02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

and some <strong>of</strong> <strong>the</strong> tools that are used (SafeBack, 106 EnCase, 107 The Coroner’s Toolkit 108 )<br />

[Schultz 02].<br />

A large portion <strong>of</strong> Mandia’s <strong>Incident</strong> <strong>Response</strong> is devoted to forensics analyses (“Putting on<br />

<strong>the</strong> Gloves”). This publication includes very specific and detailed descriptions for investigative<br />

guidelines (conducting initial assessments to developing response strategies), handling<br />

evidence, trap and trace guidance, and surveillance techniques. The book also has sections<br />

that focus on specific platforms (Windows NT/2000, UNIX), o<strong>the</strong>r specific attacks, and how<br />

to investigate incident activity [Mandia 01].<br />

The SANS <strong>Incident</strong> Handling Step-by-Step guide also highlights <strong>the</strong> importance <strong>of</strong> understanding<br />

and identifying every piece <strong>of</strong> evidence [SANS 03].<br />

There are o<strong>the</strong>r books that focus solely on <strong>the</strong> issues <strong>of</strong> computer forensics [Caloyannides 01,<br />

Kruse 02, Marcella 02]. Caloyannides focuses on providing information to law enforcement<br />

pr<strong>of</strong>essionals who need technical and procedural training to conduct forensic examinations<br />

that will be admissible in court or for business pr<strong>of</strong>essionals who want to ensure <strong>the</strong>ir information<br />

is not stolen by anyone. It can also be used by <strong>the</strong> average reader to fur<strong>the</strong>r <strong>the</strong>ir understanding<br />

<strong>of</strong> technical issues related to computer forensics.<br />

Kruse has organized his publication to provide an introductory course in computer forensics.<br />

He suggests that <strong>the</strong> book can be used as a handbook. It covers evidence collection, tools, and<br />

utilities that can be used in <strong>the</strong> process <strong>of</strong> investigating incident activity. It also provides<br />

guidance on investigating activity involving Windows and UNIX computers.<br />

Van Wyk [van Wyk 01] provides an overview <strong>of</strong> <strong>the</strong> “tools <strong>of</strong> <strong>the</strong> trade” that CSIRT incident<br />

handlers might need to support <strong>the</strong>ir investigation <strong>of</strong> incident activity. He describes not only<br />

<strong>the</strong> investigative tools used (network security monitoring tools) but also o<strong>the</strong>r communications<br />

“tools” that may be needed during response activity. These tools may include wireless<br />

or cellular access and o<strong>the</strong>r hardware/s<strong>of</strong>tware needs, such as CD drives, tape drives, and<br />

o<strong>the</strong>r removable media.<br />

There seems to be no standard group in an organization that provides forensic analysis. We<br />

have seen a wide variety <strong>of</strong> staff members perform this task. We have seen companies that<br />

train <strong>the</strong>ir CSIRT staff to perform this type <strong>of</strong> work. We have also seen organizations that outsource<br />

this capability, o<strong>the</strong>rs that turn it over to law enforcement agencies, and o<strong>the</strong>rs, particularly<br />

government agencies, that turn it over to <strong>the</strong>ir investigative units.<br />

106<br />

107<br />

108<br />

<br />

<br />

<br />

CMU/SEI-2003-TR-001 101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!