Computer Security and Penetration Testing: Incident Handling
Computer Security and Penetration Testing: Incident Handling
Testing
Chapter 18
Incident Handling
Objectives
• Identify the necessity of incident handling
• Identify different types of incidents
• Recognize the various phases of incident handling
• Note the phases in preparing for incident handling
• Reinstallation
– All infected computers must be either reinstalled or
fixed with a patch
– All the computers that were not infected should be
patched as well
• Reinstallation (continued)
– During reinstallation, check for the following:
• Verify that no traces of the incident are left
• Implement security checks on the network so the
problem does not arise again
• Change the administrative password and users’
passwords
• Make a backup copy of the newly installed settings so
that if a hacker attacks again, the process of reinstalling
is faster
• Reauthentication
– It may be necessary to disable all accounts and then
reenable the accounts
• Pruning the unknown or unused accounts
• Scanning
– Scanning checks should be performed after the
repair, reinstallation, and reauthentication
• Resuming work
– Users may resume their work after all steps have
been completed
Computer Security and Penetration Testing 45
Postmortem