Responding to Targeted CyberattacksISACA, 2013 - 88 sidor |
Innehåll
Chapter 1 Introduction | 9 |
Chapter 2 Preparation | 23 |
Chapter 3 Investigation | 43 |
Chapter 4 Eradication | 57 |
Chapter 5 Posteradication | 71 |
Chapter 6 Conclusion | 81 |
Appendix A Other Questions the Investigation Team Will Address | 83 |
Appendix B Investigative Tools | 87 |
Vanliga ord och fraser
actions Active Directory activity administrator accounts advanced attacker alerts antivirus software application attack vector botnet breach investigation capabilities CGEIT CISA CISM CISSP command-and-control communication compromised conduct configured coordinated credentials CRISC cybersecurity deployed detection devices difficult domain administrator domain controller efficient encryption environment eradication day eradication effort eradication event eradication plan eradication team Ernst & Young establish execution figure financial find firewall first forensic FQDN hash hosts identified identify incident infection information security initial Internet investigation and eradication investigation team IOCs IP addresses ISACA lessons learned log files malicious malware monitoring Multifactor authentication NetFlow NIST operations persistent phishing points of presence response scans security team server SIEM sophisticated attackers specific stakeholders target team members technologies third parties threat actor threat intelligence traffic Two-factor authentication updates US-CERT vendors vulnerabilities whitelisting workstation Young LLP