02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

way, <strong>the</strong> combined and coordination centers seem to rely more on coordination <strong>of</strong> response<br />

and mitigation strategies. The centralized teams had no particular set <strong>of</strong> response options<br />

across <strong>the</strong> participating teams; <strong>the</strong>y provide response across all categories <strong>of</strong> response options.<br />

3.7.7.1 Who Rebuilds Systems?<br />

When asked explicitly who rebuilds and recovers any affected systems, <strong>the</strong> participating<br />

CSIRTs provided <strong>the</strong> following information:<br />

• 59% <strong>of</strong> participants stated that <strong>the</strong> IT department, not <strong>the</strong> CSIRT, recovers and rebuilds<br />

affected systems.<br />

• All <strong>of</strong> <strong>the</strong> CSIRTs in <strong>the</strong> commercial sector said that <strong>the</strong> IT department recovers and rebuilds<br />

systems.<br />

• Most <strong>of</strong> <strong>the</strong> o<strong>the</strong>r sectors stated that both <strong>the</strong> IT and CSIRT did recovery and rebuilding.<br />

All <strong>of</strong> <strong>the</strong> teams identified as distributed dedicated teams said that only <strong>the</strong> IT department<br />

recovered and rebuilt systems. All o<strong>the</strong>r types had ei<strong>the</strong>r IT or CSIRT or both. No matter<br />

where <strong>the</strong> CSIRT reported—to <strong>the</strong> IT department or security department, or if <strong>the</strong> CSIRT was<br />

its own department—<strong>the</strong>re was no consistent answer to who recovered and repaired <strong>the</strong> systems;<br />

it was IT, CSIRT, or both.<br />

3.7.8 <strong>Computer</strong> Forensics Activities<br />

One area <strong>of</strong> incident analysis and response that is receiving a lot <strong>of</strong> attention is computer forensics<br />

or forensic evidence collection. More teams are learning this analysis technique and<br />

more tools are becoming widely available.<br />

There is also growth in reference materials and training available concerning forensics. Many<br />

<strong>of</strong> <strong>the</strong> authors in <strong>the</strong> literature refer to investigating computer security incidents (events, attacks,<br />

o<strong>the</strong>r unauthorized activity) as “computer forensics” [Caloyannides 01, Kruse 02] or<br />

“cyber forensics” [Marcella 02].<br />

In 2002 Information <strong>Security</strong> magazine conducted a review <strong>of</strong> selected books on <strong>the</strong> topic <strong>of</strong><br />

forensics and highlighted what was covered in each. 105 This magazine also devoted much <strong>of</strong><br />

<strong>the</strong>ir April 2002 issue to articles on computer forensics and a few case studies [Kessler 02].<br />

Schultz devotes two chapters to an overview <strong>of</strong> forensics, describing approaches for several<br />

types <strong>of</strong> searches that can be performed, what to look for, how to conduct <strong>the</strong> investigation,<br />

105<br />

For a summary, see .<br />

100 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!