Page 40 - Understandinging Forensic Technology Landscape
P. 40

Cybersecurity, email



           and network intrusion






           Cybersecurity, email and network                     Potential intrusion threats can exist both internally
           intrusion in the forensic context                    and externally. External actors exploit vulnerabilities to
                                                                compromise a network from outside of the defense
           According to the National Initiative for Cybersecurity   perimeter. Internal actors can present similarly grave
           Careers and Studies (NICCS), cybersecurity is “the   risks, whether through inadvertent or malicious actions.
           activity or process, ability or capability, or state whereby   Intruders’ goals and motivations vary, but the threats
           information and communications systems and the       they pose and the dynamic nature of cybersecurity
           information contained therein are protected from     today present continual challenges. The work of forensic
           and/or defended against damage, unauthorized use     accountants and cybersecurity experts frequently
           or modification, or exploitation.”  Its importance    overlap to assess evidence and data sets that relate to
                                      42
           cannot be understated because today’s cyber          the specific incidents that impact information systems,
           ecosystem is complex, inter-connected, and global.   business processes, financial transactions, businesses
           With an ever-increasing attack surface, no business is   and individuals.
           immune. As this landscape evolves, data has become
           both an asset and a liability. Among the most common
           threats are email exploitation and system breaches.  Tools and techniques
           The goal of email exploitation is to gain unauthorized   As part of an effective overall system security
           access to an email account to commit fraud, exfiltrate   program, businesses should have a well-defined plan
           data, or establish enhanced persistent access to the   for responding to specific incidents. It should include
           network host. Strategies include the following:      required protocols and responsible parties for each
                                                                phase of the response process. Lack of effective
           •   Phishing — A digital form of social engineering   planning can cause delay and inhibit remediation
             to deceive individuals into providing sensitive    when problems arise.
             information, which can be leveraged in an attack
           •   Business email compromise — An exploit in which    Conducting forensic response amid a cyberattack
             the attacker impersonates legitimate individuals    or incident can present many hurdles in the effort to
             for nefarious purposes, usually to defraud the     successfully investigate and restore the compromised
             victims of money                                   system. Effective investigation will inform responders
                                                                in several critical areas, including the following:
           In system breaches, malicious actors exploit system   •  How the system was compromised
           vulnerabilities to gain unauthorized access to
           susceptible networks. Common techniques include but   •   The intended purpose of the intrusion, and whether
           are not limited to the use of malware and exploitation of   the actor was successful
           the third party, supply chain exposures.





            42  A Glossary of Common Cybersecurity Terminology, NICCS, niccs.us-cert.gov/about-niccs/glossary, accessed March 9, 2020



                                                                  Understanding the forensic technology landscape | 36
   35   36   37   38   39   40   41   42   43   44   45