Page 676 - StudyBook.pdf
P. 676

660    Chapter 11 • Operational and Organizational Security: Incident Response

                   Biometric authentication uses the physical attributes of a person to
                      determine whether access should be given.

                   Tailgating or piggybacking involves a person following another authorized
                      person (who has used access control methods like key cards, PIN numbers,
                      biometrics or other methods) into a secure area or building

                   Dumpster diving involves going through trash to find documents that
                      contain sensitive information, such as work product, usernames, passwords,
                      or information on IP addresses and other data about systems and the
                      network.

                   Social engineering involves gaining the confidence of someone to trick
                      them into providing information.

                   Phishing involves sending e-mails to people to entice the recipient into
                      responding and providing confidential information.
                   The environment in which equipment resides must be air-conditioned,
                      have proper humidity levels, and have other conditions that are suitable for
                      the equipment stored inside.

             Forensics


                   Computer forensics is the application of computer skills and investigation
                      techniques for the purpose of acquiring evidence. It involves collecting,
                      examining, preserving, and presenting evidence that is stored or
                      transmitted in an electronic format.

                   It is important that a crime scene is secure and that anyone who had
                      access to the area and witnessed the incident is documented. Information
                      displayed on monitors should be documented or photographed, computers
                      that are running should be left running to protect volatile data, and those
                      shut off should remain off to avoid activating any malicious software that
                      may be installed on the machine.
                   Computer forensic software should be used to make an image of the
                      disk(s) to work with so that the integrity of the original can be preserved.

                   Copies of data should be made on media that is forensically sterile.This
                      means that the disk has no other data on it, and has no viruses or defects.







          www.syngress.com
   671   672   673   674   675   676   677   678   679   680   681