unprotected-CHFI v3 Module 05 CSIRT.pdf
(
2830 KB
)
Pobierz
Computer Hacking
Forensic Investigator
Module V:
Computer Security
Incident Response Team
Scenario
Target Company Ltd, a data warehousing has lots of important business
information stored in it’s huge database. The data and information
present in the company’s database serves as a key aspect to its next
business moves.
An e-mail claiming to pass all the relevant and vital business information
to their competitor surprised the company’s top management. A team of
hackers threatens the management to expose all the business secrets of
the Target Company Ltd to the competitor unless they receive a big
Ltd.
paycheck !!!
EC-Council
Copyright © by
EC-Council
All Rights reserved. Reproduction is strictly prohibited
Module Objective
This module will familiarize you with the following:
Vulnerability statistics
An Incident
Identifying an Incident
y g
Preventing an Incident
Incident Response checklist
Handling Incidents
Procedure for handling Incident
Incident management
Estimating cost of an Incident
Whom to report an Incident
h
id
Incident Reporting
Vulnerability resources
Category of Incidents
CSIRT
Motivation behind CSIRTs
Who works in a CSIRT
Staffing your CSIRT
CSIRT services
Types of incidents and level of support
Service description Attributes
Incident specific procedures
Steps to handling CSIRT cases
Incident
I id t reporting f
ti forms
Best practices for creating a CSIRT
Limits to effectiveness in CSIRTs
World CERTs
Copyright © by
EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Module Flow
Vulnerability Statistics
Procedure for
Handling Incident
What Is an Incident?
Incident Response
Checklist
Estimating Cost
of an Incident
What Is CSIRT?
Types of incidents
T
f i id t
and level of support
Best Practices for
Creating a CSIRT
How to Identify
an Incident?
How to Prevent An
Incident from Happening?
Incident Management
Incident Reporting
Who works in a CSIRT ?
Category of Incidents
Incident S
I id t Specific
ifi
Procedures
Incident Reporting
Forms
Copyright © by
EC-Council
All Rights reserved. Reproduction is strictly prohibited
CSIRT services
Limits to Effectiveness
in CSIRTs
EC-Council
Present Networking Scenario
Increase in the number of companies venturing into e-business
coupled with hi h Internet usage
l d i h high
Decrease in vendor product development cycle and product
g y
testing cycle
Increase in complexity of Internet as a network
Alarming increase in intruder activities and tools, expertise of
hackers and sophistication of hacks
Lack of thoroughly trained professionals as compared to the
number and intensity of security breaches
EC-Council
Copyright © by
EC-Council
All Rights reserved. Reproduction is strictly prohibited
Plik z chomika:
qfx
Inne pliki z tego folderu:
CHFI v3 Module 02 Law and Computer Forensics.pdf
(2867 KB)
CHFI v3 Module 03 Computer Investigation Process.pdf
(3529 KB)
CHFI v3 Module 04 First Responder Procedures.pdf
(2317 KB)
CHFI v3 Module 05 CSIRT.pdf
(2815 KB)
CHFI v3 Module 01 Computer Forensics in Todays World.pdf
(1418 KB)
Inne foldery tego chomika:
Advanced Cisco Study Using GNS3 Videos
Advanced Juniper Networks Routing in the Enterprise Detailed Lab Guide
Billing with Stripe (kefirm)
Blackhat & Defcon 2009 Conf CDs Present Jul 2009
Bootsrap - Tutsplus - Bootstrap 3.0 Essentials
Zgłoś jeśli
naruszono regulamin