IT0007-Laboratory-Exercise-7 - Incident Handling
IT0007-Laboratory-Exercise-7 - Incident Handling
IT0007
(Information Assurance & Security 2)
EXERCISE
7
INCIDENT HANDLING
Student Name /
Group Name:
Name Role
Members (if Group):
Section:
Professor:
a. PROGRAM OUTCOME/S (PO) ADDRESSED BY THE LABORATORY EXERCISE
Apply knowledge through the use of current techniques and tools necessary for the IT
profession. [PO: G]
d. BACKGROUND INFORMATION
Nearly every “secure” system that is used today can be vulnerable to some type of
cyberattack.
f. LABORATORY ACTIVITY
INSTRUCTIONS
Background / Scenario
Computer security incident response has become a vital part of any organization. The process for
handling a security incident can be complicated and involve many different groups. An organization must
have standards for responding to incidents in the form of policies, procedures, and checklists. To properly
respond to a security incident, the security analyst must be trained to understand what to do and must also
follow all of the guidelines outlined by the organization. There are many resources available to help
organizations create and maintain a computer incident response handling policy, but the NIST Special
Publication 800-61 is specifically called by the CCNA CyberOps SECOPS exam topics. This publication
can be found here:
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
This scenario is about a small, family-owned investment firm. The organization has only one location and
less than 100 employees. On a Tuesday morning, a new worm is released; it spreads itself through
removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs
a DDoS agent.
It was several hours after the worm started to spread before antivirus signatures became available. The
organization had already incurred widespread infections. The investment firm has hired a small team of
security experts who often use the diamond model of security
incident handling.
Preparation:
Scan first the system to check whether there are any malware and then start if there are no malware, and
also do some background check or research about the different kinds of viruses or malware to learn how
they work and what its consequences.
Make sure that there is an antivirus protection on all the 100 computers and make sure that their software
and hardware is up to date. Advise the employees to update them if necessary.
Detect which computers were infected and make sure that there were no other computers infected and
affected. Recover the affected computers by finding and identifying the cause and fix them.
Post-Incident Activity:
The employees should know how to detect, contain and eradicate if this situation happens in the case that
there is no available IT personnel to tend to their problems.
This scenario is about a mid-sized hospital with multiple satellite offices and medical services. The
organization has dozens of locations employing more than 5000 employees. Because of the size of the
organization, they have adopted a CSIRC model with distributed incident response teams. They also have
a coordinating team that watches over the CSIRTs and helps them to communicate with each other.
On a Wednesday evening, the organization’s physical security team receives a call from a payroll
administrator who saw an unknown person leave her office, run down the hallway, and exit the building.
The administrator had left her workstation unlocked and unattended for only a few minutes. The payroll
program is still logged in and on the main menu, as it was when she left it, but the administrator notices
that the mouse appears to have been moved. The incident response team has been asked to acquire
evidence related to the incident and to determine what actions were performed.
The security teams practice the kill chain model, and they understand how to use the VERIS database. For
an extra layer of protection, they have partially outsourced staffing to an MSSP for 24/7 monitoring.
Preparation:
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
Post-Incident Activity:
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________