incident response - computer forensics toolkit

362 780 0
incident response - computer forensics toolkit

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

TIMELY. PRACTICAL. RELIABLE. Douglas Schweitzer Incident Response Wiley Technology Publishing Timely. Practical. Reliable. Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks You’ll learn how to: • Recognize the telltale signs of an incident and take specific response measures • Search for evidence by preparing operating systems, identifying network devices, and collecting data from memory • Analyze and detect when malicious code enters the system and quickly locate hidden files • Perform keyword searches, review browser history, and examine Web caches to retrieve and analyze clues • Create a forensics toolkit to prop- erly collect and preserve evidence • Contain an incident by severing network and Internet connections, and then eradicate any vulnerabili- ties you uncover • Anticipate future attacks and monitor your system accordingly • Prevent espionage, insider attacks, and inappropriate use of the network • Develop policies and procedures to carefully audit the system Networking/Security $45.00 USA/$67.99 CAN/£31.50 UK Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer arms you with the tools to reveal a security breach, gather evidence to report the crime, and con- duct audits to prevent future attacks. He also provides you with a firm understanding of the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence require- ments, legal issues, and how to work with law enforcement. Visit our Web site at www.wiley.com/compbooks/ Incident Response Schweitzer ISBN: 0-7645-2636-7 INCLUDES CD-ROM DOUGLAS SCHWEITZER is an Internet security specialist and authority on malicious code and computer forensics. He is a Cisco Certified Network Associate and Certified Internet Webmaster Associate, and holds A+, Network+, and i-Net+ certifica- tions. Schweitzer is also the author of Internet Security Made Easy and Securing the Network from Malicious Code. ,!7IA7G4-fcgdgh!:p;o;p;K;K *85555-IGFADh Computer Forensics Toolkit CD-ROM includes: • Helpful tools to capture and protect forensic data; search volumes, drives, and servers for evidence; and rebuild systems quickly after evidence has been obtained • Valuable checklists developed by the author for all aspects of incident response and handling 526367 Cover_rb2.qxp 3/19/03 3:53 PM Page 1 [...]... Chapter 1 Computer Forensics and Incident Response Essentials 1 Catching the Criminal: The Basics of Computer Forensics 2 Recognizing the Signs of an Incident 5 Preparing for Incidents 14 Developing a Computer Security Incident Response Capability 16 The Computer Security Incident Response. .. 3:37 PM Page 5 Chapter 1: Computer Forensics and Incident Response Essentials 5 Recognizing the Signs of an Incident The nearly unrelenting stream of security-related incidents has affected millions of computer systems and networks throughout the world and shows little sign of letting up Table 1-1 shows a list of incidents that were reported to the Federal Computer Incident Response Center (FedCIRC)... Ch01.qxd 3/21/03 3:37 PM Page 1 Chapter 1 Computer Forensics and Incident Response Essentials In This Chapter ✓ Catching the criminal: the basics of computer forensics ✓ Recognizing the signs of an incident ✓ The steps required to prepare for an incidentIncident verification ✓ Preservation of key evidence ✓ Specific response measures ✓ Building a toolkit THE HI-TECH REVOLUTION SWEEPING THE GLOBE in... your computer, and then select the Computer → Services menu item 3 If you possess the appropriate administrative privileges, you will even be able to see what services are running on remote computers, as well Simply select the remote computer from Server Manager, and then select Computer → Services from the menu b526367 Ch01.qxd 3/21/03 3:37 PM Page 11 Chapter 1: Computer Forensics and Incident Response. .. 24 4% False alarm 9 1% Unknown 7 1% Deception b526367 Ch01.qxd 6 3/21/03 3:37 PM Page 6 Incident Response: Computer Forensics Toolkit It is the general consensus among computer security experts that the vast majority of computer crimes are neither detected nor reported To a certain extent, this is because many computer crimes are not overtly obvious To use a simple analogy, when an item (especially... Windows come with a built-in Registry Editor (see Figure 1-2 ) that can be easily accessed by typing regedit at the command prompt Several of the most common locations from which applications start through the Registry are illustrated in Table 1-2 Registry structure is covered in detail in Chapter 4 b526367 Ch01.qxd 3/21/03 10 3:37 PM Page 10 Incident Response: Computer Forensics Toolkit caution ■ Look... being referred to as the Wild Wild West As time goes on, I find that more and more of the individuals I meet have firsthand knowledge of computer b526367 Ch01.qxd 3/21/03 4 3:37 PM Page 4 Incident Response: Computer Forensics Toolkit crime Their own computers — not just computers of people they know — have been infected with a virus or worm, their company website has been defaced or its presence crippled... gleaned from his computer, namely the discovery of data indicating that he had visited Web sites that offered instructions for carrying out a murder using tranquilizers It is not unheard of for those dealing in arms or drugs to store client names and contact information in databases on their computers 1 b526367 Ch01.qxd 2 3/21/03 3:37 PM Page 2 Incident Response: Computer Forensics Toolkit Just as industry... manner now exist electronically, conducted online or through the examination of computer hardware and software Catching the Criminal: The Basics of Computer Forensics Computer forensics is the science of acquiring, retrieving, preserving, and presenting data that has been processed electronically and stored on computer media Computer forensic science is a relatively new discipline that has the potential... along with some helpful solutions: b526367 Ch01.qxd 8 3/21/03 3:37 PM Page 8 Incident Response: Computer Forensics Toolkit ✓ Look for unusual or unauthorized user accounts or groups There are several ways to do this You can use the User Manager tool in Windows NT or the Computer Management tool in Windows XP (see Figure 1-1 ) or the net user, net group, and net localgroup commands at the command line . 3/21/03 3:37 PM Page ii Incident Response: Computer Forensics Toolkit Douglas Schweitzer a526367 FM.qxd 3/21/03 3:37 PM Page iii Incident Response: Computer Forensics Toolkit Published by Wiley. for all aspects of incident response and handling 526367 Cover_rb2.qxp 3/19/03 3:53 PM Page 1

Ngày đăng: 25/03/2014, 11:44

Từ khóa liên quan

Mục lục

  • Incident Response: Computer Forensics Toolkit

    • Frontmatter

      • About the Author

      • Credits

      • Acknowledgments

      • Contents at a Glance

      • Contents

      • Introduction

        • Computer Crime

        • What Is Computer Forensics?

        • The Importance of Incident Response

        • Types of Incidents

        • Who Should Read This Book?

        • How to Read This Book

        • Chapter 1: Computer Forensics and Incident Response Essentials

          • Catching the Criminal: The Basics of Computer Forensics

          • Recognizing the Signs of an Incident

          • Preparing for Incidents

          • Developing a Computer Security Incident Response Capability

          • The Computer Security Incident Response Team

          • The Incident Reporting Process

          • Assessment and Containment

            • Recovery Operations

            • Damage Analysis and Determination

            • Shutdown Procedures while Preserving Evidence

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan