SlideShare a Scribd company logo
Incident Handling
Presented By
Sabto Prabowo
Introduction to Incident Handling
An incident is an event or set of
events that threatens the security of
computing systems and networks. It
includes system crashes, packet
flooding, and unauthorized use of
another user’s account.
Types of Incidents
Incidents can be classified as
one or more of the following:
• Repudiation
• Reconnaissance attack
• Harassment
• Extortion
• Pornography trafficking
• Organized crime activity
• Subversion
• Hoax
• Caveat
Security Incidents
A security incident includes the following:
• Evidence of data tampering
• Unauthorized access or attempts at
unauthorized access from internal and external
sources
• Threats and attacks by an electronic medium
• Defaced Web pages
• Detection of some unusual activity, such as
possibly malicious code or modified traffic
patterns
Security Incidents
• Denial-of-service attacks
• Other malicious attacks, such as virus
attacks, that damage the servers or
workstations
• Other types of incidents that weaken the
trust and confidence in information
technology systems
Category of Incidents: Mid Level
• Unfriendly employee termination
• Violation of special or privileged access to a
computer or any computing facility that would
normally only be accessible to administrators
• Illegal access of the network
• Unauthorized storing or processing of data
• Destruction of property worth less than $100,000
• Personal theft of an amount less than $100,000
• Presence of computer virus or worm of higher
intensity
Category of Incidents: High Level
• Suspected computer break-in
• Denial-of-service attacks
• The presence of a harmful virus or worm, which can lead
to serious corruption or loss of data
• Changes in hardware, software, and firmware without
authentication
• Destruction of property worth more than $100,000
• Theft worth more than $100,000
• Child pornography
• Gambling
• Illegal downloads of copyrighted material, including
music, videos, and software
• Other illegal file downloads
• Any violations of the law
How to Identify an Incident
• Suspicious log entries
• System alarms from the IDS
• Presence of unexplained user accounts on the network
• Presence of suspicious files or unknown file extensions
on the system
• Modified files or folders
• Unusual services running or ports opened
• Unusual system behavior
• Changed drive icons
• Drives not accessible
• More packets received than expected
How to Prevent an Incident
• Scanning
• Auditing
• Detecting intrusions
• Establishing defense-in-depth
• Securing clients for remote users
Incident Management
- Threat Analysis and Assessment
- Vulnerability Analysis
- Estimating the Cost of an Incident
- Change Control
Incident Reporting
- Computer Incident Reporting
- Where to Report an Incident
- Report a Privacy or Security Violation
- Preliminary Information Security Incident
Reporting Form
- Why Organizations Do Not Report Computer
Crimes
Incident Response
- Identification of Affected Resources
- Incident Assessment
- Assignment of Event Identity and Severity Level
- Assignment of Incident Task Force Members
- Containing Threats
- Evidence Collection
- Forensic Analysis
- Security Incident Response
- Incident Response Policy
- Computer Security Incident Response Team (CSIRT)
- Incident Response Checklist
- Response Handling Roles
- Contingency Planning
- Budget/Resource Allocation
Incident Handling
Procedure for Incident Handling:
1. Preparation
2. Identification
3. Containment
4. Eradication
5. Recovery
6. Follow-up
CSIRT
A computer security incident response
team (CSIRT) is trained in dealing with
security matters related to
intrusions and incidents. The team
secures networks from foreign attacks.
Types of Incidents and Levels of
Support
• Type and severity of the incident or
issue
• Type of client
• Size of the user community affected
• Available resources
Incident-Specific Procedures
Virus and Worm Incidents
1. Isolate the system.
2. Notify the appropriate authorities.
3. Identify the problem.
4. Contain the virus or worm.
5. Inoculate the systems.
6. Return to a normal operating mode.
7. Perform a follow-up analysis.
Incident-Specific Procedures
Hacker Incidents
1. Identify the problem.
2. Notify the appropriate authorities.
3. Identify the hacker.
4. Notify CERT.
5. Perform a follow-up analysis.
Steps for Creating a CSIRT
1. Obtain Management’s Support and Buy-In
2. Determine the CSIRT Development
Strategic Plan
3. Gather Relevant Information
4. Design the CSIRT Vision
5. Communicate the CSIRT Vision
6. Begin CSIRT Implementation
7. Announce the CSIRT
World CERTs
- APCERT (Asia Pacific Computer Emergency Response Team)
- AusCERT (Australia Computer Emergency Response Team)
- HKCERT (Hong Kong Computer Emergency Response Team
Coordination Center)
- JPCERT/CC (Japan Computer Emergency Response Team/Coordination
Center)
- MyCERT (Malaysian Computer Emergency Response Team
- PakCERT (Pakistan Computer Emergency Response Team)
- SingCERT (Singapore Computer Emergency Response Team
- TWCERT/CC (Taiwan Computer Emergency Response
Team/Coordination Center)
- CNCERT/CC (China Computer Emergency Response Team/Coordination
Center)

More Related Content

PPTX
Cyber Security # Lec 2
PPTX
Cyber Security # Lec 3
PPTX
Information security ist lecture
PDF
CNIT 123: Ch 1 Ethical Hacking Overview
PPTX
Information Security (Malicious Software)
PPTX
06. security concept
PPTX
Cryptography and Network security # Lecture 3
PPTX
Network Security
Cyber Security # Lec 2
Cyber Security # Lec 3
Information security ist lecture
CNIT 123: Ch 1 Ethical Hacking Overview
Information Security (Malicious Software)
06. security concept
Cryptography and Network security # Lecture 3
Network Security

What's hot (20)

PPT
Understanding the need for security measures
PPTX
Cryptography and Network Security # Lecture 2
PPTX
Industry Best Practice against DDoS Attacks
PPTX
Ethical Hacker
PPTX
Security Basics
PPTX
5 Security Tips to Protect Your Login Credentials and More
PDF
Irm 5-malicious networkbehaviour
PPTX
Introduction to Network Security
PPTX
Prevention is not enough
PPTX
Recover your files from Ransomware - Ransomware Incident Response by Tictac
PPTX
Data Security
ODP
Network Security Topic 1 intro
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PPTX
Data protection and security
PDF
Cs8792 cns - unit v
PPTX
Basic Security Concepts of Computer
PDF
Introduction IDS
PPTX
Software Security
PPT
Ch1 cse
Understanding the need for security measures
Cryptography and Network Security # Lecture 2
Industry Best Practice against DDoS Attacks
Ethical Hacker
Security Basics
5 Security Tips to Protect Your Login Credentials and More
Irm 5-malicious networkbehaviour
Introduction to Network Security
Prevention is not enough
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Data Security
Network Security Topic 1 intro
CNIT 123: Ch 3: Network and Computer Attacks
Data protection and security
Cs8792 cns - unit v
Basic Security Concepts of Computer
Introduction IDS
Software Security
Ch1 cse
Ad

Viewers also liked (6)

PPT
Latihan7 comp-forensic-bab6
PPT
Latihan 1 computer forensic
PPT
Latihan8 comp-forensic-bab5
PPT
Latihan9 comp-forensic-bab6
PPT
Kasus cybercrime
PPT
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
Latihan 1 computer forensic
Latihan8 comp-forensic-bab5
Latihan9 comp-forensic-bab6
Kasus cybercrime
Latihan7 comp-forensic-bab6
Ad

Similar to Latihan6 comp-forensic-bab5 (20)

PDF
CNIT 50: 9. NSM Operations
PPT
Computer Security ch18 ppt and pentesting
PPTX
Introduction to Cyber Forensics Module 1
PPTX
Threats and vulnerability , a danger to our valuable data and information.pptx
PPTX
Lec 1- Intro to cyber security and recommendations
PPT
css ppt.ppt
PDF
Computer security
PDF
File000119
PPTX
Security and control in mis
PPTX
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
PPTX
Network security and firewalls
PPTX
Lecture 5.1.pptx
PPTX
BAIT1003 Chapter 11
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Lecture 3 security threats in data analysis.pptx
PPTX
3-UnitV_security.pptx
PPTX
Cyber security for business
PDF
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
PPTX
9 - Security
CNIT 50: 9. NSM Operations
Computer Security ch18 ppt and pentesting
Introduction to Cyber Forensics Module 1
Threats and vulnerability , a danger to our valuable data and information.pptx
Lec 1- Intro to cyber security and recommendations
css ppt.ppt
Computer security
File000119
Security and control in mis
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Network security and firewalls
Lecture 5.1.pptx
BAIT1003 Chapter 11
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Cyber Security Awareness Session for Executives and Non-IT professionals
Lecture 3 security threats in data analysis.pptx
3-UnitV_security.pptx
Cyber security for business
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
9 - Security

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Cloud computing and distributed systems.
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
sap open course for s4hana steps from ECC to s4
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Approach and Philosophy of On baking technology

Latihan6 comp-forensic-bab5

  • 2. Introduction to Incident Handling An incident is an event or set of events that threatens the security of computing systems and networks. It includes system crashes, packet flooding, and unauthorized use of another user’s account.
  • 3. Types of Incidents Incidents can be classified as one or more of the following: • Repudiation • Reconnaissance attack • Harassment • Extortion • Pornography trafficking • Organized crime activity • Subversion • Hoax • Caveat
  • 4. Security Incidents A security incident includes the following: • Evidence of data tampering • Unauthorized access or attempts at unauthorized access from internal and external sources • Threats and attacks by an electronic medium • Defaced Web pages • Detection of some unusual activity, such as possibly malicious code or modified traffic patterns
  • 5. Security Incidents • Denial-of-service attacks • Other malicious attacks, such as virus attacks, that damage the servers or workstations • Other types of incidents that weaken the trust and confidence in information technology systems
  • 6. Category of Incidents: Mid Level • Unfriendly employee termination • Violation of special or privileged access to a computer or any computing facility that would normally only be accessible to administrators • Illegal access of the network • Unauthorized storing or processing of data • Destruction of property worth less than $100,000 • Personal theft of an amount less than $100,000 • Presence of computer virus or worm of higher intensity
  • 7. Category of Incidents: High Level • Suspected computer break-in • Denial-of-service attacks • The presence of a harmful virus or worm, which can lead to serious corruption or loss of data • Changes in hardware, software, and firmware without authentication • Destruction of property worth more than $100,000 • Theft worth more than $100,000 • Child pornography • Gambling • Illegal downloads of copyrighted material, including music, videos, and software • Other illegal file downloads • Any violations of the law
  • 8. How to Identify an Incident • Suspicious log entries • System alarms from the IDS • Presence of unexplained user accounts on the network • Presence of suspicious files or unknown file extensions on the system • Modified files or folders • Unusual services running or ports opened • Unusual system behavior • Changed drive icons • Drives not accessible • More packets received than expected
  • 9. How to Prevent an Incident • Scanning • Auditing • Detecting intrusions • Establishing defense-in-depth • Securing clients for remote users
  • 10. Incident Management - Threat Analysis and Assessment - Vulnerability Analysis - Estimating the Cost of an Incident - Change Control
  • 11. Incident Reporting - Computer Incident Reporting - Where to Report an Incident - Report a Privacy or Security Violation - Preliminary Information Security Incident Reporting Form - Why Organizations Do Not Report Computer Crimes
  • 12. Incident Response - Identification of Affected Resources - Incident Assessment - Assignment of Event Identity and Severity Level - Assignment of Incident Task Force Members - Containing Threats - Evidence Collection - Forensic Analysis - Security Incident Response - Incident Response Policy - Computer Security Incident Response Team (CSIRT) - Incident Response Checklist - Response Handling Roles - Contingency Planning - Budget/Resource Allocation
  • 13. Incident Handling Procedure for Incident Handling: 1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Follow-up
  • 14. CSIRT A computer security incident response team (CSIRT) is trained in dealing with security matters related to intrusions and incidents. The team secures networks from foreign attacks.
  • 15. Types of Incidents and Levels of Support • Type and severity of the incident or issue • Type of client • Size of the user community affected • Available resources
  • 16. Incident-Specific Procedures Virus and Worm Incidents 1. Isolate the system. 2. Notify the appropriate authorities. 3. Identify the problem. 4. Contain the virus or worm. 5. Inoculate the systems. 6. Return to a normal operating mode. 7. Perform a follow-up analysis.
  • 17. Incident-Specific Procedures Hacker Incidents 1. Identify the problem. 2. Notify the appropriate authorities. 3. Identify the hacker. 4. Notify CERT. 5. Perform a follow-up analysis.
  • 18. Steps for Creating a CSIRT 1. Obtain Management’s Support and Buy-In 2. Determine the CSIRT Development Strategic Plan 3. Gather Relevant Information 4. Design the CSIRT Vision 5. Communicate the CSIRT Vision 6. Begin CSIRT Implementation 7. Announce the CSIRT
  • 19. World CERTs - APCERT (Asia Pacific Computer Emergency Response Team) - AusCERT (Australia Computer Emergency Response Team) - HKCERT (Hong Kong Computer Emergency Response Team Coordination Center) - JPCERT/CC (Japan Computer Emergency Response Team/Coordination Center) - MyCERT (Malaysian Computer Emergency Response Team - PakCERT (Pakistan Computer Emergency Response Team) - SingCERT (Singapore Computer Emergency Response Team - TWCERT/CC (Taiwan Computer Emergency Response Team/Coordination Center) - CNCERT/CC (China Computer Emergency Response Team/Coordination Center)