StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Purpose of Incident Response in Business Environment - Research Paper Example

Cite this document
Summary
The paper "Purpose of Incident Response in Business Environment" states that the procedures for both wired and wireless devices have been demonstrated in this plan. These procedural steps will assist digital investigators in acquiring data from any wired or wireless device…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Purpose of Incident Response in Business Environment
Read Text Preview

Extract of sample "Purpose of Incident Response in Business Environment"

? Full Paper Purpose of Incident Response Plan Business environment is constantly changing in terms of technology, business or trends and almost every organization is now equipped with information systems. Similarly, threats, vulnerabilities and risks associated with these factors are also in parallel. As threats make their way from vulnerabilities, a mechanism is vital to monitor, eliminate and report these issues. Incident response plan (IRP) illustrates a security incident along with the related incident response phases. Likewise, the plan consists of documentation related to information channels. For instance, in what way the information has been passed to the applicable person, incident assessment, eliminating response strategy and damage, safeguarding information related to evidence and documentation (Incident response plan, n.d ). Moreover, the plan also defines roles and responsibilities and constructs procedures for addressing different security incidents. Wireless device Forensic Acquisition and Examination Personal data assistants and Palm based handheld devices are now more convenient for business users as compare to a cell phone with integrated camera and other multimedia features. For this reason, methods and procedures that were followed previously were enforced to be re-evaluated, re-examined and re- defined, in order to synchronize with the new technological revolution of these handheld data assistants. Likewise, in re-examining the methodologies and procedures, the most critical areas, in the context of wireless device forensics, are acquisition and authentication, as they are normally the part of any computer forensic methodologies. However, while considering PDA’s, these two areas weighted more than a normal computer forensic acquisition and authentication procedures. The reason behind the sensitivity and importance of these areas is due to the dependency of these PDA’s on transitional storage (Computer forensics. n.d). Likewise, a vital factor of these PDA’s is that the acquisition and analysis are processed in the memory located within the PDA i.e. both volatile and non-volatile memories, RAM and ROM. The data storage processes of a PDA along with the installed operating system do not stop even if the PDA is turned off (Computer forensics. n.d). This is because the battery of PDA keeps it alive for operational purposes. Therefore, conducting forensic analysis on PDA is complex and possesses several risk factors. Recommended Procedure PDA is an ‘always-on’ device that can also be called as a push messaging device. PDA receives information from its radio antenna anytime. In this process, PDA overwrites on previously deleted data. For instance, application that are involved in this procedure are email clients, chat messengers etc. this methodology of PDA makes the task complex for the investigators. In this scenario, recommended steps will be (Computer forensics. n.d): For reserving the PDA, radio will be turned off. During the process of acquisition, the PDA should be moved to a protected location for turning the PDA on and instantly shutting down the radio afore inspection. Moreover, investigators must ensure battery status to fully charged, as it will disrupt the investigation process. The next step will be to gather logs, as this will be a part of evidence collection. Logs can be achieved by unit control functions of the SDK tool. The next step will be imaging and profiling of the PDS’s operating system. After collecting the evidence, it will be reviewed by the investigators. After reviewing the evidence, files will be dumped at SDK simulator Wired device Forensic Acquisition and Examination Forensic investigators will construct a methodology that will monitor attacks from inbound and outbound wired networks. Recommended Procedure These three processes will be executed, in order to detect the cause and the source: pcap trace analysis that are initialized for server side attack pcap trace analysis that are initialized for client side attack netflow analysis initialized for network flow monitoring In order to capture attacks, forensic investigators will implement a vulnerable HTTP server. The server will acts as an original server and address every query related to HTTP. However, for processing a ‘POST’ request the server will initiate a separate thread that will encapsulate a shell incorporated by a port 12345. The replicated fake web server will process the shell code similarly to the original one. The tool that will be used for exploiting and capturing network traffic is ‘WireShark’(Cert Exercises Handbook – Scribd, n.d.). It is an open-source tool that is meant for capturing data packets and network traffic examination on wired and wireless networks (Wireshark Network Analysis n.d.). Similarly, this tool will capture and examine network traffic on the Ethernet interface connected to the fake web server. Apart from Wireshark, tftp server and tftp client will also be implemented. As the web server is equipped with Apache, one more tool named as exploit followed by the command (Cert Exercises Handbook – Scribd, n.d.): (/usr/share/exercises/07_NF/adds/exploit) Prior to start the replicated fake web server, there is a requirement for stopping Apache server services. The next step is to initialize the server type by executing the following command (Cert Exercises Handbook – Scribd, n.d.): (sudo /etc/init.d/http_server ) The next step is to initialized customized scripts named as interface_affected and interface_hacker. The pcap file will demonstrate the log files of the attacks that are initiated from an IP address that is dissimilar than the victim’s IP address. Comparison between Wired and Wireless device Procedures After through discussion of procedural steps for acquisition and examination, wireless devices are more difficult to investigate for data acquisition and examination. Likewise, the architecture of wireless devices is based on transitional storage and it is difficult for the investigators to retrieve data, as the device gets new information that overwrites deleted data. On the other hand, wired devices can be based on many platforms. Thus, there are several tools and methodologies are available for data acquisition, examination and secure storage. Conclusion The procedures for both wired and wireless devices have been demonstrated in this plan. These procedural steps will assist the digital investigators for acquiring data from any wired or wireless device. Moreover, digital investors can also use the procedural steps for examine wired and wireless devices. Likewise, there are numerous tools available in the market. The decision of purchasing FTK tools will be dependent on the hardware architecture that needs to be investigated. References Cert Exercises Handbook - Scribd. n.d. Retrieved from http://www.scribd.com/doc/35011748/Cert-Exercises-Handbook Wireshark Network Analysis. n.d. Retrieved from http://wiresharkbook.com/articlewireshark101.html Incident response plan, n.d Retrieved 10/8/2011, 2011, from http://www.comptechdoc.org/independent/security/policies/incident-response-plan.html Computer forensics, n.d Retrieved 10/8/2011, 2011, from http://www.mandarino70.it/ Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Forensic: Information Technology Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1432637-network-forensic
(Network Forensic: Information Technology Research Paper)
https://studentshare.org/information-technology/1432637-network-forensic.
“Network Forensic: Information Technology Research Paper”, n.d. https://studentshare.org/information-technology/1432637-network-forensic.
  • Cited: 0 times

CHECK THESE SAMPLES OF Purpose of Incident Response in Business Environment

Security Breaches and Incident Handling in Organization

One more research was conducted related to a Proposed Integrated Framework for Coordinating Computer Security incident response Team.... Conventionally, computer security incident response teams (CSIRT) are responsive to viruses, hacking and unauthorized access of employees.... The CSIRT is defined as 'Computer security incident response team (CSIRT) is a term used by the CERT Coordination Center (CERT/ CC) to describe a service.... One more research was conducted related to a Proposed Integrated Framework for Coordinating Computer Security incident response Team....
7 Pages (1750 words) Research Proposal

Incident Response, Business Continuity and Disaster Recovery Plans

The case study address incident response, Business Continuity, and Disaster recovery plans for our IT department.... In order to achieve the primary objective of online service delivery, the organization must address and establish business continuity planning.... However, business continuity planning is not limited to disaster recovery and incident management.... (I have assumed these requirements, as there is no case study) 17The additional expenses must be determined if the functions or procedures related to the business are untreatable....
21 Pages (5250 words) Case Study

Incident Command Issues

This essay "incident Command" is about a state-of-the-art system designed to cater to a particular industry taking into consideration the known threats and risks to the industry and their updated technological solutions.... The series of explosions and subsequent fire that caused widespread damage at the Buncefield oil storage and transfer depot, Hemel Hempstead, on 11 December 2005 conspicuously reveals the need for an incident command system (ICS) to be in place in the depot....
9 Pages (2250 words) Essay

Efficiency of an Incident Command System

Strategic changes in the response or interaction will be more accurate.... From the paper "Efficiency of an incident Command System" it is clear that both private and government organizations, as well as, the citizens and people of the community must know where to call and coordinate with if an emergency or incident occurs.... Having relevant and important information about the incident, the public, government and private organizations, as well as, the experts or support team can now make countermeasures to respond accordingly to the situation of the incident (Amendola, et....
10 Pages (2500 words) Essay

Incident response policy

evelopment of incident response Team (IRT)The IRT is the focal point for dealing with computer security incidents in your environment.... Proper incident response should be an integral part of your overall security policy and risk mitigation.... The value of forming a security incident response team with explicit team member incident response policy for Gem Infosys incident response policy for Gem Infosys Introduction In the existing IT environment, incidents are common and appropriate measures should be taken to tackle them....
2 Pages (500 words) Essay

Industrial Security Plan

Many business processes are interdependent.... For instance, in the construction business, safety officers verify the stability of scaffolding, make sure that workers use helmets and footwear, and check to certify employees operate construction apparatus in a safe manner....
7 Pages (1750 words) Assignment

The Implementation of an Effective Fire and Rescue Service Management

The people working in such an environment are called from the various organizations so that ICS has a standard approach for all the designs.... These people do not work on a routine with each other thus, creating an environment, which gives the best possible outcomes for managing catastrophe.... he incident command system is defined as a set of procedures designed to improve operations at the time of catastrophe or disaster.... In order to work and demonstrate effective management, the incident command system or ICS provides a scalable and flexible framework so that people can work collaboratively....
9 Pages (2250 words) Report

Business Continuity Plan for Northwest Ambulance Services

The author of the current paper "business Continuity Plan for Northwest Ambulance Services" tells that there are three general levels of continuing service that can be considered when making a business Continuity strategy, and these depend on how critical each activity is.... NWAS, therefore, must have a business Continuity Plan that satisfies NHS requirements to ensure continued service.... (business Plan 2008/2009, 2008) The service maintains a fleet of 982 vehicles, plus a number of bicycle-equipped cycle responders and two helicopters providing medical airlift services....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us