02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.10.4 Tools<br />

There are really very few tools that have been specifically created for incident response and<br />

incident handling except for some <strong>of</strong> <strong>the</strong> products mentioned in <strong>the</strong> incident data collection<br />

section above and customized tools created by CSIRTs <strong>the</strong>mselves.<br />

Many <strong>of</strong> <strong>the</strong> tools that are used by CSIRTs are also tools used by system and network administrators.<br />

Various organizations have created tool archives that provide access to or review <strong>of</strong><br />

security and incident response tools. One <strong>of</strong> those projects is described below.<br />

3.10.4.1 Clearinghouse for <strong>Incident</strong> Handling Tools (CHIHT)<br />

Through <strong>the</strong> TERENA TF-CSIRT, a project and site has been established to serve as a clearinghouse<br />

for incident handling tools. The tools listed are based on <strong>the</strong> experience and usage<br />

<strong>of</strong> various European CSIRTs. The tools are listed for o<strong>the</strong>r teams to review and not as recommendations<br />

for use. The tools are categorized in <strong>the</strong> following manner [CHIHT 03]:<br />

• evidence ga<strong>the</strong>ring tools<br />

− examining media<br />

− examining systems and processes<br />

• evidence investigation tools<br />

− analyzing evidence<br />

− checking identities and contacts<br />

• system recovery tools<br />

• CSIRT procedures<br />

− incident tracking and reporting<br />

− incident archives<br />

− communications<br />

• remote access tools<br />

− remote network access<br />

− secure dial-up access<br />

− secure tunnels<br />

• proactive tools<br />

− network auditing<br />

− host auditing<br />

− security management<br />

− network monitoring and traffic analysis<br />

− network intrusion detection<br />

For more information see:<br />

http://chiht.dfn-cert.de/<br />

CMU/SEI-2003-TR-001 127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!