Compare cert salaries and plan your next career move
mrcert2003 wrote: You should always maintain connectivity so that you can continouously collect data on the attack. You should remove all affected systems immediately.
mrcert2003 wrote: first of all you remove the machines that have been affected, but you keep the connection alive so you can trace where the packets are coming from..... And No I hate politics.... I think the question here is how the question on the exam is stated...Example: Which of the following actions should you perform when an attack is in progress? well if it's in progress it would be what I stated in my previous post... The key word is in PROGRESS. If the attack i s over then it would be the following: You should maintain connectivity for a a possible return Then you should remove the affected systems for immediate evidence collections. The key word was the attack is OVER.... Hope this clears it up for the person running for office............
keatron wrote: mrcert2003 wrote: first of all you remove the machines that have been affected, but you keep the connection alive so you can trace where the packets are coming from..... And No I hate politics.... I think the question here is how the question on the exam is stated...Example: Which of the following actions should you perform when an attack is in progress? well if it's in progress it would be what I stated in my previous post... The key word is in PROGRESS. If the attack i s over then it would be the following: You should maintain connectivity for a a possible return Then you should remove the affected systems for immediate evidence collections. The key word was the attack is OVER.... Hope this clears it up for the person running for office............ In some cases, the attack will be extreme enough that the preserve evidence is taken out of the equation. When dealing with forensics, you should almost NEVER use the term ALWAYS. It also depdends on the context of the question as well. If you're a forensics person, then obviously evidence preservation is probably most important, whereas if you're an incident response manager, or person responsible for securing top secret government missle plans, then you want that connecting severed or failed over to a honeypot or other evasive mechanism ASAP. You can't sit by for 30 minutes and watch the enemy take for example, every credit card and account number a bank owns, then claim the reason you did was to maintain connectivity for evidence collection. Probably get fired. The problem with these kinds of questions is the fact that test vendors are trying to water this profession down and make it simpler than it actually is. Everything in IT Security and Forensics is objective and in shades of gray. This is why so many people struggle with the CISSP, taking it is like walking into a big room that's smothered with shades of gray. And you still see in shades of gray for hours after to sit the exam. To excel in this field you have to be able to use brain power to help you make the right decision when the time comes. You also have to keep in mind that during a security breach, any and every thing you do could be potentially destroying or contaminating evidence (such as moving all affected machines without having proper chain of custody and incident response forms filled out properly while doing the move).
famosbrown wrote: Or that logic bomb could be set to erase everything when the connectivity is broken, which will cause a loss of everything anyway.
RussS wrote: famosbrown wrote: Or that logic bomb could be set to erase everything when the connectivity is broken, which will cause a loss of everything anyway. I've never seen a logic bomb that will cause loss of everything when connectivity is broken - and I have seen more than a few logic bombs.
RussS wrote: famosbrown - I am not anywhere near Keatrons level but I am the guy my boss calls on when we have a client with a compromised system. I will take the chance of a logic bomb and have the network cable pulled because that will give me the best chance of doing forensics. Usually when a compromised system is found there is a need for me to involve the police after I have secured things and their team has a similar train of thought to mine. BTW - I have seen many logic bombs, but most of them have been in labs and not in the wild. Heck, my instructor even wrote one that would delete all the logs when the administrator logged on to the machine
jdmurray wrote: keatron, is there such thing as a "forensics-friendly" Intrusion Prevention System? It would seem like an IPS (HIPS or NIPS) has the potential for really messing up the "footprints in the sand" of any host or network intrusion attempt. I understand that what an IPS does is based on the rules it is given, but does an IPS' operation give any consideration to the possible need of collecting evidence?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.