, etc

Integrate it with other tools • IDS, IPS, network management, physical security, system

administration, etc...• Help Desk system, trouble ticketing system

Develop lifecycle for effcient Incident Response System

• policies, controls, reports, tests etc...• keep IR system proactive, healty and efficient

Page 13: Računalna forenzika i automatizirani odgovor na mrežne incidente

16

Anti-Forensics

Anti-forensics is any and all actions taken by an unauthorized intruder to conceal evidence

• securely deleting critical log files is considered an antiforensic technique.

discovered use of antiforensics in 39% cases this will be a trend to watch over the next years

Source:"2008 DATA BREACH INVESTIGATIONS REPORT",

A Study CONDUCTED BY THE VERIZON BUSINESS RISK TEAM

Page 14: Računalna forenzika i automatizirani odgovor na mrežne incidente

18

Incident Response Recommendations

Align process with policy Achieve “essential” then worry about “excellent” Secure business partner connections Create a data retention plan Control data with transaction zones Monitor event logs Create an incident response plan Increase awareness Engage in mock incident testing

Page 15: Računalna forenzika i automatizirani odgovor na mrežne incidente

19

IT security dependencies

IT security depends on core competencies:

• People - skill and knowledge problem

• Process - there are standards and best practices

• Technologies - control of usage and fuctions

This can be achived by • developing enterprise investigative infrastructure • use of forensics technologies as core part of IR

Page 16: Računalna forenzika i automatizirani odgovor na mrežne incidente

20

Key capabilities Covertly investigate across the network on live machines Bit level analysis able to uncover deleted and hidden data Also able to analyse volatile data in RAM Sweep enterprise for hacker code like key loggers & root kits Court validated as forensically sound Role based access control and encrypted data flow

Business benefits Respond to HR/IT requests much faster Conduct many more investigations with the same resource Rules employees in or out of investigations covertly Collects court validate evidence of wrong doing

EnCase Enterprise (EE) Platform

Page 17: Računalna forenzika i automatizirani odgovor na mrežne incidente

21

Key capabilities Can integrate directly with IDS and SIM solutions Automatically collects volatile data at point of attack or infection Threat can be killed immediately on target machine Scan and kill threat across entire network very quickly

Business benefits Acts on intelligence provided by SIM Guarantees collection of intelligence 24x7x365 Removes threat from entire estate without disrupting operations Helps enhance defences by offering real actionable intelligence Drives the true value out of IDS and SIM solutions An effective way to counter “Day Zero” attacks !

EnCase Incident Response

Page 18: Računalna forenzika i automatizirani odgovor na mrežne incidente

22

A professional Malicious attacker tries to penetrate your network and you have netForensics deployed.

The SIM (netForensics) & other perimeter defence products throw up hi-priority alerts

Alert passed on to EnCase Enterprise Automatic Snapshot of target machine retrieved (all

processes running in RAM of target) Your SIRT team analyse snapshot results to determine

malicious processes Process can be killed remotely and forensically wiped on

target node Malicious/Rogue process hashed and enterprise sweep

carried out to determine extent of breach. Can be remotely wiped on all “infected” nodes to clean network

Case Review IR

Page 19: Računalna forenzika i automatizirani odgovor na mrežne incidente

23

Kill Malicious Process – options

Choice of deleting the process file, or

deleting and wiping from hard drive

Page 20: Računalna forenzika i automatizirani odgovor na mrežne incidente

24

Global Market Leaders across industries rely on Guidance Software

Page 21: Računalna forenzika i automatizirani odgovor na mrežne incidente

25

Pitanja

[email protected]


Recommended