Module 06 Notes (1)
Module 06 Notes (1)
Network security incidents could cause potential damage to organizational data, resources, and reputation
Incident handlers must be prepared to handle such incidents before they cause further damage to the corporate network
Organizations require a proper network incident handling and response (IH&R) process to promptly detect and contain
network attacks to minimize data loss and maintain business continuity
1. Install firewall and IDS/IPS to block the use of services that violate organizational policies.
2. Configure email servers such that they block outbound spam.
3. Deploy URL filtering to prevent access to inappropriate or malicious websites.
4. Limit outbound connections that use encrypted protocols such as SSH, HTTPS, and IPsec.
5. Use VPN and other secure network channels only.
6. Register user activity logs and keep monitoring them regularly.
7. Enable authentication for sharing files across a network.
8. Enforce the latest data protection and internet usage policies.
1. Communicate the situation to the organization’s legal department representatives regarding liability issues.
2. Consult the human resources and legal department representatives regarding the procedures for handling
inappropriate usage incidents.
3. Provide training to employees to ensure proper usage and warn them to understand the legal liabilities of such
incidents.
4. Train employees to verify site security before trying to log in or upload personal or professional details.
5. Provide proper guidelines and policies about downloading objectionable content using the organization’s system and
networks.
6. Keep the anti-virus database updated.
7. Implement protective monitoring of critical services.
8. Enforce the latest data encryption policies to protect data from unauthorized users.
9. Conduct regular security audits to reduce network security risks.
10. Upgrade the systems and applications to the latest software version.
Packet Traceback: Similar to reverse engineering, it helps identify the true source of the attack and taking
necessary steps to block further attacks.
Network Traffic Analysis: Analyze communication protocols and traffic patterns to identify network nodes that may
be infected by handlers.
Neutralize Botnet Handlers: In comparison to the number of agents, fewer DDoS handlers are deployed, By
neutralizing some handlers, multiple agents can be rendered useless, thwarting DDoS attacks.
Spoofed Source Address: There is a decent probability that the spoofed source address of DDoS attack packets does
not represent a valid source address of the definite sub-network.
1. Determine the extent of impact on different sources, their ability to function, and the risks involved in using
compromised resources
2. Devise various recovery methods depending on different factors such as severity of incident, systems affected, and
systems and devices required
3. Communicate with the incident response team to select the best recovery plan and obtain the required permissions
from cyber security authorities
4. Use backup resources efficiently to replace compromised systems
5. Check the functionality of all restored systems
6. Implement additional monitoring to look for related activity in future
7. Erase unwanted DDoS detection logs recorded across security solutions after responding to the DDoS attack
8. Restart the BGP protocol to send a keepalive message after restoring websites from DoS attacks
Module Summary
In this module, we discussed the importance of handling network security incidents
We defined the general preparation steps for handling network security incidents and reviewed general detection
techniques
This module detailed the detection, containment, and eradication of unauthorized access incidents, along with recovery
steps after such incidents
We also examined the detection, containment, and eradication of inappropriate usage incidents, along with recovery
steps after such incidents
Moreover, we explained the detection, containment, and eradication of DoS/DDoS incidents, along with recovery
steps after such incidents
We further described the fundamentals of wireless network security incidents along with their detection, containment,
eradication, and recovery steps
In the next module, we will discuss how to handle and respond to various web application security incidents in detail