0% found this document useful (0 votes)
236 views2 pages

INT243

This document outlines the course INT243: Information System Security. The course aims to describe the basics of incident response handling processes, analyze practices and procedures involved, and observe different methods of obtaining information for forensic investigations. It contains 6 units that cover topics like incident response methodology, preparing for incident response, live data collection, collecting network and host-based evidence, data analysis techniques, and investigating windows and router systems. Students will learn through practical experiments involving network evidence collection, acquiring host-based evidence, forensic imaging, network evidence analysis, memory analysis, and analyzing storage. References include books on digital forensics and incident response.

Uploaded by

manvendra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
236 views2 pages

INT243

This document outlines the course INT243: Information System Security. The course aims to describe the basics of incident response handling processes, analyze practices and procedures involved, and observe different methods of obtaining information for forensic investigations. It contains 6 units that cover topics like incident response methodology, preparing for incident response, live data collection, collecting network and host-based evidence, data analysis techniques, and investigating windows and router systems. Students will learn through practical experiments involving network evidence collection, acquiring host-based evidence, forensic imaging, network evidence analysis, memory analysis, and analyzing storage. References include books on digital forensics and incident response.

Uploaded by

manvendra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

INT243:INFORMATION SYSTEM SECURITY

L:2 T:0 P:2 Credits:3

Course Outcomes: Through this course students should be able to

• describe the basics of incident response handling process


• analyze the practices and procedures involved in incident response handling process
• observe different methods of obtaining information and data for forensic investigation

• demonstrate various procedures for acquiring forensic evidences and


document their details, in order to present them as legal evidence

Unit I

Introduction to Incident Response : What is computer security incident?, What are goals of incident
response?, Who is involved in incident response process?, Incident response methodology, Formulate a
response strategy, Investigate the insident, Reporting, Resolution, The incident response framework,
CSIRT, Incident response plan, Incident classification, Incident response playbook, Escalation
procedures, Maintaining incident response capability
Unit II

Preparing for Incident Response : Overview of incident response preparation, Identifying risks,
Preparing individual hosts, Preparing a network, Establishing appropriate policies and procedures,
Creating a response toolkit, Establishing an incident response team
After detecting an Incident : Overview of initial response phase, Establishing an incident
notification procedure, Recording details after initial detection, Incident declaration, Assembling the
CSIRT, Performing traditional investigative steps, Conducting interviews, Formulating a response
strategy.
Unit III
Live data collection : Creating a response toolkit, Storing information obtained during initial response,
Obtaining volatile data, Performing indepth live response, Is forensic duplication necessary?
Forensic duplication : Forensic duplicates as admissible evidence, Forensic duplication tool
requirement, Creating a forensic duplicate of a hard drive, Creating a qualified forensic duplicate of hard
drive.
Unit IV
Collecting network based Evidence : What is network based evidence?, Goals of network monitoring,
Types of network monitoring, Setting up a network monitoring system, Performing a trap and trace,
Using TCPDUMP for full-context monitoring, Collecting network based log files
Acquiring host-based Evidence : Preparation, Evidence volatility, Evidence acquisition, Evidence
collection procedures, Memory acquisition, Local acquisition, Remote acquisition, Virtual machines,
Non-volatile data
Evidence handling : What is evidence?, Challenges of evidence handling, Overview of evidence
handling procedures
Unit V
Data analysis techniques : Preparation for forensic analysis, Restoring a forensic duplicate, Restoring
a qulaified forensic duplicate of a hard disk, Reviewing image files with forensic suites, Converting a
qualified forensic duplicate to a forensic duplicate, Recovering deleted files on windows systems,
Recovering unallocated space, free space and slack space, Generating files list, Preparing a drive for
string searches
Analysing system memory : Memory evidence overview, Memory analysis, Tools

Network evidence analysis : Analysing packet captures, Command line tools, Wireshark, Xplico and
CapAnalysis, Analysing network log files, DNS blacklists, SIEM, ELK stack
Unit VI
Investigating windows systems : Where evidence resides on windows systems, Conducting a
windows investigation, Identifying unauthorised user accounts or groups, File auditing and theft of
information, Handle the deaprting employee
Investigating routers : Obtaining volatile data prior to powering down, Finding the proof, Using
routers as response tools
Writing computer forensic reports : What is a computer forensic report?, Report writing
guidelines, A template for computer forensic reports

List of Practical’s/Experiments:

Network Evidence Collection: Network evidence collection and analysis of captured packet with the help of
tcpdump, WinPcap, RawCap and Wireshark.
Acquiring Host-Based Evidence: Local volatile and non-volatile acquisition and memory aquisition with the
help FTK imager and WinPmem.
Understanding Forensic Imaging: Demonstration of Dead Imaging and Live Imaging with help of FTK
Imager and FTK Imager Lite.
Network Evidence Analysis: Analysis of packet information and gaining overall sense of traffic contained
within a packet capture with the help of Wireshark, Xplico and CapAnalysis.
Newtork Log Analysis: Analyzing network log files with help of DNS Blacklists and ELK Stacks.
Analysing System Memory: Reviewing the images of memory with the help of Mandiant Redline.
Volatility: performing the analysis of memory images with the help of open source advanced memory
forensics framework.
Analyzing System Storage: Demonstration of timeline analysis, keyword searching, and web and email
artifacts and to filter results on known bad file hashes using Autopsy.
Malware Analysis: Demonstration of freeware command line based utility for conducting static malware
analysis using Remnux.
Dynamic Malware Analysis: Demonstration of dynamic malware analysis using Process Explorer in windows
and Cuckoo Sandbox.

References:
1. DIGITAL FORENSICS AND INCIDENT RESPONSE by GERARD JOHANSEN, PACKT PUBLISHIN
2. INCIDENT RESPONSE & COMPUTER FORENSICS by JASON LUTTGENS, MATTHEW PEPE AND KEVIN
MANDIA, MCGRAW HILL EDUCATION

You might also like