Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 362 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
362
Dung lượng
4,81 MB
Nội dung
TIMELY.
PRACTICAL.
RELIABLE.
Douglas Schweitzer
Incident
Response
Wiley Technology Publishing
Timely. Practical. Reliable.
Your in-depth guide to detecting network breaches, uncovering evidence,
and preventing future attacks
You’ll learn how to:
• Recognize the telltale signs of an
incident and take specific response
measures
• Search for evidence by preparing
operating systems, identifying
network devices, and collecting
data from memory
•
Analyze and detect when malicious
code enters the system and quickly
locate hidden files
• Perform keyword searches, review
browser history, and examine Web
caches to retrieve and analyze clues
• Create a forensicstoolkit to prop-
erly collect and preserve evidence
• Contain an incident by severing
network and Internet connections,
and then eradicate any vulnerabili-
ties you uncover
• Anticipate future attacks and
monitor your system accordingly
• Prevent espionage, insider
attacks, and inappropriate use of
the network
• Develop policies and procedures to
carefully audit the system
Networking/Security
$45.00 USA/$67.99 CAN/£31.50 UK
Whether it’s from malicious code sent
through an e-mail or an unauthorized
user accessing company files, your
network is vulnerable to attack. Your
response to such incidents is critical.
With this comprehensive guide,
Douglas Schweitzer arms you with the
tools to reveal a security breach, gather
evidence to report the crime, and con-
duct audits to prevent future attacks.
He also provides you with a firm
understanding of the methodologies
for incidentresponse and computer
forensics, Federal Computer Crime law
information and evidence require-
ments, legal issues, and how to work
with law enforcement.
Visit our Web site at www.wiley.com/compbooks/
Incident Response
Schweitzer
ISBN: 0-7645-2636-7
INCLUDES
CD-ROM
DOUGLAS SCHWEITZER
is an
Internet security specialist and
authority on malicious code and
computer forensics. He is a Cisco
Certified Network Associate and
Certified Internet Webmaster
Associate, and holds A+,
Network+, and i-Net+ certifica-
tions. Schweitzer is also the
author of Internet Security Made
Easy and
Securing the Network
from Malicious Code.
,!7IA7G4-fcgdgh!:p;o;p;K;K
*85555-IGFADh
Computer
Forensics
Toolkit
CD-ROM includes:
• Helpful tools to capture and
protect forensic data; search
volumes, drives, and servers for
evidence; and rebuild systems
quickly after evidence has been
obtained
• Valuable checklists developed
by the author for all aspects of
incident response and handling
526367 Cover_rb2.qxp 3/19/03 3:53 PM Page 1
[...]... Chapter 1 Computer Forensics and IncidentResponse Essentials 1 Catching the Criminal: The Basics of ComputerForensics 2 Recognizing the Signs of an Incident 5 Preparing for Incidents 14 Developing a Computer Security IncidentResponse Capability 16 The Computer Security Incident Response. .. 3:37 PM Page 5 Chapter 1: ComputerForensics and IncidentResponse Essentials 5 Recognizing the Signs of an Incident The nearly unrelenting stream of security-related incidents has affected millions of computer systems and networks throughout the world and shows little sign of letting up Table 1-1 shows a list of incidents that were reported to the Federal ComputerIncidentResponse Center (FedCIRC)... Ch01.qxd 3/21/03 3:37 PM Page 1 Chapter 1 ComputerForensics and IncidentResponse Essentials In This Chapter ✓ Catching the criminal: the basics of computerforensics ✓ Recognizing the signs of an incident ✓ The steps required to prepare for an incident ✓ Incident verification ✓ Preservation of key evidence ✓ Specific response measures ✓ Building a toolkit THE HI-TECH REVOLUTION SWEEPING THE GLOBE in... your computer, and then select the Computer → Services menu item 3 If you possess the appropriate administrative privileges, you will even be able to see what services are running on remote computers, as well Simply select the remote computer from Server Manager, and then select Computer → Services from the menu b526367 Ch01.qxd 3/21/03 3:37 PM Page 11 Chapter 1: ComputerForensics and Incident Response. .. 24 4% False alarm 9 1% Unknown 7 1% Deception b526367 Ch01.qxd 6 3/21/03 3:37 PM Page 6 Incident Response: ComputerForensicsToolkit It is the general consensus among computer security experts that the vast majority of computer crimes are neither detected nor reported To a certain extent, this is because many computer crimes are not overtly obvious To use a simple analogy, when an item (especially... Windows come with a built-in Registry Editor (see Figure 1-2 ) that can be easily accessed by typing regedit at the command prompt Several of the most common locations from which applications start through the Registry are illustrated in Table 1-2 Registry structure is covered in detail in Chapter 4 b526367 Ch01.qxd 3/21/03 10 3:37 PM Page 10 Incident Response: ComputerForensicsToolkit caution ■ Look... being referred to as the Wild Wild West As time goes on, I find that more and more of the individuals I meet have firsthand knowledge of computer b526367 Ch01.qxd 3/21/03 4 3:37 PM Page 4 Incident Response: ComputerForensicsToolkit crime Their own computers — not just computers of people they know — have been infected with a virus or worm, their company website has been defaced or its presence crippled... gleaned from his computer, namely the discovery of data indicating that he had visited Web sites that offered instructions for carrying out a murder using tranquilizers It is not unheard of for those dealing in arms or drugs to store client names and contact information in databases on their computers 1 b526367 Ch01.qxd 2 3/21/03 3:37 PM Page 2 Incident Response: Computer Forensics Toolkit Just as industry... manner now exist electronically, conducted online or through the examination of computer hardware and software Catching the Criminal: The Basics of Computer ForensicsComputerforensics is the science of acquiring, retrieving, preserving, and presenting data that has been processed electronically and stored on computer media Computer forensic science is a relatively new discipline that has the potential... along with some helpful solutions: b526367 Ch01.qxd 8 3/21/03 3:37 PM Page 8 Incident Response: Computer Forensics Toolkit ✓ Look for unusual or unauthorized user accounts or groups There are several ways to do this You can use the User Manager tool in Windows NT or the Computer Management tool in Windows XP (see Figure 1-1 ) or the net user, net group, and net localgroup commands at the command line . 3/21/03 3:37 PM Page ii Incident Response: Computer Forensics Toolkit Douglas Schweitzer a526367 FM.qxd 3/21/03 3:37 PM Page iii Incident Response: Computer Forensics Toolkit Published by Wiley. for all aspects of incident response and handling 526367 Cover_rb2.qxp 3/19/03 3:53 PM Page 1