SlideShare une entreprise Scribd logo
1  sur  62
TransformingLives. InventingtheFuture. www.iit.edu
I ELLINOIS T UINS TI T
OF TECHNOLOGY
ITM 578 1
DisasterRecovery & Business Continuity
Ray Trygstad
ITM 478/578
Spring 2004
Master of Information Technology & Management Program
CenterforProfessional Development
Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 2
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives
Upon completion of this lesson the student should
be able to:
– Describe what contingency planning is and
how incident response planning, disaster
recovery planning, and business continuity
plans are related to contingency planning.
– Discuss the elements that comprise a business
impact analysis and the information that is
collected for the attack profile.
– Recognize the components of an incident
response plan.
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 3
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives
Upon completion of this lesson the student should
be able to:
– Explain the steps involved in incident reaction
and incident recovery.
– Define the disaster recovery plan and its parts.
– Define the business continuity plan and its
parts.
– Discuss the reasons for and against involving
law enforcement officials in incident responses
and when may be required.
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 4
ILLINOIS INSTITUTE OF TECHNOLOGY
FIGURE 7-1 Contingency Planning and the SecSDLCContingency Planning and the SecSDLC
Contingency Planning
Design:
planning for continuty
Chapter 7
Investigate
Analyze
Implement
Maintain
Physical Design
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 5
ILLINOIS INSTITUTE OF TECHNOLOGY
Continuity Strategy
Managers must provide strategic
planning to assure continuous
information systems availability ready
to use when an attack occurs
Plans for events of this type are
referred to in a number of ways:
– Business Continuity Plans (BCPs)
– Disaster Recovery Plans (DRPs)
– Incident Response Plans (IRPs)
– Contingency Plans
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 6
ILLINOIS INSTITUTE OF TECHNOLOGY
Continuity Strategy
Large organizations may have many
types of plans, small organizations
may have one simple plan, but most
have inadequate planning
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 7
ILLINOIS INSTITUTE OF TECHNOLOGY
Contingency Planning
Components of Contingency Planning
(CP):
– Incident Response Planning (IRP)
– Disaster Recovery Planning (DRP)
– Business Continuity Planning (BCP)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 8
ILLINOIS INSTITUTE OF TECHNOLOGY
Contingency Planning
 The primary functions of these three
planning components:
– IRP focuses on immediate response, but if the
attack escalates or is disastrous the process
changes to disaster recovery and BCP
– DRP typically focuses on restoring systems after
disasters occur, and as such is closely associated
with BCP
– BCP occurs concurrently with DRP when the
damage is major or long term, requiring more
than simple restoration of information and
information resources
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 9
ILLINOIS INSTITUTE OF TECHNOLOGY
Contingency Planning Team
Before any planning can begin, a team
has to plan the effort and prepare the
resulting documents
Champion - A high-level manager to
support, promote, and endorse the
findings of the project
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 10
ILLINOIS INSTITUTE OF TECHNOLOGY
Contingency Planning Team
 Project Manager - Leads the project and
makes sure a sound project planning
process is used, a complete and useful
project plan is developed, and project
resources are prudently managed
 Team Members - Should be the managers
or their representatives from the various
communities of interest: Business, IT, and
Information Security
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 11
ILLINOIS INSTITUTE OF TECHNOLOGY
Contingency Planning Hierarchy
ContingencyContingency
PlanningPlanning
DisasterDisaster
RecoveryRecovery
IncidentIncident
ResponseResponse
BusinessBusiness
ContinuityContinuity
FIGURE 7-2 Contingency Planning Hierarchy
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 12
ILLINOIS INSTITUTE OF TECHNOLOGY
Contingency Planning Timeline
FIGURE 7-3 Contingency Planning Timeline
Incident Response (IRP)Incident Response (IRP)
Disaster Recovery Planning (DRP)Disaster Recovery Planning (DRP)
Business Continuity (BCP)Business Continuity (BCP)
Attack Post Attack
(hours)
Post Attack
(days)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 13
ILLINOIS INSTITUTE OF TECHNOLOGY
Major Steps in Contingency Planning
Identification ofIdentification of
threats and attacksthreats and attacks
Business unit analysisBusiness unit analysis
Scenarios ofScenarios of
successful attackssuccessful attacks
Assessment ofAssessment of
potential damagespotential damages
Classification ofClassification of
subordinate planssubordinate plans
IncidentIncident
planningplanning
IncidentIncident
detectiondetection
IncidentIncident
reactionreaction
IncidentIncident
recoveryrecovery
Plan forPlan for
disasterdisaster
recoveryrecovery
CrisisCrisis
ManagementManagement
RecoveryRecovery
operationsoperations
EstablishEstablish
ContinuityContinuity
strategystrategy
Plan forPlan for
continuity ofcontinuity of
operationsoperations
ContinuityContinuity
managementmanagement
Incident
response
planning
Business impact
analysis (BIA)
Disaster
recovery
planning
Business
continuity
planning
FIGURE 7-4 Major Steps in Contingency Planning
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 14
ILLINOIS INSTITUTE OF TECHNOLOGY
Business Impact Analysis
Begin with Business Impact Analysis
(BIA)
if the attack succeeds, what do we do then?
The CP team conducts the BIA in the
following stages:
1.Threat attack identification
2.Business unit analysis
3.Attack success scenarios
4.Potential damage assessment
5.Subordinate plan classification
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 15
ILLINOIS INSTITUTE OF TECHNOLOGY
Threat Attack Identification & Prioritization
 Update threat list with latest developments
and add the attack profile
 The attack profile is the detailed description
of activities during an attack
 Must be developed for every serious threat
the organization faces
 Used to determine the extent of damage that
could result to a business unit if the attack
were successful
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 16
ILLINOIS INSTITUTE OF TECHNOLOGY
Table 7-1 – Attack Profile
Date of AnalysisDate of Analysis
Attack name & descriptionAttack name & description
Threat & probable threat agentThreat & probable threat agent
Known or possible vulnerabilitiesKnown or possible vulnerabilities
Likely precursor activities or indicatorsLikely precursor activities or indicators
Likely attack activities or indicators of attack inLikely attack activities or indicators of attack in
progressprogress
Information assets or risk from this attackInformation assets or risk from this attack
Damage or loss to information assets likelyDamage or loss to information assets likely
from this attackfrom this attack
Other assets at risk from this attackOther assets at risk from this attack
Damage or loss to other assets likely from thisDamage or loss to other assets likely from this
attackattack
TABLE 7-1 Attack Profile
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 17
ILLINOIS INSTITUTE OF TECHNOLOGY
Business Unit Analysis
The second major task within the BIA
is the analysis and prioritization of
business functions within the
organization
Identify the functional areas of the
organization and prioritize them as to
which are most vital
Focus on a prioritized list of the
various functions the organization
performs
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 18
ILLINOIS INSTITUTE OF TECHNOLOGY
Attack Success Scenario Development
 Next create a series of scenarios depicting
the impact a successful attack from each
threat could have on each prioritized
functional area with:
– details on the method of attack
– the indicators of attack
– the broad consequences
 Attack success scenarios details are added to
the attack profile including:
– Best case
– Worst case
– Most likely alternate outcomes
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 19
ILLINOIS INSTITUTE OF TECHNOLOGY
Potential Damage Assessment
From the attack success scenarios
developed, the BIA planning team
must estimate the cost of the best,
worst, and most likely cases
Costs include actions of the response
team
This final result is referred to as an
attack scenario end case
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 20
ILLINOIS INSTITUTE OF TECHNOLOGY
Subordinate Plan Classification
 Once potential damage has been assessed, a
subordinate plan must be developed or
identified
 Subordinate plans will take into account the
identification of, reaction to, and recovery
from each attack scenario
 An attack scenario end case is categorized
as disastrous or not
 The qualifying difference is whether or not
an organization is able to take effective
action during the event to combat the effect
of the attack
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 21
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Response Planning
Incident response planning covers the
identification of, classification of, and
response to an incident
An incident is an attack against an
information asset that poses a clear
threat to the confidentiality, integrity,
or availability of information resources
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 22
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Response Planning
 Attacks are only classified as incidents if
they have the following characteristics:
– Are directed against information assets
– Have a realistic chance of success
– Could threaten the confidentiality, integrity, or
availability of information resources
 IR is more reactive, than proactive, with
the exception of the planning that must
occur to prepare the IR teams to be ready
to react to an incident
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 23
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Planning
The pre-defined responses enable the
organization to react quickly and
effectively to the detected incident
This assumes two things:
– first, the organization has an IR team
– second, the organization can detect the
incident
The IR team consists of those
individuals needed to handle the
systems as incident takes place
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 24
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Planning
 The military process of planned team
responses can be used in an incident
response
 The planners should develop a set of
documents that guide the actions of each
involved individual reacting to and
recovering from the incident
 These plans must be properly organized
and stored
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 25
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Response Plan
Format and Content
– The plan must be organized to support
quick and easy access to the information
needed
Storage
– The plan should be protected as sensitive
information
– On the other hand, the organization needs
this information readily available
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 26
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Response Plan
Testing
– An untested plan is not a useful plan.
The levels of testing strategies can vary:
– Checklist
– Structured walk-through
– Simulation
– Parallel
– Full-interruption
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 27
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Detection
 The most common occurrence is a complaint about
technology support, often delivered to the help desk
 Possible detections:
– intrusion detection systems, both host-based and
network-based
– virus detection software
– systems administrators
– end users
 Only through careful training can the organization
hope to quickly identify and classify an incident
 Once an attack is properly identified, the
organization can respond
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 28
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Indicators
Possible indicators of
incidents:
– Presence of unfamiliar
files
– Unknown programs or
processes
– Unusual consumption of
computing resources
– Unusual system crashes
Probable indicators of
incidents:
– Activities at unexpected
times
– Presence of new accounts
– Reported attacks
– Notification from IDS
Definite indicators of
incidents:
– Use of dormant accounts
– Changes to logs
– Presence of hacker tools
– Notifications by partner
or peer
– Notification by hacker
Predefined situations
that signal an
automatic incident:
– Loss of availability
– Loss of integrity
– Loss of confidentiality
– Violation of policy
– Violation of law
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 29
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident or Disaster
When Does an Incident Become a
Disaster?
– the organization is unable to mitigate the
impact of an incident during the incident
– the level of damage or destruction is so
severe the organization is unable to
quickly recover
– It is up to the organization to decide which
incidents are to be classified as disasters
and thus receive the appropriate level of
response
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 30
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Reaction
 Incident reaction consists of actions that
guide the organization to stop the incident,
mitigate the impact of the incident, and
provide information for the recovery from
the incident
 In reacting to the incident there are a
number of actions that must occur quickly
including:
– notification of key personnel
– assignment of tasks
– documentation of the incident
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 31
ILLINOIS INSTITUTE OF TECHNOLOGY
Notification of Key Personnel
 Most organizations maintain alert rosters
for emergencies. An alert roster contains
contact information for the individuals to be
notified in an incident
 Two ways to activate an alert roster:
– A sequential roster is activated as a contact
person calls each and every person on the roster
– A hierarchical roster is activated as the first
person calls a few other people on the roster, who
in turn call a few other people, and so on
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 32
ILLINOIS INSTITUTE OF TECHNOLOGY
The Alert Message
The alert message is a scripted
description of the incident, with just
enough information so that everyone
knows what part of the IRP to
implement
Can be prepared rapidly by filling in
the blanks in a template included in
the IRP
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 33
ILLINOIS INSTITUTE OF TECHNOLOGY
Documenting an Incident
 Documenting the event is important:
– First, it is important to ensure that the event is
recorded for the organization’s records, to know
what happened, and how it happened, and what
actions were taken. The documentation should
record the who, what, when, where, why, and how
of the even
– Second, it is important to prove, should it ever be
questioned, that the organization did everything
possible to prevent the spread of the incident
– Finally, the recorded incident can also be used as
a simulation in future training sessions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 34
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Containment Strategies
 Before an incident can be contained, the
affected areas of the information and
information systems must be determined
 The organization can stop the incident and
attempt to recover control through a
number of strategies including:
– severing the affected circuits
– disabling accounts
– reconfiguring a firewall
– The ultimate containment option, reserved for
only the most drastic of scenarios, involves a full
stop of all computers and network devices in the
organization
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 35
ILLINOIS INSTITUTE OF TECHNOLOGY
Incident Recovery
 Once the incident has been contained, and
control of the systems regained, the next
stage is recovery
 The first task is to identify the human
resources needed and launch them into
action
 The full extent of the damage must be
assessed
 The organization repairs vulnerabilities,
addresses any shortcomings in safeguards,
and restores the data and services of the
systems
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 36
ILLINOIS INSTITUTE OF TECHNOLOGY
Damage Assessment
 There are several sources of information:
– including system logs
– intrusion detection logs
– configuration logs and documents
– documentation from the incident response
– results of a detailed assessment of systems and
data storage
 Computer evidence must be carefully
collected, documented, and maintained to be
acceptable in formal proceedings
 Individuals assessing damage need special
training
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 37
ILLINOIS INSTITUTE OF TECHNOLOGY
Recovery
In the recovery process:
– Identify the vulnerabilities that allowed
the incident to occur and spread and
resolve them
– Address the safeguards that failed to stop
or limit the incident, or were missing from
the system in the first place. Install,
replace or upgrade them
– Evaluate monitoring capabilities. Improve
their detection and reporting methods, or
simply install new monitoring capabilities
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 38
ILLINOIS INSTITUTE OF TECHNOLOGY
Recovery
In the recovery process:
– Restore the data from backups
– Restore the services and processes in use
– Continuously monitor the system
– Restore the confidence of the members of
the organization’s communities of interest
– Conduct an after-action review
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 39
ILLINOIS INSTITUTE OF TECHNOLOGY
Automated Response
 New systems can respond to incidents
autonomously
 Trap and trace uses a combination of
resources to detect intrusion then trace back
to source
 Trapping may involve honeypots or
honeynets
 Entrapment is luring an individual into
committing a crime to get a conviction
 Enticement is legal and ethical, while
entrapment is not
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 40
ILLINOIS INSTITUTE OF TECHNOLOGY
Disaster Recovery Planning
 Disaster recovery planning (DRP) is planning the
preparation for and recovery from a disaster
 The contingency planning team must decide which
actions constitute disasters and which constitute
incidents
 When situations are classified as disasters plans
change as to how to respond - take action to secure
the most valuable assets to preserve value for the
longer term even at the risk of more disruption
 DRP strives to reestablish operations at the
‘primary’ site
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 41
ILLINOIS INSTITUTE OF TECHNOLOGY
DRP Steps
 There must be a clear establishment of
priorities
 There must be a clear delegation of roles and
responsibilities
 Someone must initiate the alert roster and
notify key personnel
 Someone must be tasked with the
documentation of the disaster
 If and only if it is possible, some attempts
must be made to mitigate the impact of the
disaster on the operations of the
organization
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 42
ILLINOIS INSTITUTE OF TECHNOLOGY
Crisis Management
 Crisis management is actions taken during and after
a disaster focusing on the people involved and
addressing the viability of the business
 The crisis management team is responsible for
managing the event from an enterprise perspective
and covers:
– Supporting personnel and families during the crisis
– Determining impact on normal business operations and, if
necessary, making a disaster declaration
– Keeping the public informed
– Communicating with major customers, suppliers, partners,
regulatory agencies, industry organizations, the media, and
other interested parties
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 43
ILLINOIS INSTITUTE OF TECHNOLOGY
Disaster Recovery Planning
 Establish a command center to support
communications
 Includes individuals from all functional
areas of the organization to facilitate
communications and cooperation
 Some key areas of crisis management
include:
– Verifying personnel head count
– Checking the alert roster
– Checking emergency information cards
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 44
ILLINOIS INSTITUTE OF TECHNOLOGY
DRP Structure
 Similar to the IRP, DRP is organized by
disaster, and provides procedures to execute
during and after a disaster
 Provides details on the roles and
responsibilities for those involved in the
effort, and identifies the personnel and
agencies that must be notified
 Just as the IRP must be tested, so must the
DRP, using the same testing mechanisms
 Each organization must examine its
scenarios, developed during the initial
contingency planning, to determine how to
respond to the various disasters
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 45
ILLINOIS INSTITUTE OF TECHNOLOGY
Business Continuity Planning
Business continuity planning
outlines reestablishment of critical
business operations during a disaster
that impacts operations
If a disaster has rendered the
business unusable for continued
operations, there must be a plan to
allow the business to continue to
function
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 46
ILLINOIS INSTITUTE OF TECHNOLOGY
Continuity Strategies
 There are a number of strategies for
planning for business continuity
 The determining factor in selection between
these options is usually cost
 In general there are three exclusive options:
– hot sites
– warm sites
– cold sites
 And three shared functions:
– timeshare
– service bureaus
– mutual agreements
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 47
ILLINOIS INSTITUTE OF TECHNOLOGY
Off-Site Disaster Data Storage
 To get these types of sites up and running quickly,
the organization must have the ability to port data
into the new site’s systems
 These include:
– Electronic vaulting - The bulk batch-transfer of data to an
off-site facility.
– Remote Journaling - The transfer of live transactions to an
off-site facility; only transactions are transferred not
archived data, and the transfer is real-time.
– Database shadowing - Not only processing duplicate real-
time data storage, but also duplicates the databases at the
remote site to multiple servers.
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 48
ILLINOIS INSTITUTE OF TECHNOLOGY
Model for IR/DR/BC Plan
The single document set approach
supports concise planning and
encourages smaller organizations to
develop, test, and use IR/DR plans
The model presented is based on
analyses of disaster recovery and
incident response plans of dozens of
organizations
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 49
ILLINOIS INSTITUTE OF TECHNOLOGY
The Planning Document
1. Establish responsibility for managing
the document, typically the security
administrator
2. Appoint a secretary to document the
activities and results of the planning
session(s)
3. Independent incident response and
disaster recovery teams are formed,
with a common planning committee
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 50
ILLINOIS INSTITUTE OF TECHNOLOGY
The Planning Document
4. Outline the roles and
responsibilities for each team
member
5. Develop the alert roster and lists of
critical agencies
6. Identify and prioritize threats to the
organization’s information and
information systems
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 51
ILLINOIS INSTITUTE OF TECHNOLOGY
The Planning Process
There are six steps in the Contingency
Planning process:
1. Identifying the mission- or business-critical
functions
2. Identifying the resources that support the
critical functions
3. Anticipating potential contingencies or
disasters
4. Selecting contingency planning strategies
5. Implementing the contingency strategies
6. Testing and revising the strategy
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 52
ILLINOIS INSTITUTE OF TECHNOLOGY
Using the Plan
During the incident
After the incident
Before the incident
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 53
ILLINOIS INSTITUTE OF TECHNOLOGY
Contingency Plan
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 54
ILLINOIS INSTITUTE OF TECHNOLOGY
Law Enforcement Involvement
 When the incident at hand constitutes a violation of
law the organization may determine that involving
law enforcement is necessary
 There are several questions, which must then be
answered:
– When should the organization get law enforcement
involved?
– What level of law enforcement agency should be involved:
local, state, or federal?
– What will happen when the law enforcement agency is
involved?
 Some of these questions are best answered by the
organization’s legal department
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 55
ILLINOIS INSTITUTE OF TECHNOLOGY
Local, State, or Federal Authorities
 Selecting the level of law enforcement
depends on the level and type of crime
discovered:
– The Federal Bureau of Investigation deals with
many computer crimes that are categorized as
felonies
– The US Secret Service works with crimes
involving US currency, counterfeiting, credit
cards, identity theft, and other crimes
– The US Treasury Department has a bank fraud
investigation unit and the Securities and
Exchange Commission has investigation and
fraud control units as well
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 56
ILLINOIS INSTITUTE OF TECHNOLOGY
State Investigative Services
 Each state has its own version of the FBI
(except Illinois! – interesting story why not)
 These state agencies arrest individuals,
serves warrants, and generally enforce laws
on property that is owned by the state or any
state agency
 In Illinois, computer crime is the
responsibility of the State of Illinois High
Tech Crime Bureau, part of the Attorney
General’s Office
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 57
ILLINOIS INSTITUTE OF TECHNOLOGY
Local Law Enforcement
 Local agencies enforce all local and state
laws and handle suspects and security crime
scenes for state and federal cases
 Local law enforcement agencies seldom have
a computer crimes task force, but most
investigative (detective) units are capable of
processing crime scenes, and handling most
common criminal activities and the
apprehension and processing of suspects of
computer related crimes
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 58
ILLINOIS INSTITUTE OF TECHNOLOGY
Benefits of Law Enforcement Involvement
Involving law enforcement agencies has
advantages:
– Agencies may be much better equipped at
processing evidence than private
organizations
– Unless the organization has staff trained
in forensics they may less effective in
convicting suspects
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 59
ILLINOIS INSTITUTE OF TECHNOLOGY
Benefits of Law Enforcement Involvement
Involving law enforcement agencies has
advantages:
– Law enforcement agencies are also
prepared to handle the warrants and
subpoenas needed
– Law enforcement skilled at obtaining
statements from witnesses, completing
affidavits, and other information collection
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 60
ILLINOIS INSTITUTE OF TECHNOLOGY
Drawbacks to Law Enforcement Involvement
Involving law enforcement agencies
has disadvantages:
– On the downside, once a law
enforcement agency takes over a case,
the organization loses complete control
over the chain of events
– The organization may not hear about the
case for weeks or even months
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 61
ILLINOIS INSTITUTE OF TECHNOLOGY
Drawbacks to Law Enforcement Involvement
Involving law enforcement agencies
has disadvantages:
– Equipment vital to the organization’s
business may be tagged as evidence, to
be removed, stored, and preserved until
it can be examined for possible support
for the criminal case
– However, if the organization detects a
criminal act, it is a legal obligation to
involve the appropriate law enforcement
officials
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 62
ILLINOIS INSTITUTE OF TECHNOLOGY
The End…
Questions?

Contenu connexe

Tendances

Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptShruthi48
 
Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101Srinivasan Vanamali
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1MLG College of Learning, Inc
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...BCM Institute
 
2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdf2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdfHamisi Mohamedi
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionMuhammad Akbar Yasin
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 

Tendances (20)

Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Security policy
Security policySecurity policy
Security policy
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...
 
2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdf2015-01- BCP Assessment QA.pdf
2015-01- BCP Assessment QA.pdf
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 

Similaire à Disaster recovery & business continuity

Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threatsDean Evans
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
2-2b-contingency-planning-swanson-nist.pdf
2-2b-contingency-planning-swanson-nist.pdf2-2b-contingency-planning-swanson-nist.pdf
2-2b-contingency-planning-swanson-nist.pdfSuriaRao2
 
Planning for contingencies
Planning for contingenciesPlanning for contingencies
Planning for contingenciesHassanein Alwan
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCognizant
 
ISOL 533 - Information Security and Risk Management R.docx
ISOL 533 - Information Security and Risk Management            R.docxISOL 533 - Information Security and Risk Management            R.docx
ISOL 533 - Information Security and Risk Management R.docxchristiandean12115
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effortDhani Ahmad
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxmydrynan
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docxjackiewalcutt
 
Implementing CSIRT based on some frameworks and maturity model
Implementing CSIRT based on some frameworks and maturity modelImplementing CSIRT based on some frameworks and maturity model
Implementing CSIRT based on some frameworks and maturity modelRakuten Group, Inc.
 
The Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About DisastersThe Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About DisastersDevOps.com
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxjeanettehully
 
Project Management and ICS article
Project Management and ICS articleProject Management and ICS article
Project Management and ICS articleDavid Rudawitz
 
CTI_introduction_recording final.pptx
CTI_introduction_recording final.pptxCTI_introduction_recording final.pptx
CTI_introduction_recording final.pptxipalmer489
 
Security Policies and Implementation IssuesChapter 12Inciden.docx
Security Policies and Implementation IssuesChapter 12Inciden.docxSecurity Policies and Implementation IssuesChapter 12Inciden.docx
Security Policies and Implementation IssuesChapter 12Inciden.docxjeffreye3
 
MIT BUSINESS CONTINUITY PLAN This is an external rele.docx
MIT BUSINESS CONTINUITY PLAN  This is an external rele.docxMIT BUSINESS CONTINUITY PLAN  This is an external rele.docx
MIT BUSINESS CONTINUITY PLAN This is an external rele.docxannandleola
 

Similaire à Disaster recovery & business continuity (20)

Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
Satori Whitepaper: Threat Intelligence  - a path to taming digital threatsSatori Whitepaper: Threat Intelligence  - a path to taming digital threats
Satori Whitepaper: Threat Intelligence - a path to taming digital threats
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
2-2b-contingency-planning-swanson-nist.pdf
2-2b-contingency-planning-swanson-nist.pdf2-2b-contingency-planning-swanson-nist.pdf
2-2b-contingency-planning-swanson-nist.pdf
 
Planning for contingencies
Planning for contingenciesPlanning for contingencies
Planning for contingencies
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
 
ISOL 533 - Information Security and Risk Management R.docx
ISOL 533 - Information Security and Risk Management            R.docxISOL 533 - Information Security and Risk Management            R.docx
ISOL 533 - Information Security and Risk Management R.docx
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx1. After a cyber attack, the organizational decision making and re.docx
1. After a cyber attack, the organizational decision making and re.docx
 
Implementing CSIRT based on some frameworks and maturity model
Implementing CSIRT based on some frameworks and maturity modelImplementing CSIRT based on some frameworks and maturity model
Implementing CSIRT based on some frameworks and maturity model
 
The Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About DisastersThe Perfect Storm - How We Talk About Disasters
The Perfect Storm - How We Talk About Disasters
 
Running Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docxRunning Head Personal Reflection1Personal Reflection1.docx
Running Head Personal Reflection1Personal Reflection1.docx
 
Project Management and ICS article
Project Management and ICS articleProject Management and ICS article
Project Management and ICS article
 
CTI_introduction_recording final.pptx
CTI_introduction_recording final.pptxCTI_introduction_recording final.pptx
CTI_introduction_recording final.pptx
 
Security Policies and Implementation IssuesChapter 12Inciden.docx
Security Policies and Implementation IssuesChapter 12Inciden.docxSecurity Policies and Implementation IssuesChapter 12Inciden.docx
Security Policies and Implementation IssuesChapter 12Inciden.docx
 
MIT BUSINESS CONTINUITY PLAN This is an external rele.docx
MIT BUSINESS CONTINUITY PLAN  This is an external rele.docxMIT BUSINESS CONTINUITY PLAN  This is an external rele.docx
MIT BUSINESS CONTINUITY PLAN This is an external rele.docx
 

Plus de Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentationsDhani Ahmad
 

Plus de Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Secure
SecureSecure
Secure
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentations
 

Dernier

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 

Dernier (20)

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 

Disaster recovery & business continuity

  • 1. TransformingLives. InventingtheFuture. www.iit.edu I ELLINOIS T UINS TI T OF TECHNOLOGY ITM 578 1 DisasterRecovery & Business Continuity Ray Trygstad ITM 478/578 Spring 2004 Master of Information Technology & Management Program CenterforProfessional Development Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
  • 2. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 2 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives Upon completion of this lesson the student should be able to: – Describe what contingency planning is and how incident response planning, disaster recovery planning, and business continuity plans are related to contingency planning. – Discuss the elements that comprise a business impact analysis and the information that is collected for the attack profile. – Recognize the components of an incident response plan.
  • 3. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 3 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives Upon completion of this lesson the student should be able to: – Explain the steps involved in incident reaction and incident recovery. – Define the disaster recovery plan and its parts. – Define the business continuity plan and its parts. – Discuss the reasons for and against involving law enforcement officials in incident responses and when may be required.
  • 4. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 4 ILLINOIS INSTITUTE OF TECHNOLOGY FIGURE 7-1 Contingency Planning and the SecSDLCContingency Planning and the SecSDLC Contingency Planning Design: planning for continuty Chapter 7 Investigate Analyze Implement Maintain Physical Design
  • 5. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 5 ILLINOIS INSTITUTE OF TECHNOLOGY Continuity Strategy Managers must provide strategic planning to assure continuous information systems availability ready to use when an attack occurs Plans for events of this type are referred to in a number of ways: – Business Continuity Plans (BCPs) – Disaster Recovery Plans (DRPs) – Incident Response Plans (IRPs) – Contingency Plans
  • 6. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 6 ILLINOIS INSTITUTE OF TECHNOLOGY Continuity Strategy Large organizations may have many types of plans, small organizations may have one simple plan, but most have inadequate planning
  • 7. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 7 ILLINOIS INSTITUTE OF TECHNOLOGY Contingency Planning Components of Contingency Planning (CP): – Incident Response Planning (IRP) – Disaster Recovery Planning (DRP) – Business Continuity Planning (BCP)
  • 8. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 8 ILLINOIS INSTITUTE OF TECHNOLOGY Contingency Planning  The primary functions of these three planning components: – IRP focuses on immediate response, but if the attack escalates or is disastrous the process changes to disaster recovery and BCP – DRP typically focuses on restoring systems after disasters occur, and as such is closely associated with BCP – BCP occurs concurrently with DRP when the damage is major or long term, requiring more than simple restoration of information and information resources
  • 9. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 9 ILLINOIS INSTITUTE OF TECHNOLOGY Contingency Planning Team Before any planning can begin, a team has to plan the effort and prepare the resulting documents Champion - A high-level manager to support, promote, and endorse the findings of the project
  • 10. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 10 ILLINOIS INSTITUTE OF TECHNOLOGY Contingency Planning Team  Project Manager - Leads the project and makes sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed  Team Members - Should be the managers or their representatives from the various communities of interest: Business, IT, and Information Security
  • 11. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 11 ILLINOIS INSTITUTE OF TECHNOLOGY Contingency Planning Hierarchy ContingencyContingency PlanningPlanning DisasterDisaster RecoveryRecovery IncidentIncident ResponseResponse BusinessBusiness ContinuityContinuity FIGURE 7-2 Contingency Planning Hierarchy
  • 12. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 12 ILLINOIS INSTITUTE OF TECHNOLOGY Contingency Planning Timeline FIGURE 7-3 Contingency Planning Timeline Incident Response (IRP)Incident Response (IRP) Disaster Recovery Planning (DRP)Disaster Recovery Planning (DRP) Business Continuity (BCP)Business Continuity (BCP) Attack Post Attack (hours) Post Attack (days)
  • 13. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 13 ILLINOIS INSTITUTE OF TECHNOLOGY Major Steps in Contingency Planning Identification ofIdentification of threats and attacksthreats and attacks Business unit analysisBusiness unit analysis Scenarios ofScenarios of successful attackssuccessful attacks Assessment ofAssessment of potential damagespotential damages Classification ofClassification of subordinate planssubordinate plans IncidentIncident planningplanning IncidentIncident detectiondetection IncidentIncident reactionreaction IncidentIncident recoveryrecovery Plan forPlan for disasterdisaster recoveryrecovery CrisisCrisis ManagementManagement RecoveryRecovery operationsoperations EstablishEstablish ContinuityContinuity strategystrategy Plan forPlan for continuity ofcontinuity of operationsoperations ContinuityContinuity managementmanagement Incident response planning Business impact analysis (BIA) Disaster recovery planning Business continuity planning FIGURE 7-4 Major Steps in Contingency Planning
  • 14. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 14 ILLINOIS INSTITUTE OF TECHNOLOGY Business Impact Analysis Begin with Business Impact Analysis (BIA) if the attack succeeds, what do we do then? The CP team conducts the BIA in the following stages: 1.Threat attack identification 2.Business unit analysis 3.Attack success scenarios 4.Potential damage assessment 5.Subordinate plan classification
  • 15. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 15 ILLINOIS INSTITUTE OF TECHNOLOGY Threat Attack Identification & Prioritization  Update threat list with latest developments and add the attack profile  The attack profile is the detailed description of activities during an attack  Must be developed for every serious threat the organization faces  Used to determine the extent of damage that could result to a business unit if the attack were successful
  • 16. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 16 ILLINOIS INSTITUTE OF TECHNOLOGY Table 7-1 – Attack Profile Date of AnalysisDate of Analysis Attack name & descriptionAttack name & description Threat & probable threat agentThreat & probable threat agent Known or possible vulnerabilitiesKnown or possible vulnerabilities Likely precursor activities or indicatorsLikely precursor activities or indicators Likely attack activities or indicators of attack inLikely attack activities or indicators of attack in progressprogress Information assets or risk from this attackInformation assets or risk from this attack Damage or loss to information assets likelyDamage or loss to information assets likely from this attackfrom this attack Other assets at risk from this attackOther assets at risk from this attack Damage or loss to other assets likely from thisDamage or loss to other assets likely from this attackattack TABLE 7-1 Attack Profile
  • 17. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 17 ILLINOIS INSTITUTE OF TECHNOLOGY Business Unit Analysis The second major task within the BIA is the analysis and prioritization of business functions within the organization Identify the functional areas of the organization and prioritize them as to which are most vital Focus on a prioritized list of the various functions the organization performs
  • 18. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 18 ILLINOIS INSTITUTE OF TECHNOLOGY Attack Success Scenario Development  Next create a series of scenarios depicting the impact a successful attack from each threat could have on each prioritized functional area with: – details on the method of attack – the indicators of attack – the broad consequences  Attack success scenarios details are added to the attack profile including: – Best case – Worst case – Most likely alternate outcomes
  • 19. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 19 ILLINOIS INSTITUTE OF TECHNOLOGY Potential Damage Assessment From the attack success scenarios developed, the BIA planning team must estimate the cost of the best, worst, and most likely cases Costs include actions of the response team This final result is referred to as an attack scenario end case
  • 20. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 20 ILLINOIS INSTITUTE OF TECHNOLOGY Subordinate Plan Classification  Once potential damage has been assessed, a subordinate plan must be developed or identified  Subordinate plans will take into account the identification of, reaction to, and recovery from each attack scenario  An attack scenario end case is categorized as disastrous or not  The qualifying difference is whether or not an organization is able to take effective action during the event to combat the effect of the attack
  • 21. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 21 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Response Planning Incident response planning covers the identification of, classification of, and response to an incident An incident is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources
  • 22. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 22 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Response Planning  Attacks are only classified as incidents if they have the following characteristics: – Are directed against information assets – Have a realistic chance of success – Could threaten the confidentiality, integrity, or availability of information resources  IR is more reactive, than proactive, with the exception of the planning that must occur to prepare the IR teams to be ready to react to an incident
  • 23. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 23 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Planning The pre-defined responses enable the organization to react quickly and effectively to the detected incident This assumes two things: – first, the organization has an IR team – second, the organization can detect the incident The IR team consists of those individuals needed to handle the systems as incident takes place
  • 24. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 24 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Planning  The military process of planned team responses can be used in an incident response  The planners should develop a set of documents that guide the actions of each involved individual reacting to and recovering from the incident  These plans must be properly organized and stored
  • 25. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 25 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Response Plan Format and Content – The plan must be organized to support quick and easy access to the information needed Storage – The plan should be protected as sensitive information – On the other hand, the organization needs this information readily available
  • 26. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 26 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Response Plan Testing – An untested plan is not a useful plan. The levels of testing strategies can vary: – Checklist – Structured walk-through – Simulation – Parallel – Full-interruption
  • 27. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 27 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Detection  The most common occurrence is a complaint about technology support, often delivered to the help desk  Possible detections: – intrusion detection systems, both host-based and network-based – virus detection software – systems administrators – end users  Only through careful training can the organization hope to quickly identify and classify an incident  Once an attack is properly identified, the organization can respond
  • 28. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 28 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Indicators Possible indicators of incidents: – Presence of unfamiliar files – Unknown programs or processes – Unusual consumption of computing resources – Unusual system crashes Probable indicators of incidents: – Activities at unexpected times – Presence of new accounts – Reported attacks – Notification from IDS Definite indicators of incidents: – Use of dormant accounts – Changes to logs – Presence of hacker tools – Notifications by partner or peer – Notification by hacker Predefined situations that signal an automatic incident: – Loss of availability – Loss of integrity – Loss of confidentiality – Violation of policy – Violation of law
  • 29. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 29 ILLINOIS INSTITUTE OF TECHNOLOGY Incident or Disaster When Does an Incident Become a Disaster? – the organization is unable to mitigate the impact of an incident during the incident – the level of damage or destruction is so severe the organization is unable to quickly recover – It is up to the organization to decide which incidents are to be classified as disasters and thus receive the appropriate level of response
  • 30. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 30 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Reaction  Incident reaction consists of actions that guide the organization to stop the incident, mitigate the impact of the incident, and provide information for the recovery from the incident  In reacting to the incident there are a number of actions that must occur quickly including: – notification of key personnel – assignment of tasks – documentation of the incident
  • 31. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 31 ILLINOIS INSTITUTE OF TECHNOLOGY Notification of Key Personnel  Most organizations maintain alert rosters for emergencies. An alert roster contains contact information for the individuals to be notified in an incident  Two ways to activate an alert roster: – A sequential roster is activated as a contact person calls each and every person on the roster – A hierarchical roster is activated as the first person calls a few other people on the roster, who in turn call a few other people, and so on
  • 32. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 32 ILLINOIS INSTITUTE OF TECHNOLOGY The Alert Message The alert message is a scripted description of the incident, with just enough information so that everyone knows what part of the IRP to implement Can be prepared rapidly by filling in the blanks in a template included in the IRP
  • 33. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 33 ILLINOIS INSTITUTE OF TECHNOLOGY Documenting an Incident  Documenting the event is important: – First, it is important to ensure that the event is recorded for the organization’s records, to know what happened, and how it happened, and what actions were taken. The documentation should record the who, what, when, where, why, and how of the even – Second, it is important to prove, should it ever be questioned, that the organization did everything possible to prevent the spread of the incident – Finally, the recorded incident can also be used as a simulation in future training sessions
  • 34. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 34 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Containment Strategies  Before an incident can be contained, the affected areas of the information and information systems must be determined  The organization can stop the incident and attempt to recover control through a number of strategies including: – severing the affected circuits – disabling accounts – reconfiguring a firewall – The ultimate containment option, reserved for only the most drastic of scenarios, involves a full stop of all computers and network devices in the organization
  • 35. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 35 ILLINOIS INSTITUTE OF TECHNOLOGY Incident Recovery  Once the incident has been contained, and control of the systems regained, the next stage is recovery  The first task is to identify the human resources needed and launch them into action  The full extent of the damage must be assessed  The organization repairs vulnerabilities, addresses any shortcomings in safeguards, and restores the data and services of the systems
  • 36. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 36 ILLINOIS INSTITUTE OF TECHNOLOGY Damage Assessment  There are several sources of information: – including system logs – intrusion detection logs – configuration logs and documents – documentation from the incident response – results of a detailed assessment of systems and data storage  Computer evidence must be carefully collected, documented, and maintained to be acceptable in formal proceedings  Individuals assessing damage need special training
  • 37. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 37 ILLINOIS INSTITUTE OF TECHNOLOGY Recovery In the recovery process: – Identify the vulnerabilities that allowed the incident to occur and spread and resolve them – Address the safeguards that failed to stop or limit the incident, or were missing from the system in the first place. Install, replace or upgrade them – Evaluate monitoring capabilities. Improve their detection and reporting methods, or simply install new monitoring capabilities
  • 38. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 38 ILLINOIS INSTITUTE OF TECHNOLOGY Recovery In the recovery process: – Restore the data from backups – Restore the services and processes in use – Continuously monitor the system – Restore the confidence of the members of the organization’s communities of interest – Conduct an after-action review
  • 39. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 39 ILLINOIS INSTITUTE OF TECHNOLOGY Automated Response  New systems can respond to incidents autonomously  Trap and trace uses a combination of resources to detect intrusion then trace back to source  Trapping may involve honeypots or honeynets  Entrapment is luring an individual into committing a crime to get a conviction  Enticement is legal and ethical, while entrapment is not
  • 40. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 40 ILLINOIS INSTITUTE OF TECHNOLOGY Disaster Recovery Planning  Disaster recovery planning (DRP) is planning the preparation for and recovery from a disaster  The contingency planning team must decide which actions constitute disasters and which constitute incidents  When situations are classified as disasters plans change as to how to respond - take action to secure the most valuable assets to preserve value for the longer term even at the risk of more disruption  DRP strives to reestablish operations at the ‘primary’ site
  • 41. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 41 ILLINOIS INSTITUTE OF TECHNOLOGY DRP Steps  There must be a clear establishment of priorities  There must be a clear delegation of roles and responsibilities  Someone must initiate the alert roster and notify key personnel  Someone must be tasked with the documentation of the disaster  If and only if it is possible, some attempts must be made to mitigate the impact of the disaster on the operations of the organization
  • 42. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 42 ILLINOIS INSTITUTE OF TECHNOLOGY Crisis Management  Crisis management is actions taken during and after a disaster focusing on the people involved and addressing the viability of the business  The crisis management team is responsible for managing the event from an enterprise perspective and covers: – Supporting personnel and families during the crisis – Determining impact on normal business operations and, if necessary, making a disaster declaration – Keeping the public informed – Communicating with major customers, suppliers, partners, regulatory agencies, industry organizations, the media, and other interested parties
  • 43. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 43 ILLINOIS INSTITUTE OF TECHNOLOGY Disaster Recovery Planning  Establish a command center to support communications  Includes individuals from all functional areas of the organization to facilitate communications and cooperation  Some key areas of crisis management include: – Verifying personnel head count – Checking the alert roster – Checking emergency information cards
  • 44. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 44 ILLINOIS INSTITUTE OF TECHNOLOGY DRP Structure  Similar to the IRP, DRP is organized by disaster, and provides procedures to execute during and after a disaster  Provides details on the roles and responsibilities for those involved in the effort, and identifies the personnel and agencies that must be notified  Just as the IRP must be tested, so must the DRP, using the same testing mechanisms  Each organization must examine its scenarios, developed during the initial contingency planning, to determine how to respond to the various disasters
  • 45. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 45 ILLINOIS INSTITUTE OF TECHNOLOGY Business Continuity Planning Business continuity planning outlines reestablishment of critical business operations during a disaster that impacts operations If a disaster has rendered the business unusable for continued operations, there must be a plan to allow the business to continue to function
  • 46. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 46 ILLINOIS INSTITUTE OF TECHNOLOGY Continuity Strategies  There are a number of strategies for planning for business continuity  The determining factor in selection between these options is usually cost  In general there are three exclusive options: – hot sites – warm sites – cold sites  And three shared functions: – timeshare – service bureaus – mutual agreements
  • 47. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 47 ILLINOIS INSTITUTE OF TECHNOLOGY Off-Site Disaster Data Storage  To get these types of sites up and running quickly, the organization must have the ability to port data into the new site’s systems  These include: – Electronic vaulting - The bulk batch-transfer of data to an off-site facility. – Remote Journaling - The transfer of live transactions to an off-site facility; only transactions are transferred not archived data, and the transfer is real-time. – Database shadowing - Not only processing duplicate real- time data storage, but also duplicates the databases at the remote site to multiple servers.
  • 48. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 48 ILLINOIS INSTITUTE OF TECHNOLOGY Model for IR/DR/BC Plan The single document set approach supports concise planning and encourages smaller organizations to develop, test, and use IR/DR plans The model presented is based on analyses of disaster recovery and incident response plans of dozens of organizations
  • 49. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 49 ILLINOIS INSTITUTE OF TECHNOLOGY The Planning Document 1. Establish responsibility for managing the document, typically the security administrator 2. Appoint a secretary to document the activities and results of the planning session(s) 3. Independent incident response and disaster recovery teams are formed, with a common planning committee
  • 50. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 50 ILLINOIS INSTITUTE OF TECHNOLOGY The Planning Document 4. Outline the roles and responsibilities for each team member 5. Develop the alert roster and lists of critical agencies 6. Identify and prioritize threats to the organization’s information and information systems
  • 51. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 51 ILLINOIS INSTITUTE OF TECHNOLOGY The Planning Process There are six steps in the Contingency Planning process: 1. Identifying the mission- or business-critical functions 2. Identifying the resources that support the critical functions 3. Anticipating potential contingencies or disasters 4. Selecting contingency planning strategies 5. Implementing the contingency strategies 6. Testing and revising the strategy
  • 52. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 52 ILLINOIS INSTITUTE OF TECHNOLOGY Using the Plan During the incident After the incident Before the incident
  • 53. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 53 ILLINOIS INSTITUTE OF TECHNOLOGY Contingency Plan
  • 54. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 54 ILLINOIS INSTITUTE OF TECHNOLOGY Law Enforcement Involvement  When the incident at hand constitutes a violation of law the organization may determine that involving law enforcement is necessary  There are several questions, which must then be answered: – When should the organization get law enforcement involved? – What level of law enforcement agency should be involved: local, state, or federal? – What will happen when the law enforcement agency is involved?  Some of these questions are best answered by the organization’s legal department
  • 55. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 55 ILLINOIS INSTITUTE OF TECHNOLOGY Local, State, or Federal Authorities  Selecting the level of law enforcement depends on the level and type of crime discovered: – The Federal Bureau of Investigation deals with many computer crimes that are categorized as felonies – The US Secret Service works with crimes involving US currency, counterfeiting, credit cards, identity theft, and other crimes – The US Treasury Department has a bank fraud investigation unit and the Securities and Exchange Commission has investigation and fraud control units as well
  • 56. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 56 ILLINOIS INSTITUTE OF TECHNOLOGY State Investigative Services  Each state has its own version of the FBI (except Illinois! – interesting story why not)  These state agencies arrest individuals, serves warrants, and generally enforce laws on property that is owned by the state or any state agency  In Illinois, computer crime is the responsibility of the State of Illinois High Tech Crime Bureau, part of the Attorney General’s Office
  • 57. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 57 ILLINOIS INSTITUTE OF TECHNOLOGY Local Law Enforcement  Local agencies enforce all local and state laws and handle suspects and security crime scenes for state and federal cases  Local law enforcement agencies seldom have a computer crimes task force, but most investigative (detective) units are capable of processing crime scenes, and handling most common criminal activities and the apprehension and processing of suspects of computer related crimes
  • 58. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 58 ILLINOIS INSTITUTE OF TECHNOLOGY Benefits of Law Enforcement Involvement Involving law enforcement agencies has advantages: – Agencies may be much better equipped at processing evidence than private organizations – Unless the organization has staff trained in forensics they may less effective in convicting suspects
  • 59. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 59 ILLINOIS INSTITUTE OF TECHNOLOGY Benefits of Law Enforcement Involvement Involving law enforcement agencies has advantages: – Law enforcement agencies are also prepared to handle the warrants and subpoenas needed – Law enforcement skilled at obtaining statements from witnesses, completing affidavits, and other information collection
  • 60. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 60 ILLINOIS INSTITUTE OF TECHNOLOGY Drawbacks to Law Enforcement Involvement Involving law enforcement agencies has disadvantages: – On the downside, once a law enforcement agency takes over a case, the organization loses complete control over the chain of events – The organization may not hear about the case for weeks or even months
  • 61. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 61 ILLINOIS INSTITUTE OF TECHNOLOGY Drawbacks to Law Enforcement Involvement Involving law enforcement agencies has disadvantages: – Equipment vital to the organization’s business may be tagged as evidence, to be removed, stored, and preserved until it can be examined for possible support for the criminal case – However, if the organization detects a criminal act, it is a legal obligation to involve the appropriate law enforcement officials
  • 62. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 62 ILLINOIS INSTITUTE OF TECHNOLOGY The End… Questions?

Notes de l'éditeur

  1. Learning Objectives: Upon completion of this material you should be able to: Know what contingency planning is and how incident response planning, disaster recovery planning, and business continuity plans are related to contingency planning. Understand the elements that comprise a business impact analysis and the information that is collected for the attack profile. Recognize the components of an incident response plan and the components of the planning process. Define the disaster recovery plan and its parts. Define the business continuity plan and its parts. Grasp the reasons for and against involving law enforcement officials in incident responses and when it is required.
  2. Learning Objectives: Upon completion of this material you should be able to: Know what contingency planning is and how incident response planning, disaster recovery planning, and business continuity plans are related to contingency planning. Understand the elements that comprise a business impact analysis and the information that is collected for the attack profile. Recognize the components of an incident response plan and the components of the planning process. Define the disaster recovery plan and its parts. Define the business continuity plan and its parts. Grasp the reasons for and against involving law enforcement officials in incident responses and when it is required.
  3. Introduction So far you have: Identified the following the problems facing the organization Assessed a value for the organization’s information assets Analyzed the threats in the organization’s environment Identified potential vulnerabilities Assessed the risks associated with current levels of the organization’s exposure Prepared solid business reasons to support the risk strategy the organization should adopt for each information asset Begun to develop a security blueprint for future actions Outlined information security architecture or the necessary policies and technologies to guide the organization’s next steps. The next step is to examine the topic of contingency planning within the information security context.
  4. Continuity Strategy Managers in the IT and information security communities are called on to provide strategic planning to assure the organization of continuous information systems availability. Each must be ready to act when a successful attack occurs. Plans for events of this type are referred to in a number of ways: Business Continuity Plans (BCPs), Disaster Recovery Plans (DRPs), Incident Response Plans (IRPs), or Contingency Plans.
  5. In large, complex organizations, each of these named plans may represent separate but related planning functions, differing in scope, applicability, and design. In a small organization, the security or systems administrator may have one simple plan, which consists of a straightforward set of media backup and recovery strategies, and a few service agreements from the company’s service providers. Many organizations have a level of planning that is woefully deficient.
  6. We can classify Incident Response, Disaster Recovery, and Business Continuity planning, as components of Contingency Planning. Contingency Planning (CP) is the entire planning conducted by the organization to prepare for, react to and recover from events that threaten the security of information and information assets in the organization, and the subsequent restoration to normal modes of business operations. Incident Response Planning (IRP) is the planning process associated with the identification, classification, response, and recovery from an incident. Disaster Recovery Planning (DRP) is the planning process associated with the preparation for and recovery from a disaster, whether natural or man-made. Business Continuity Planning (BCP) is the planning process associated with ensuring that critical business functions continue if a catastrophic incident or disaster occurs.
  7. The primary functions of these three types of planning are: IRP focuses on immediate response, but if the attack escalates or is disastrous the process changes to disaster recovery and BCP. DRP typically focuses on restoring systems after disasters occur, and as such is closely associated with BCP. BCP occurs concurrently with DRP when the damage is major or long term, requiring more than simple restoration of information and information resources.
  8. Contingency Planning Team Before any planning can begin, a team has to plan the effort and prepare the resulting documents Champion - A high-level manager to support, promote, and endorse the findings of the project Project Manager - Leads the project and makes sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed Team Members - Should be the managers or their representatives from the various communities of interest: Business, IT, and Information Security Before any planning can begin, a team has to plan the effort and prepare the resulting documents. Champion. A high-level manager to support, promote, and endorse the findings of the project. Project Manager. Leads the project and makes sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed. Team Members. Should be the managers or their representatives from the various communities of interest: business, IT, and infosec
  9. Business Impact Analysis The first phase in the development of the CP process is the Business Impact Analysis or BIA. A BIA is an investigation and assessment of the impact that various attacks can have on the organization, and takes up where the Risk Assessment process leaves off. The BIA assumes that these controls have been bypassed, have failed, or are otherwise ineffective in stopping the attack, and that the attack was successful. The question asked at this point is, if the attack succeeds, what do we do then? Business Impact Analysis The CP team conducts the BIA in the following stages: Threat Attack identification Business unit analysis Attack success scenarios Potential damage assessment Subordinate plan classification
  10. Threat Attack Identification and Prioritization Most organizations have already performed the tasks of identifying and prioritizing threats. All that is required now is to update the threat list with the latest developments and add one additional piece of information, the attack profile. An attack profile is a detailed description of the activities that occur during an attack, must be developed for every serious threat the organization faces and are used to determine the extent of damage that could result to a business unit if the attack were successful.
  11. Business Unit Analysis The second major task within the BIA is the analysis and prioritization of business functions within the organization. The intent of this task is to identify the functional areas of the organization and prioritize them to determine which are most vital to the continued operations of the organization. Efforts in function analysis focus on the result of a prioritized list of the various functions the organization performs.
  12. Attack Success Scenario Development Next the BIA team must create a series of scenarios depicting the impact a successful attack from each threat could have on each prioritized functional area with details on the method of attack, the indicators of attack, and the broad consequences. Then attack success scenarios with more detail are added to the attack profile, including alternate outcomes, describing a best, worst, and most likely case that could result from each type of attack on this particular business functional area.
  13. Potential Damage Assessment From the attack success scenarios developed above, the BIA planning team must estimate the cost of the best, worst, and most likely cases. These costs include the actions of the response team(s) described in subsequent sections as they act to quickly and effectively recover from any incident or disaster, and can also management representatives from all of the organization’s communities of interest of the importance of the planning and recovery efforts. This final result is referred to as an attack scenario end case.
  14. Subordinate Plan Classification Once the potential damage has been assessed, and each end case has been evaluated, a subordinate plan must be developed or identified from among existing plans already in place. These subordinate plans will take into account the identification of, reaction to, and recovery from each attack scenario. An attack scenario end case is categorized as disastrous or not. The qualifying difference is whether or not an organization is able to take effective action during the event to combat the effect of the attack.
  15. Incident Response Planning Incident response planning covers the identification of, classification of, and response to an incident. The IRP is made up of activities that are to be performed when an incident has been identified. An incident is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.
  16. Attacks are only classified as incidents if they have the following characteristics: Are directed against information assets Have a realistic chance of success Could threaten the confidentiality, integrity, or availability of information resources. Incident Response Planning Incident response (IR) is the set of activities taken to plan for, detect, and correct the impact of an incident on information resources. IR is more reactive, than proactive, with the exception of the planning that must occur to prepare the IR teams to be ready to react to an incident. Planning for an incident requires a detailed understanding of the scenarios developed for the BIA.
  17. Incident Planning The pre-defined responses enable the organization to react quickly and effectively to the detected incident. This assumes two things: first, the organization has an IR team, and second, the organization can detect the incident. The IR team consists of those individuals who must be present to handle the systems and functional areas that can minimize the impact of an incident as it takes place.
  18. Incident Planning The designated IR teams act to verify the threat, determine the appropriate response, and coordinate the actions necessary to deal with the situation. The military process of planned team responses can be used in an incident response. The planners should develop a set of documents that guide the actions of each involved individual reacting to and recovering from the incident. These plans must be properly organized, and stored to be available when, where and in a format supportive of the incident response. Incident Planning The designated IR teams act to verify the threat, determine the appropriate response, and coordinate the actions necessary to deal with the situation. The military process of planned team responses can be used in an incident response. The planners should develop a set of documents that guide the actions of each involved individual reacting to and recovering from the incident. These plans must be properly organized, and stored to be available when, where and in a format supportive of the incident response.
  19. Incident Response Plan Format and Content. The IR plan must be organized so that, the organization supports, rather than impedes quick and easy access to the information needed. This can be accomplished through a number of measures, the simplest of which is to create a directory of incidents, with tabbed sections for each possible incident. When an individual needs to respond to an incident, he or she simply opens the binder, flips to the appropriate section, and follows the clearly outlined procedures for an assigned role. Incident Response Plan Storage. The information in the IR plan should be protected as sensitive information. If attackers know how a company responds to a particular incident, it could improve their chances of success in the attack. On the other hand, the organization needs this information readily available, usually within reach of the information assets that must be manipulated during or immediately after the attack. The bottom line is that individuals responding to the incident should not have to search frantically for needed information, especially under stress.
  20. Incident Response Plan Testing. A plan untested is not a useful plan. The levels of testing strategies can vary: Checklist. Structured walk-through. Simulation. Parallel. Full-interruption.
  21. Incident Detection Individuals sometimes bring an unusual occurrence to the attention of systems administrators, security administrators, or their bosses. The most common occurrence is a complaint about technology support, often delivered to the help desk. The mechanisms that could potentially detect an incident include intrusion detection systems, both host-based and network-based, virus detection software, systems administrators, and even the end user. Incident Detection Only by carefully training the user, the help desk, and all security personnel on the analysis and identification of attacks can the organization hope to quickly identify and classify an incident. Once an attack is properly identified, the organization can effectively execute the corresponding procedures from the IR plan. Incident classification is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident.
  22. Incident Indicators There are a number of occurrences that could signal the presence of an incident candidate. Possible indicators of incidents: 1)Presence of unfamiliar files. 2)Presence or execution of unknown programs or processes. 3)Unusual consumption of computing resources. 4)Unusual system crashes. Probable indicators of incidents: 1)Activities at unexpected times. 2)Presence of new accounts. 3)Reported attacks. 4)Notification from IDS. Incident Indicators Definite indicators of incidents. 1)Use of dormant accounts. 2)Changes to logs. 3)Presence of hacker tools. 4)Notifications by partner or peer. 5)Notification by hacker. Predefined situations that signal an automatic incident: 1)Loss of availability. 2)Loss of integrity. 3)Loss of confidentiality. 4)Violation of policy. 5)Violation of law.
  23. Incident Indicators When Does an Incident Become a Disaster? 1) the organization is unable to mitigate the impact of an incident during the incident, 2) the level of damage or destruction is so severe the organization is unable to quickly recover. The difference may be subtle. It is up to the organization to decide which incidents are to be classified as disasters and thus receive the appropriate level of response.
  24. Incident Reaction Incident reaction consists of actions outlined in the IRP that guide the organization in attempting to stop the incident, mitigate the impact of the incident, and provide information for the recovery from the incident. In reacting to the incident there are a number of actions that must occur quickly. These include notification of key personnel, assignment of tasks, and documentation of the incident.
  25. Notification of Key Personnel Most organizations maintain alert rosters for emergencies. An alert roster contains contact information for the individuals to be notified in an incident. Two ways to activate an alert roster: A sequential roster is activated as a contact person calls each and every person on the roster. A hierarchical roster is activated as the first person calls a few other people on the roster, who in turn call a few other people, and so on.
  26. The alert message is a scripted description of the incident, just enough information so that everyone knows what part of the IRP to implement.
  27. Documenting an Incident Documenting the event is important. First, it is important to ensure that the event is recorded for the organization’s records, to know what happened, and how it happened, and what actions were taken. The documentation should record the who, what, when, where, why and how of the event. Second, it is important to prove, should it ever be questioned, that the organization did everything possible to prevent the spread of the incident. The recorded incident can also be used as a simulation in future training sessions.
  28. Incident Containment Strategies One of the most critical components of incident reaction is to stop the incident or contain its scope or impact. However, sometimes situations prevent the most direct measures associated with simply “cutting the wire.” Before an incident can be contained, the affected areas of the information and information systems must be determined. In general, incident containment strategies focus on two tasks: stopping the incident and recovering control of the systems. Incident Containment Strategies The organization can stop the incident and attempt to recover control through a number of strategies. If the Incident: originates outside the organization, the simplest and most straightforward approach is to sever the affected circuits. is using compromised accounts, the accounts can be disabled. is coming in through a firewall, the firewall can be reconfigured to block that particular traffic. is using a particular service or process, that process or service can be disabled temporarily. is using the organization’s systems to propagate itself, you can take down that particular application or server. The ultimate containment option, reserved for only the most drastic of scenarios, involves a full stop of all computers and network devices in the organization. The bottom line is that containment consists of isolating the channels, processes, services, or computers and removing the losses from that source of the incident.
  29. INCIDENT RECOVERY Once the incident has been contained, and control of the systems regained, the next stage is recovery. As with reaction to the incident, the first task is to identify the human resources needed for the recovery and launch them into action. The full extent of the damage must be assessed. The process of computer forensics entails determining how the incident occurred and what happened. The organization repairs vulnerabilities, addresses any shortcomings in safeguards, and restores the data and services of the systems.
  30. Damage Assessment Incident damage assessment is the immediate determination of the scope of the breach of CIA of information and assets after an incident. There are several sources of information on the type, scope, and extent of damage, including system logs, intrusion detection logs, configuration logs and documents, the documentation from the incident response, and the results of a detailed assessment of systems and data storage. Based on this information, the IR team must begin to examine the current state of the information and systems and compare them to a known state. Damage Assessment Related to the task of incident damage assessment is the field of computer forensics. Computer forensics is the process of collecting, analyzing, and preserving computer-related evidence. Evidence proves an action or intent. Computer evidence must be carefully collected, documented, and maintained to be acceptable in formal or informal proceedings. Circumstances requires that individuals who look for the damage receive special training, should it be determined that the incident is part of a crime or may result in a civil action.
  31. Recovery The recovery process involves: Identify the vulnerabilities that allowed the incident to occur and spread and resolve them. Address the safeguards that failed to stop or limit the incident, or were missing from the system in the first place. Install, replace or upgrade them.
  32. Evaluate monitoring capabilities. Improve their detection and reporting methods, or simply install new monitoring capabilities. Restore the data from backups. Restore the services and processes in use. Continuously monitor the system. Restore the confidence of the members of the organization’s communities of interest. Conduct an after-action review.
  33. Automated Response While traditional systems were configured to detect incidences, and then notify the human administrator, new systems can respond to the incident threat autonomously. These systems, referred to as trap and trace, use a combination of resources to detect an intrusion, and then to trace incidents back to their sources. Unfortunately, some less scrupulous administrators might even be tempted to back hack or hack into a hacker’s system to find out as much as possible about the hacker. The problem is that the hacker may actually move into and out of a number of organizations’ systems and by tracking the hacker, administrators may wander through other organizations’ systems. Automated Response The trap portion frequently involves the use of honeypots or honeynets. Honeypots are computer servers configured to resemble production systems. If a hacker stumbles into the system, alarms are set off, and the administrator notified. Honeynets, consist of networks or subnets of systems that operate similarly. Enticement is the process of attracting attention to a system by placing tantalizing bits of information in key locations. Entrapment is the action of luring an individual into committing a crime to get a conviction. Enticement is legal and ethical, while entrapment is not.
  34. Disaster Recovery Planning Disaster recovery planning (DRP) is planning the preparation for and recovery from a disaster, whether natural or manmade. The contingency planning team must decide which actions constitute disasters and which constitute incidents. At the time that a decision is made and the situations is classified as a disaster, the organization may change how it is responding and take action to secure its most valuable assets to preserve value for the longer term even at the risk of more disruption in the immediate term. Again, the key emphasis of a DRP is to reestablish operations at the ‘primary’ site, the location at which the organization performs its business. The goal is to make things ‘whole’ or ‘as they were’ before the disaster. Disaster Recovery Planning Disaster recovery planning (DRP) is planning the preparation for and recovery from a disaster, whether natural or manmade. The contingency planning team must decide which actions constitute disasters and which constitute incidents. At the time that a decision is made and the situations is classified as a disaster, the organization may change how it is responding and take action to secure its most valuable assets to preserve value for the longer term even at the risk of more disruption in the immediate term. Again, the key emphasis of a DRP is to reestablish operations at the ‘primary’ site, the location at which the organization performs its business. The goal is to make things ‘whole’ or ‘as they were’ before the disaster.
  35. DISASTER RECOVERY PLANNING Steps 1) There must be a clear establishment of priorities. 2) There must be a clear delegation of roles and responsibilities. 3) Someone must initiate the alert roster and notify key personnel. 4) Someone must be tasked with the documentation of the disaster. 5) If and only if it is possible, some attempts must be made to mitigate the impact of the disaster on the operations of the organization.
  36. Crisis Management Crisis management includes the actions taken during and after a disaster, and focuses first and foremost on the people involved and addresses the viability of the business. The crisis management team is responsible for managing the event from an enterprise perspective and covers: Supporting personnel and their loved ones during the crisis Determining the event's impact on normal business operations and, if necessary, making a disaster declaration Keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise Communicating with major customers, suppliers, partners, regulatory agencies, industry organizations, the media, and other interested parties.
  37. Disaster Recovery Planning The crisis management team should establish a base of operations or command center to support communications until the disaster has ended and includes individuals from all functional areas of the organization to facilitate communications and cooperation. Some key areas of crisis management include:1)Verifying personnel head count. 2)Checking the alert roster. 3)Checking emergency information cards. Crisis management must balance the needs of the employees with the needs of the business in providing personnel with support for personal and family issues during disasters.
  38. DRP Structure Similar in structure to the IRP, the DRP is organized by disaster, and provides procedures to execute during and after a disaster. It also provides details on the roles and responsibilities of the various individuals involved in the disaster recovery effort, and identifies the personnel and agencies that must be notified. Just as the IRP must be tested, so must the DRP, using the same testing mechanisms. Reaction to a disaster can vary so widely, that it is impossible to describe the process with any accuracy. As a result it is up to each organization to examine its scenarios, developed during the initial contingency planning, to determine how to respond to the various disasters. Should the physical facilities be spared after the disaster, the disaster recovery team should begin the restoration of systems and of data to work toward full operational capability. If the organization’s facilities do not survive, alternative actions must be taken until new facilities can be acquired.
  39. Business Continuity Planning Business continuity planning outlines reestablishment of critical business operations during a disaster that impacts operations at the primary site. If a disaster has rendered the current location of the business unusable for continued operations, there must be a plan to allow the business to continue to function.
  40. Continuity Strategies There are a number of strategies that an organization can choose from when planning for business continuity. The determining factor in selection between these options is usually cost. In general there are three exclusive options: hot sites, warm sites, and cold sites, and three shared functions: timeshare, service bureaus, and mutual agreements.
  41. Off-Site Disaster Data Storage To get these types of sites up and running quickly, the organization must have the ability to port data into the new site’s systems. There are a number of options for getting operations up and running quickly, and some of these options can be used for purposes other than restoration of continuity. These include: Electronic vaulting - The bulk batch-transfer of data to an off-site facility. Remote Journaling - The transfer of live transactions to an off-site facility; only transactions are transferred not archived data, and the transfer is real-time. Database shadowing - not only processing duplicate real-time data storage, but also duplicates the databases at the remote site to multiple servers.
  42. Model For IR/DR/BC Plan The single document set approach supports concise planning and encourages smaller organizations to develop, test, and use IR/DR plans. The model presented is based on analyses of disaster recovery and incident response plans of dozens of organizations.
  43. The Planning Document Establish the responsibility for managing the document, typically the security administrator. Appoint a secretary to document the activities and results of the planning session. Independent incident response and disaster recovery teams are formed, sharing a common planning committee.
  44. Outline the roles and responsibilities for each team member. Develop the alert roster is developed, and lists of critical agencies. Identify and prioritize threats to the organization’s information and information systems.
  45. The Planning Process There are six steps in the Contingency planning process . 1. Identifying the mission- or business-critical functions. 2. Identifying the resources that support the critical functions. 3. Anticipating potential contingencies or disasters. 4. Selecting contingency planning strategies. 5. Implementing the contingency strategies. 6. Testing and revising the strategy. The Planning Document 1.During the incident. Develop and document the procedures that must be performed during the incident. Group procedures and assign to individuals. Each member of the planning committee begins to draft a set of function-specific procedures. 2.After the incident. Develop the procedures that must be performed immediately after the incident has ceased. Again, separate functional areas may develop different procedures. 3.Before the incident. Draft those tasks that must be performed to prepare for the incident. These are the details of the data backup schedules, the disaster recovery preparation, training schedules, testing plans, copies of service agreements, and business continuity plans if any. The Planning Document Finally the IR portion of the plan is assembled. Sections detailing the organization’s DRP and BCP efforts are placed after the incident response sections. Critical information as outlined in these planning sections are recorded, including information on alternate sites, etc. as indicated in the “before the incident” section, applicable to the disaster recovery and business continuity efforts. Multiple copies for each functional area are created, cataloged, and signed out to responsible individuals.
  46. Using the Plan During the incident Develop and document the procedures that must be performed during the incident Group procedures and assign to individuals Each member of the planning committee begins to draft a set of function-specific procedures After the incident Develop the procedures that must be performed immediately after the incident has ceased Again, separate functional areas may develop different procedures 3.Before the incident. Draft those tasks that must be performed to prepare for the incident. These are the details of the data backup schedules, the disaster recovery preparation, training schedules, testing plans, copies of service agreements, and business continuity plans if any. Finally the IR portion of the plan is assembled. Sections detailing the organization’s DRP and BCP efforts are placed after the incident response sections. Critical information as outlined in these planning sections are recorded, including information on alternate sites, etc. as indicated in the “before the incident” section, applicable to the disaster recovery and business continuity efforts. Multiple copies for each functional area are created, cataloged, and signed out to responsible individuals.
  47. Law Enforcement Involvement There may come a time, when it has been determined that the incident at hand exceeds the violation of policy and constitutes a violation of law. The organization may determine that involving law enforcement is necessary. There are several questions, which must then be answered. When should the organization get law enforcement involved? What level of law enforcement agency should be involved: local, state or federal? What will happen when the law enforcement agency is involved? Some of these questions are best answered by the organization’s legal department.
  48. Local, State, or Federal Authorities Selecting the level of law enforcement to involve depends in part on the level and type of crime discovered. The Federal Bureau of Investigation deals with many computer crimes that are categorized as felonies. The US Secret Service works with crimes involving US currency, counterfeiting, credit cards, identity theft and other crimes. The US Treasure Department has a bank fraud investigation unit and the Securities and Exchange Commission has investigation and fraud control units as well. However, due to the heavy load of cases these agencies must handle, they typically give preference to those incidents that address the national critical infrastructure or that have significant economic impact.
  49. State Investigative Services Each state has its own version of the FBI (except Illinois! – interesting story why not) These state agencies arrest individuals, serves warrants, and generally enforce laws on property that is owned by the state or any state agency In Illinois, computer crime is the responsibility of the State of Illinois High Tech Crime Bureau, part of the Attorney General’s Office Local Law Enforcement Local agencies enforce all local and state laws and handle suspects and security crime scenes for state and federal cases. Local law enforcement agency seldom have a computer crimes task force, but the investigative (detective) units are quite capable of processing crime scenes, and handling most common criminal activities, such as physical theft or trespassing, damage to property, and the apprehension and processing of suspects of computer related crimes.
  50. Local Law Enforcement Local agencies enforce all local and state laws and handle suspects and security crime scenes for state and federal cases. Local law enforcement agency seldom have a computer crimes task force, but the investigative (detective) units are quite capable of processing crime scenes, and handling most common criminal activities, such as physical theft or trespassing, damage to property, and the apprehension and processing of suspects of computer related crimes.
  51. Benefits of Law Enforcement Involvement Involving law enforcement agencies has both advantages and disadvantages. The agencies may be much better equipped at processing evidence than a particular organization. Unless the security forces in the organization have been trained in processing evidence and computer forensics, they may do more harm than good in extracting the necessary information to legally convict a suspected criminal.
  52. Benefits of Law Enforcement Involvement Involving law enforcement agencies has both advantages and disadvantages. Law enforcement agencies are also prepared to handle the warrants and subpoenas necessary to documenting a case. They are also adept at obtaining statements from witnesses, affidavits, and other required documents. Law enforcement personnel can be a security administrator’s greatest ally in the war on computer crime. It is therefore important to get to know your local and state counterparts, before you have to make a call announcing a suspected crime.
  53. Drawbacks to Law Enforcement Involvement Involving law enforcement agencies has both advantages and disadvantages. On the downside, once a law enforcement agency takes over a case, the organization loses complete control over the chain of events, the collection of information and evidence, and the prosecution of suspects. An individual the organization may wish only to censure and dismiss may face criminal charges whereby the intricate details of their crimes become matters of public record. The organization may not hear about the case for weeks or even months.
  54. Drawbacks to Law Enforcement Involvement Involving law enforcement agencies has both advantages and disadvantages. Equipment vital to the organization’s business may be tagged evidence, to be removed, stored, and preserved until it can be examined for possible support for the criminal case. However, if the organization detects a criminal act, it is a legal obligation to involve the appropriate law enforcement officials.