Principles of incident response and disaster recovery free download






















Principles of Incident Response and Disaster Recovery Desk check: review the plan and create a list of correct and incorrect components PowerPoint PPT presentation free to view. Used when immediate data recovery is a priority Implement redundancy in critical system components Use uninterruptible power supplies.

Principles of Incident Response Incident Response Policies and Procedures Several phases should be covered in an incident response Principles of Computer Security Collect channel and frequency being used. Can catastrophe declarations be issued for any and all types of Do you agree with its opinion or you have additional opinion? Larry Tatro: This book untitled Principles of Incident Response and Disaster Recovery to be one of several books which best seller in this year, that's because when you read this e-book you can get a lot of benefit into it.

You will easily to buy this particular book in the book shop or you can order it via online. The publisher in this book sells the e-book too.

It makes you easier to read this book, as you can read this book in your Touch screen phone. So there is no reason for you to past this book from your list. Marilyn Urquhart: Reading can called head hangout, why? Because when you find yourself reading a book mainly book entitled Principles of Incident Response and Disaster Recovery your head will drift away trough every dimension, wandering in each aspect that maybe unidentified for but surely can become your mind friends.

Imaging just about every word written in a guide then become one application form conclusion and explanation that maybe you never get ahead of. The Principles of Incident Response and Disaster Recovery giving you one more experience more than blown away the mind but also giving you useful details for your better life within this era.

So now let us present to you the relaxing pattern is your body and mind is going to be pleased when you are finished reading through it, like winning a. Do you want to try this extraordinary shelling out spare time activity?

Thelma Cobb: Many people spending their time by playing outside having friends, fun activity with family or just watching TV all day every day. You can have new activity to shell out your whole day by studying a book. Ugh, ya think reading a book can actually hard because you have to take the book everywhere? It ok you can have the e-book, getting everywhere you want in your Cell phone. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers.

Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable. Students can feel confident that they are using a standards-based, content-driven resource to prepare for their work in the field.

It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce.

The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning.

Author : Jeffrey W. This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating.

Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills the two go hand-in-hand , you will hopefully never join their ranks.

It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Because information security is a complex subject, which includes risk management as well as information security policy, it is important to have an overview of that broad field and an understanding of these major components.

Contingency planning is an important element of information security, but before management can plan for contingencies, it should have an overall strategic plan for information security in place, including risk management processes to guide the appropriate managerial and technical controls. This chapter serves as an overview of information security, with special consideration given to risk management and the role that contingency planning plays in 1 information security in general and 2 risk management in particular.

Information Security The Committee on National Security Systems CNSS has defined information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. This definition is part of the CNSS model see Figure , which serves as the conceptual framework for understanding information security. The model evolved from a similar model developed within the Copyright Cengage Learning.

An industry standard for computer security since the development of the mainframe, the C. Information assets have the characteristics of confidentiality when only those persons or computer systems with the rights and privileges to access it are able to do so.

Information assets have integrity when they are not exposed while being stored, processed, or transmitted to corruption, damage, destruction, or other disruption of their authentic states; in other words, the information is whole, complete, and uncorrupted.

Finally, information assets have availability when authorized users—persons or computer systems—are able to access them in the specified format without interference or obstruction.

In other words, the information is there when it is needed, from where it is supposed to be, and in the format expected. Such protection is achieved through the application of policy, education and training, and technology. Key Information Security Concepts In general, a threat is an object, person, or other entity that is a potential risk of loss to an asset, which is the organizational resource being protected.

An asset can be logical, such as a Web site, information, or data, or it can be physical, such as a person, computer system, or other tangible object. A threat can become the basis for an attack—an intentional or unintentional attempt to cause damage to or otherwise compromise the information or the systems that support it. A threat-agent is a specific and identifiable instance of a general threat that exploits vulnerabilities set up to protect the asset.

Some vulnerabilities are latent and thus not revealed until they are discovered and made known. Information Security 5 There are two common uses of the term exploit in information security.

First, threat-agents are said to exploit a system or information asset by using it illegally for their personal gains. Second, threat-agents can create an exploit, or means to target a specific vulnerability, usually found in software, to formulate an attack.

A defender tries to prevent attacks by applying a control, a safeguard, or a countermeasure; these terms, all synonymous with control, represent security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and generally improve the security within an organization.

The results of a study that collected, categorized, and ranked the identifiable threats to information security are shown in Table The study compared its findings with a prior study conducted by one of its researchers. Trespass Trespass is a broad category of electronic and human activities that can breach the confidentiality of information. When an unauthorized individual gains access to the information an organization is trying to protect, that act is categorized as a deliberate act of trespass.

In the opening scenario of this chapter, the IT staff members at HAL were more disappointed than surprised to find someone poking around their mail server, looking for a way in. Acts of trespass can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. In this text, hackers are people who bypass legitimate controls placed on information systems in order to gain access to data or information against the intent of the owner.

More specifically, a hacker is someone who uses skill, guile, or fraud to attempt to bypass the controls placed around information that belongs to someone else. Software Attacks Deliberate software attacks occur when an individual or group designs software to attack a system. This software is referred to as malicious code, malicious software, or malware. These software components or programs are designed to damage, destroy, or deny service to the target systems.

Some of the more common instances of malicious code are viruses and worms, Trojan horses, logic bombs, bots, rootkits, and back doors. Equally prominent among the recent incidences of malicious code are the denial-of-service attacks conducted by attackers on popular e-commerce sites. A variation on the DoS attack is the distributed DoS DDoS attack, in which an attacker compromises a number of systems, then uses these systems called zombies or bots to attack an unsuspecting target.

A potential source of confusion when it comes to threats posed by malicious code are the differences between the method of propagation worm versus virus , the payload what the malware does once it is in place, such as deny service or install a back door , and the vector of infection how the code is transmitted from system to system, whether through social engineering or by technical means, such as an open network share. Various concepts related to the topic of malicious code are discussed in the following sections.

Viruses Computer viruses are segments of code that perform malicious actions. Viruses are passed from machine to machine via physical media, e-mail, or other forms of computer data transmission. When these viruses infect a machine, they may immediately scan the local machine for e-mail applications; they may even send themselves to every user in the e-mail address book.

There are several types of viruses. One type is the macro virus, which is embedded in automatically executing macrocode, common in word-processed documents, spreadsheets, and database applications. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and Copyright Cengage Learning. Information Security 7 network bandwidth. These complex behaviors can be invoked with or without the user downloading or executing the file. Once the worm has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system.

Further, a worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected themselves. Worms also take advantage of open shares found on the network in which an infected system is located, placing working copies of the worm code onto the server so that users of those shares are likely to become infected.

Back Doors and Trap Doors A virus or worm can have a payload that installs a back door or trap door component in a system, which allows the attacker to access a system, at will, with special privileges.

Polymorphism One of the biggest ongoing problems in fighting viruses and worms are polymorphic threats. A polymorphic threat is one that changes its apparent shape over time, making it undetectable by techniques that look for preconfigured signatures. These viruses and worms actually evolve, changing their size and appearance to elude detection by antivirus software programs. This means that an e-mail generated by the virus may not match previous examples, making detection more of a challenge.

Propagation Vectors The way that malicious code is spread from one system to another can vary widely. One common way is through a social engineering attack—that is, getting the computer user to perform an action that enables the infection.

An example of this is the Trojan horse, often simply called a Trojan. A Trojan is something that looks like a desirable program or tool but is in fact a malicious entity. Other propagation vectors do not require human interaction, leveraging open network connections, file shares, or software vulnerabilities to spread themselves. Malware Hoaxes As frustrating as viruses and worms are, perhaps more time and money is spent on resolving malware hoaxes. Well-meaning people can disrupt the harmony and flow of an organization when they send random e-mails warning of dangerous malware that is fictitious.

While these individuals feel they are helping out by warning their coworkers of a threat, much time and energy is wasted as everyone forwards the message to everyone they know, posts the message on social media sites, and begins updating antivirus protection software. By teaching its employees how to verify whether a malware threat is real, the organization can reduce the impact of this type of threat.

Human Error or Failure This threat category includes acts performed by an authorized user, usually without malicious intent or purpose. When people use information systems, mistakes sometimes happen as a result of inexperience, improper training, incorrect assumptions, and so forth. Unfortunately, small mistakes can produce extensive damage with catastrophic results. This is what is meant by human error. Human failure, on the other hand, is the intentional refusal or unintentional inability to comply with policies, guidelines, and procedures, with a potential loss of information.

An organization may be Copyright Cengage Learning. Within an organization, property can be physical, electronic, or intellectual. This threat category also includes acts of espionage, given that an attacker is often looking for information to steal. Any breach of confidentiality can be construed as an act of theft. Attackers can use many different methods to access the information stored in an information system. Some information gathering is quite legal—for example, when doing research.

Such techniques are collectively referred to as competitive intelligence. When information gathering employs techniques that cross the threshold of what is considered legal or ethical, it becomes known as industrial espionage.

Also of concern in this category is the theft or loss of mobile devices, including phones, tablets, and computers. Although the devices themselves are of value, perhaps even more valuable is the information stored within.

Users who have been issued company equipment may establish and save VPN-connection information, passwords, access credentials, company records, customer information, and the like.

This valuable information becomes a target for information thieves. In fact, it has become commonplace to find lost or stolen devices in the trash, with the hard drives or data cards like phone SIMs removed or the data having been copied and erased The information is more valuable and easier to conceal than the actual device itself.

Users who travel or use their devices away from home should be extremely careful when leaving the device unattended at a restaurant table, conference room, or hotel room. Actually, most globally engaged organizations now have explicit policy directives that prohibit taking these portable devices to certain countries and direct employees required to travel to take sanitized, almost disposable, devices that are not allowed contact with internal company networks or technology.

Compromises to Intellectual Property Many organizations create or support the development of intellectual property as part of their business operations. FOLDOC, an online dictionary of computing, defines intellectual property IP this way: The ownership of ideas and control over the tangible or virtual representation of those ideas. Once an organization has properly identified its IP, breaches in the controls placed to control access to it constitute a threat to the security of this information.

Often, an organization purchases or leases the IP of other organizations and must therefore abide by the purchase or licensing agreement for its fair and responsible use. Information Security 9 Of equal concern is the exfiltration, or unauthorized removal of information, from an organization. Most commonly associated with disgruntled employees, the protection of intellectual property from unauthorized disclosure to third parties further illustrates the severity of this issue.

Theft of organizational IP, such as trade secrets or trusted information like customer personal and financial records, is a commonplace issue. These devices are frequently not as secure as the systems owned and maintained by the organization. If compromised by attackers prior to attaching to the corporate network, BYOD systems can easily be used as conduits to allow data to be exfiltrated.

Additionally, unhappy employees can use these devices to copy data, then leave the organization with that valuable asset in their hands and no one the wiser. Among the most common IP breaches is the unlawful use or duplication of software-based intellectual property, more commonly known as software piracy. Because most software is licensed to a particular purchaser, its use is restricted to a single user or to a designated user in an organization.

If the user copies the program to another computer without securing another license or transferring the license, he or she has violated the copyright. Software licenses are strictly enforced by a number of regulatory and private organizations, and software publishers use several control mechanisms to prevent copyright infringement. The acts can range from petty vandalism by employees to organized sabotage by outsiders.

A much more sinister form of hacking is cyberterrorism. Cyberterrorists hack systems to conduct terrorist activities through network or Internet pathways. The United States and other governments are developing security measures intended to protect the critical computing and communications networks as well as the physical and power utility infrastructures. Technical Software Failures or Errors This threat category stems from purchasing software with unknown hidden faults.

Large quantities of computer code are written, published, and sold before all the significant security-related bugs are detected and resolved. Also, combinations of particular software and hardware may reveal new bugs. While most bugs are not a security threat, some may be exploitable and may result in potential loss or damage to information used by those programs.

In addition to bugs, there may be untested failure conditions or purposeful subversions of the security controls built into systems. These may be oversights or intentional shortcuts left by programmers for benign or malign reasons.

Collectively, shortcut access routes into programs that bypass security checks are called trap doors; they can cause serious security breaches.

These resources provide up-to-the-minute information on the latest security vulnerabilities and a very thorough archive of past bugs. Technical Hardware Failures or Errors Technical hardware failures or errors occur when a manufacturer distributes equipment containing a known or unknown flaw.

These defects can cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability. Some errors are terminal, in that they result in the unrecoverable loss of the equipment. Some errors are intermittent, in that they only periodically manifest themselves, resulting in faults that are not easily identified.

For example, equipment can sometimes stop working or can work in unexpected ways. Forces of Nature Forces of nature, also known as force majeure, or acts of God, pose some of the most dangerous threats imaginable because they often occur with very little warning. Fire, flood, earthquake, lightning, volcanic eruptions, even animal or insect infestation— these threats disrupt not only the lives of individuals but also the storage, transmission, and use of information.

Deviations in Quality of Service by Service Providers This threat category covers situations in which a product or service is not delivered to the organization as expected.

Utility companies, service providers, and other value-added organizations form a vast web of interconnected services. Any one of these support systems can be interrupted by storms, employee illnesses, or other unforeseen events. An example of this threat category occurs when a construction crew damages a fiber-optic link for an ISP. The backup provider may be online and in service but may only be able to supply a fraction of the bandwidth the organization needs for full service.

This degradation of service is a form of availability disruption. Internet service, communications, and power irregularities can dramatically affect the availability of information and systems. Technological Obsolescence This threat category involves antiquated or outdated infrastructure that leads to unreliable and untrustworthy systems.

Management must recognize that when technology becomes outdated, there is a risk of a loss of data integrity from attacks. Strategic planning should always include an analysis of the technology that is currently in use. Ideally, proper planning will prevent the risks stemming from technology obsolesce, but when obsolescence is identified, management must take immediate action. IT professionals play a large role in the identification of obsolescence.

Information Extortion The threat of information extortion is the possibility that an attacker or trusted insider will steal information from a computer system and demand compensation for its return or for an agreement to not disclose the information. Extortion Copyright Cengage Learning. Unfortunately, organized crime is increasingly involved in this area.

Other Threats Listings The Computer Security Institute conducts an annual study of computer crime, the results for which are shown in Table The fact is, almost every company has been attacked. All managers are expected to play a role in the risk management process, but information security managers are expected to play the largest roles.

Very often, the chief information officer CIO will delegate much of the responsibility for risk management to the chief information security officer CISO.

Given that contingency planning is considered part of the risk management process, it is important to fully understand how risk management works and how contingency planning fits within that process. Risk management consists of two major undertakings: risk identification and risk control. The various components of risk management and their relationships to one another are shown in Figure Risk management Risk identification Risk control Risk assessment is the documented result of the risk identification process.

The IT community must serve the information technology needs of the broader organization and, at the same Copyright Cengage Learning. Overview of Risk Management 13 time, leverage the special skills and insights of the information security community. The information security team must lead the way with skill, professionalism, and flexibility as it works with the other communities of interest to appropriately balance the usefulness and security of the information system.

Each of the three elements in the C. When the organization depends on ITbased systems to remain viable, information security and the discipline of risk management move beyond theoretical discussions and become an integral part of the economic basis for making business decisions. These decisions are based on trade-offs between the costs of applying information systems controls and the benefits realized from the operation of secured, available systems.

An observation made over years ago by Chinese General Sun Tzu is relevant to information security today: If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.

Information security managers and technicians are the defenders of information. The many threats mentioned earlier are constantly attacking the defenses surrounding information assets. Defenses are built in layers, by placing safeguard upon safeguard. You attempt to detect, prevent, and recover from attack after attack after attack.

Moreover, organizations are legally prevented from switching to offense, and the attackers themselves have no need to expend their resources on defense. To be victorious, you must therefore know yourself and know the enemy. Know Yourself First, you must identify, examine, and understand the information and systems currently in place within your organization. To protect assets, which are defined here as information and the systems that use, store, and transmit information, you must understand what they are, how they add value to the organization, and to which vulnerabilities they are susceptible.

Once you know what you have, you can identify what you are already doing to protect it. Just because you have a control in place to protect an asset does not necessarily mean that the asset is protected. Frequently, organizations implement control mechanisms but then neglect to periodically perform the necessary review, revision, and maintenance of their own systems. The policies, education and training programs, and technologies that protect information must be carefully maintained and administered to ensure that they are still effective.

This means identifying, examining, and understanding the threats facing the organization. You can then use your understanding of these aspects to create a list of threats prioritized by how important each asset is to the organization. It is essential that all stakeholders conduct periodic management reviews. The first focus of management review is asset inventory. On a regular basis, management must verify the completeness and accuracy of the asset inventory. In addition, organizations must review and verify the threats and vulnerabilities that have been identified as dangerous to the asset inventory, as well as the current controls and mitigation strategies.

The cost effectiveness of each control should be reviewed as well and the decisions on deployment of controls revisited. For example, a sales manager might assess control procedures by going through the office before the workday starts and picking up all the papers from every desk in the sales department. When the workers show up, the manager could inform them that a fire drill is underway—that all their papers have been destroyed and that each worker must now follow the disaster recovery procedures.

The effectiveness of the procedures can then be assessed and corrections made. Once that has been done, the threat identification process begins. Each information asset is examined to identify vulnerabilities, and when vulnerabilities are found, controls are identified and assessed regarding their capability to limit possible losses should an attack occur.

The components of this process are shown in Figure The assets are then classified and categorized, with details added as the analysis goes deeper. Information Asset Classification In addition to identifying the assets, it is advisable to classify them with respect to their security needs. For example, data could be classified as confidential data, internal data, and public data. Likewise, the individuals authorized to view the data could be classified using a personnel security clearance structure.

No matter how an organization chooses to classify the components of its system, the components must be specific enough to allow the creation of various priority levels. The components then can be ranked according to criteria established by the categorization. The categories themselves should be comprehensive and mutually exclusive.

Comprehensive means that all the information assets should fit in the list somewhere; mutually exclusive means that each information asset should fit in only one category. For example, when Copyright Cengage Learning. Overview of Risk Management 15 1 Plan and organize the process. Categorize system components.

Risk identification Inventory and categorize assets. Identify threats. Specify vulnerable assets. Assign value to attack on assets. Assess likelihood of attack on vulnerabilities. Risk assessment Calculate relative risk factor for assets. Review possible controls. Document findings. It is a matter of professional judgment. To add consistency and simplify the categorization of elements when there is ambiguity, it is essential to establish a clear and comprehensive set of categories.

Does the law or other regulation require us to protect this asset? Before beginning the inventory process, the organization should decide which criteria are best suited to establish the value of the information assets. In addition to the criteria just listed, company-specific criteria should be identified, documented, and added to the process.

To finalize this step of the information asset identification process, the organization should assign a weight to each asset based on the answers to the various questions. Once the process of inventorying and assessing value is complete, you can calculate the relative importance of each asset using a straightforward process known as weighted factor analysis, which is shown in Table In this process, each information asset is assigned a score for each critical factor.

In the example shown, these scores may range from 0. For example, at one time Georgia-Pacific, an American pulp and paper company, used a data classification scheme in which information owners throughout the company were expected to classify the information assets for which they were responsible.

At least once a year, they would review these classifications to ensure that the information was still classified correctly and the appropriate access controls were in place.

A simple classification scheme would allow an organization to protect such sensitive information as its marketing or Copyright Cengage Learning. Overview of Risk Management 17 research data, its personnel data, its customer data, and its general internal communications.

In organizations that require security clearances, each user of data is assigned an authorization level that indicates the data he or she is authorized to view.

This is usually accomplished by assigning each employee a named role— such as data entry clerk, development programmer, information security analyst, or even CIO—and a security clearance associated with that role.

Employees are not simply allowed to view any and all data that falls within their level of clearance. Before someone can access a specific set of data, the need-to-know requirement must be met.

This extra level of protection ensures that the confidentiality of information is properly maintained. An organization faces a wide variety of threats; the realistic ones need to be investigated further, while the unimportant threats are set aside. Each of the threat categories identified in Table must be assessed regarding its potential to endanger the organization.

This is known as a threat assessment. By answering these questions, you can establish a framework for discussing threat assessment. The list may not cover everything, however. If an organization has specific guidelines or policies, these may require the posing of additional questions.

The list is easily expanded to include additional requirements. You should then examine how each of the threats could be perpetrated. The list shows all the vulnerabilities of all the Copyright Cengage Learning. Some threats manifest themselves in multiple ways, yielding multiple vulnerabilities for that threat. The process of listing vulnerabilities is somewhat subjective and draws on the experience and knowledge of the people creating the list.

Therefore, it works best when groups of people with diverse backgrounds work iteratively in a series of brainstorming sessions. For instance, the team that reviews the vulnerabilities for networking equipment should include the networking specialists, the systems management team that operates the network, the information security risk specialist, and even technically proficient users of the system.

At the end of the risk identification process, you will have a list of all the information assets and their respective vulnerabilities. This list, along with any supporting documentation, is the starting point for the next step, risk assessment. This is accomplished through a process called risk assessment.

Risk assessment assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process. Figure shows the factors that go into the risk-rating estimate for each of the vulnerabilities. Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability.

There are many detailed methods for determining accurate and detailed costs of each of the vulnerabilities. Likewise, there are models that can be used to estimate expenses for the variety of controls that can be used to reduce the risk for each vulnerability.

However, it is often more useful to use a simpler risk model such as the one shown in Figure to evaluate the risk for each information asset. The following sections present the factors used to calculate the relative risk for each vulnerability. Likelihood The probability that a specific vulnerability within an organization will be successfully attacked is referred to as likelihood.

A likelihood Copyright Cengage Learning. Overview of Risk Management 19 vulnerability could be assigned a number between 0. Whatever rating system is used, you should bring all your professionalism, experience, and judgment to bear, and you should use the rating model you selected consistently.

Whenever possible, use external references for likelihood values that have been reviewed and adjusted for your specific circumstances. For example, the likelihood of a fire has been actuarially estimated for each type of structure such as a building. Likewise, the likelihood that a given e-mail contains a virus or worm has been researched. Finally, the number of network attacks can be forecast based on how many network addresses the organization has been assigned.

Valuation of Information Assets Using the information obtained during the information asset identification phases, you can assign weighted scores for the value to the organization of each information asset. The actual numbers used can vary with the needs of the organization. Other scales assign weights in broad categories, assigning all critical assets a value of , all lowcritical assets a value of 1, and all others a value of Still other groups use a scale of 1 to 10 or assigned values of 1, 3, and 5 to represent low-valued, medium-valued, and high-valued assets.

You can also create weight values for your specific needs. This helps you set priorities in the assessment of vulnerabilities.



0コメント

  • 1000 / 1000