SlideShare a Scribd company logo
2
Most read
5
Most read
7
Most read
Incident Response
Table Top Exercises
Eric Vanderburg, MBA, CISSP
June 19, 2008
Scenario
• Private confidential data on an FTP server is accessed
by an unauthorized individual
• Incident: YES
• Issues
– Potential privacy notification is needed
– More data could be viewed or stolen so the incident
needs to be contained
– Data needs to be replaced
Detection and Analysis
• Determine access method
– Stolen or sniffed password
– Exploit in system
• Determine the scope of the incident
– Find out if the incident has happened before and never
discovered.
– Were other systems accessed with the same credentials
– Find out which data was accessed and which
stakeholders/clients are impacted by the disclosure
• Determine if the data obtained is in a form that would disclose
private data, can be converted into a form that would disclose
private data, or can be combined with data from another incident to
disclose private data.
Containment Strategies
• Block IP or IP subnet from the firewall
• Shutdown FTP
• Change FTP passwords
• Move FTP to another server
• Change FTP ports
• Contact source and try to stop the distribution or use of
the information
Recovery
• Restore data from backup
• Request that the client resend the data
Post-incident Activities
• Attendees:
– Management
• CEO / Senior Partner
• COO
• Network Operations Manager
• Litigation Support Manager
– Public Relations Analyst
– Sales Manager (Facilitator)
– IT Staff
• Senior Network Engineer
• Network Engineer
• FTP Administrator
• Network Analyst
Preventing Future Occurrences
• Set timeout on FTP site
• Set alerts on FTP events
• Encrypt username and password or require VPN for FTP
• Set FTP server to only respond to specific IP addresses
• Configure Firewall rules for FTP ports to only allow traffic
from specific pre-approved IP addresses or subnets.

More Related Content

PPT
FTP Data Breach Incident Response - Eric Vanderburg
PPTX
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
PPTX
Apcon intellastore security visibility platform
PDF
Chapter 15 incident handling
PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
PPT
Incident handling.final
PPTX
Phases of Incident Response
PDF
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
FTP Data Breach Incident Response - Eric Vanderburg
QA Fest 2017. Per Thorsheim.GDPR - An overview and its relevance for QA
Apcon intellastore security visibility platform
Chapter 15 incident handling
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Incident handling.final
Phases of Incident Response
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia

Similar to Incident response table top exercises (20)

PPTX
Incident Response Security
PPT
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
CNIT 152: 6. Scope & 7. Live Data Collection
PDF
CNIT 50: 9. NSM Operations
PPTX
IRP on a Budget
PDF
INCIDENT RESPONSE CONCEPTS
PDF
Setting up CSIRT
PDF
6 Scope & 7 Live Data Collection
PPTX
FUEL_USERS_GROUP
PDF
CNIT 152: 1 Real-World Incidents
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PDF
CNIT 152: 1 Real-World Incidents
PPTX
Enterprise security management II
PPTX
You Will Be Breached
PPT
Computer Security ch18 ppt and pentesting
PPTX
Incident response Process in information security .pptx
PDF
Incident Response: How To Prepare
PDF
Incident response before:after breach
PPTX
Lecture 06 - Incident Management and SOC.pptx
Incident Response Security
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
INCIDENT RESPONSE NIST IMPLEMENTATION
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 50: 9. NSM Operations
IRP on a Budget
INCIDENT RESPONSE CONCEPTS
Setting up CSIRT
6 Scope & 7 Live Data Collection
FUEL_USERS_GROUP
CNIT 152: 1 Real-World Incidents
IT Security and Management - Semi Finals by Mark John Lado
CNIT 152: 1 Real-World Incidents
Enterprise security management II
You Will Be Breached
Computer Security ch18 ppt and pentesting
Incident response Process in information security .pptx
Incident Response: How To Prepare
Incident response before:after breach
Lecture 06 - Incident Management and SOC.pptx
Ad

More from Eric Vanderburg (20)

PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PPTX
Modern Security the way Equifax Should Have
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PPTX
Mobile Forensics and Cybersecurity
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
Ransomware: 2016's Greatest Malware Threat
PPT
Emerging Technologies: Japan’s Position
PPT
Principles of technology management
PPT
Japanese railway technology
PPT
Evaluating japanese technological competitiveness
PPT
Japanese current and future technology management challenges
PPT
Technology management in Japan: Robotics
PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
PPTX
Cloud Storage and Security: Solving Compliance Challenges
PPTX
Hacktivism: Motivations, Tactics and Threats
PPTX
Correct the most common web development security mistakes - Eric Vanderburg
PPTX
Deconstructing website attacks - Eric Vanderburg
PPTX
Countering malware threats - Eric Vanderburg
PPTX
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Principles of technology management
Japanese railway technology
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Technology management in Japan: Robotics
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Ad

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Modernizing your data center with Dell and AMD
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25 Week I
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Incident response table top exercises

  • 1. Incident Response Table Top Exercises Eric Vanderburg, MBA, CISSP June 19, 2008
  • 2. Scenario • Private confidential data on an FTP server is accessed by an unauthorized individual • Incident: YES • Issues – Potential privacy notification is needed – More data could be viewed or stolen so the incident needs to be contained – Data needs to be replaced
  • 3. Detection and Analysis • Determine access method – Stolen or sniffed password – Exploit in system • Determine the scope of the incident – Find out if the incident has happened before and never discovered. – Were other systems accessed with the same credentials – Find out which data was accessed and which stakeholders/clients are impacted by the disclosure • Determine if the data obtained is in a form that would disclose private data, can be converted into a form that would disclose private data, or can be combined with data from another incident to disclose private data.
  • 4. Containment Strategies • Block IP or IP subnet from the firewall • Shutdown FTP • Change FTP passwords • Move FTP to another server • Change FTP ports • Contact source and try to stop the distribution or use of the information
  • 5. Recovery • Restore data from backup • Request that the client resend the data
  • 6. Post-incident Activities • Attendees: – Management • CEO / Senior Partner • COO • Network Operations Manager • Litigation Support Manager – Public Relations Analyst – Sales Manager (Facilitator) – IT Staff • Senior Network Engineer • Network Engineer • FTP Administrator • Network Analyst
  • 7. Preventing Future Occurrences • Set timeout on FTP site • Set alerts on FTP events • Encrypt username and password or require VPN for FTP • Set FTP server to only respond to specific IP addresses • Configure Firewall rules for FTP ports to only allow traffic from specific pre-approved IP addresses or subnets.