Page 649 - StudyBook.pdf
P. 649

Operational and Organizational Security: Incident Response • Chapter 11  633

                 sics. Members of the Incident Response Team should be experienced in handling
                 issues relating to unauthorized access, denial or disruptions of service, viruses, unau-
                 thorized changes to systems or data, critical system failures, or attempts to breach
                 the policies and/or security of an organization. Specific members of this team who
                 will conduct investigations should also be well versed in the tools and techniques of
                 computer forensics, so they can quickly respond to situations requiring these skills.
                 If the incident is of a criminal nature, the policy should also specify at what point
                 law enforcement should be contacted to take control of the investigation.The
                 policy should also provide basic procedures for users to follow when an incident
                 occurs. Upon realizing an issue exists, users should notify their supervisor, a desig-
                 nated person, or a designated department, who then contacts the Incident
                 Response Team.While awaiting the team’s arrival, the scene of the incident should
                 be vacated and any technologies involved should be left as they were.The users
                 should also document what they observed when the incident occurred, and list
                 anyone who was in the area when the incident occurred.
                    Management and employees need to be aware of the need to support computer
                 forensic examinations. Funding should be available for tools and ongoing training
                 in examination procedures, or to hire outside parties to perform an investigation.
                 Since the corporate world revolves around budgets, management may initially balk
                 at such an expense, until they realize that these skills provide day-to-day services for
                 data recovery.Anytime someone has corrupt or deleted data, the skills and training
                 can be used to restore the data, which could save significant amounts of money for
                 the business if the data was important enough. If law enforcement is called in, there
                 are no direct costs, but there is still the need to cooperate with investigators.
                    Because digital evidence may be damaged or destroyed by improper handling
                 or examination, management must be aware that considerable time may be
                 involved to effectively investigate an incident.Vital systems or facilities might be
                 unavailable while evidence is being gathered, and it may be necessary for equip-
                 ment to be removed from service to be examined and stored as evidence until a
                 criminal case has reached its conclusion. Because personnel may need to be inter-
                 viewed and employees may be unable to do their jobs for periods of time, man-
                 agers may become impatient and hinder the investigation by attempting to rush it
                 along and get people back to work.The goal of management should be to assist the
                 investigation in any way possible, and an atmosphere of cooperation should be nur-
                 tured to help the investigation proceed quickly and effectively.
                    To address how a company should handle intrusions and other incidents, it is
                 important that a contingency plan be created.The contingency plan should address
                 how the company will continue to function during the investigation, such as when



                                                                              www.syngress.com
   644   645   646   647   648   649   650   651   652   653   654