Free Essay

Fxt2 Task 2

In:

Submitted By gdean47901
Words 2778
Pages 12
-Describe the nature of the event:
A highly technical interference was discovered in the organization's financial reports that rounds off several stealthy methods which puts the company at great risk. This discovery was as a result of an audit carried out by professionals on a routine basis. They noticed that many paychecks which had been doctored were made to a particular person. In a bid to notify the right personnel through mail, the mails were intercepted and fraudulent communications were between the auditor and the attacker. Through this the attacker then gained access to a lot of financial records and altered them; adding the name of the president and that of others in order to deduct money from theirs to add to their own paycheck. However the IT personnel was able to dictate that an internal system had done a middle man attack through an internal internet Protocol address, whereby all traffic meant for a particular location was sent to another system unknowingly. The suspect didn't have the right access control central reporting systems, authentication controls, and a lack of host based intrusion prevention systems.
These controls and systems are actually meant to act as guide against this kind of attack and save the company several hours of labor costs.

-Who should be notified?
In cases like this, the top hierarchy should be alerted and kept informed of the casewhen any move is made becauseeverything stops at their table. The Computer Emergency Response Team or the Emergency Management Team should also be informed. They have the expertise to deal with s cases like this and have knowledge the right processes and procedures needed in locating the cause, the immediate response needed, and analyze thelessons the case has brought up in report. Every company must have a Forensics Investigator (FI) full time or look for method to hire one. An FI has the expertise to review the systems used in the attack,regardless of sources or destinations, doing an in depth analysis of the image of the systems, label items, makes sure a chain of custody is completed correctly and use the right MD5 or SHA signatures required to guarantee that evidence is not altered in any way. This is vital when charging the suspect to court, if data is not collatedproperlythe evidence may be inadmissible in court and the suspect could go scot free.
The Damage Assessment Team should be informed to do an assessment and to access the usability of the equipment and network, as the suspect could have installed a logic bombs or inflicted damage than what was originally identified. The Recovery Coordination Team to ensure that internal alerts are done, and that activities and communications that happens between the right parties. The Corporate Communications Team will be required to guarantee the right message is sent to important stake holders of the company. The Site Restoration Team service might be required due to the equipment being confiscated during the duration of the investigation. More equipment may be required, because the FI will likely confiscate hardware because they would have to do a Forensics Analysis on the systems that were involved. The System Restoration Team should be in place to ensure that operating systems, software applications and databases will need to be restored and they will be vital in monitoring these operations at a different site if it is necessary. Also the coordination of acquiring, installation, and testing will need to occur with their supervision. The Technical Support Team will be needed to aid in the restoration of data communications, operating systems, applications and configurations. Human Resources Support Team, that includes legal counsel, they will need to be involved in case the company seeks to take the suspect to court. Lastly, external law enforcement agencies may be needed to assist in the investigation and the prosecution.
-Outline how the incident could be contained:
The bestmethod to contain this case is to make plans for its occurrence before hand. In some cases this means doing things that are not conventional and making plans for things that you might not envisage. Putting in place a well documented Emergency Response Plan will help to minimize the amount of time and the amount of damage that is inflicted on the systems affected. Also, an ERP will have developed the policies and procedures for containing the incident. A Crisis Management (CM) Team would put their efforts into reacting to critical situations, which in this case will entail reacting to the event and dealing with those systems affected by the event. Traditional CM encompasses Response, Tangible and Intangible situations, and Recovering from an event. CM members now place more emphasis on a few different aspects to include recovery management. In CM two activities are conducted, first facing the situation and second, dealing with the impacts of the crisis so that damage is reduced. Also, an effective Incident Management Plan will seek for ways to manage control activities of a crisis. The technical parts on containing the current crisis would include: when the issues is identifieda trouble ticket would have been designed and added into the central management system. Doing this would guarantee thatmonitoring and recording was done which could have stopped the email tampering that was carried out. Once a criminal activityisnoted a host based firewall rule must have been created to stop the computer from communicating with any other system, the suspects accounts must then locked, the release of PKI digital signatures must beinstalled to guarantee that the incessantpilfering and altering of emails are stopped. Isolation rules has to be installed on the switch from where the attack is coming from. All of these moves would have contained the suspect and stopmorefraud and loss from happening.
-Discuss how the factor that caused the incident could be removed:
Firtsly a host base security system and the applicarion of host based firewall could have stopped workstation to workstation communication which would thenstop the attacker from altering an internal workstation which was used for snooping. Also, using encryption from hosts such as a FIPS 140-2 compliant encryption would have stopped the suspect from double crossing information from clear text which they could dictate and alter. Furthermore, putting in place solid confirmation into human resource server could have stopped the attacker from gainingentry into the server. Plus, with the right access controls and Role Based access it would have mitigated the extent of damage caused. At best, the suspect would have been stopped as a resultof proper access controls and Role Based access, the suspect would have only inflicted minimal damage. Implementing VLAN centric firewalls or Intrusion Prevention System would have stopped the spoofing attack. Firewalls have the capability to stop systems aliento their networks from cloning internal addresses. Intrusion Prevention Systems also have certain pattern of detecting spoofing attacks as far as someone is checking those events if the suspect wasapprehended. PKI encryption and digital signatures implemented in email would have stooped the suspect from checkin and altering incoming and outgoing emails.
-Describe how the system could be restored to normal business practice:
In order to have a good restoration plan, funding and management support is needed. The recovery plan is importantin an insurance policy for a business, which needsfull attention and maintenance so as to guarantee that it is ready for use when it is called upon. The company could have also put in place a project team whose responsibility would be tocarry out testing of cases similar to the case they were compelled to handle, in other words they would have already created the right processes and ruleswhich is needed to start operations in the conventional manner. Restoration is a critical part of all recovery strategies; however there are many parts of the restoration program which can only be dictated when the entire extent of the event had been collated. There are many contingent plans that can be put in place which will greatly minimize the time and result of the attack. To participate in this they would have to get appropriatepersonnel in place to analyze the damage. With a good recovery assessment, decisions could be made on if personnel should be relocated or work in a different duty location. If the tools which was confiscated is of high value and can't be replaced immediately, the option of salvaging should be look into. Essentially, this is using what is at hand and making it work, until the right tools can be procured, delivered, tested and implemented. Also, the company could have contracted with a restoration company, who as expertise in restoring operations from disasters for a minimal retainer fee. The company would get its data on the server restored, if an effective backup plan is in place, which includes replication backups to a different site. This would help the company, once they salvaged parts together or were able purchase new equipment, to pull the data from their restoration site and have it put together in the new systems. During restoration, different teams have important roles that must be implemented. The Crisis Management Team can be asked to be part of the restoration process which may include external personnel. The Damage Assessment Team, during their preliminary assessment, would be the best people to provide the best feedback on the time required to recover. The Recovery Coordination Team would be called upon to guarantee orgainzation of all communications between users and technical personnel. The team would also have the duty of coordinating all recovery activities. Lastly, the Site Restoration Team would be included in the recovery process as they would ensure if any of the systems can be restored. Finally, a compilation of the lessons gotten from this procedure has to be put together to ensure that right after the event, all the different parts can be put together. This method would explain what the actual situation was and what systems was touched, the extent of the damage, and ways to stopsomething like this in the future.
- Explain how the system could be verified as operational:
The authorization needed to declare the network as operational once again, must include operational testing to guarantee the system's parts work as they usually do. Also, additional security has to be put in place to guarantee that the issue does not happen again. Anti-virus scans and must be put in place to dictate if the suspect fixed in any other malicious software in the company network, along with assessing all data related with the financial data to make sure all information no information was altered. Once data has been certified okay then the systems would have determined that it's no longer has malware or unauthorized entry points. The possible vulnerable points should also be looked into in the existing systems. Furthermore, an outsourced agency can be paid to do an assessment to check and identify vulnerable points which the internal bodies didn't dictate. Once this is done alongside a data integrity process and methods. Once the network has been tested and all the systems are up and running then it can be certified okay.
-Identify areas that were not addressed by the IT staff’s response to the incident
Different partswhich were not assessed in the IT staff’s response to the intrusion. The IT Staff’s incident response plan is basically included only as aquick fix, as it doesn't cover underlying faults that would have been included in their response. Also security controls could have been put in place to guarantee that an incident of a similar nature doesn't happen again.
. This includes carrying out a ticketing system through which personnel that dictate unusual activities could report such items. Depending on the kind and specifics provided, an incident response plan could have been put in place to hastenly track down the main cause of the incident and take needed actions to mitigate the damage. Additional process and procedures could be implemented within their response plan to make sure that the right teams and management are included in the response and recovery. Role Based Access controls could have been implemented to guarantee that only authorized personnel with the right credentials are able to implement the server. This would have mitigated the suspect’s capability to gain access the server without right credentials. Implementing an IDS in front of the server’s VLAN in promiscuous mode would have allow the company’s security team to detect in near real time any move to interfere with the system and the spoofing. Also, a Host Based IPs with the addition of a Host Based firewall would have been able to stop the interference. The addition of a firewall placed inthe VLAN would have been able stop the spoofing of systems on other VLANs from simulating that they were on the same network as the central system. ACL rules would have been able to stop the system from accessing the server from the system that it was hacked from. Mail security should have been put in place in the response plan to include the encryption and digital signing of emails. Lastly, creating a data of all traffic coming into and out of the server would have enabled the security team to dictate a new system accessing the server. No First Responders Evidence Disk (FRED) were done nor was Forensics personnel notified.
-compile the other attacks mentioned in this case that were not noticed by the organization. Describe the feature of the attacks not noticed by the organization
The first hacks were not dictated by the IT Staff, which inevitably led to the compromise and altering of accounts and paychecks, neither was the differencein the employee’s base salary or the president’s records dictatedquickly. It took an audit before it was identified. Had this been an external intruder the suspect would have gotten away with the crime. Furthermore no detection of the suspect moving around the system was detected or prevented which enabled them to locate where the data store on the system was. Lastly, act of Social Engineering that happened whereby the suspect communicated and deceived the auditor who believed they were authorized and required additional accesses into the system went undetected or stopped.
-Describe how these additional attacks can be prevented in the future
The first hacks could have been noticed and stooped had the IT Staff been trained in detecting intrusions and had implemented Network Based IDS’s and Host Based IPs. File Integrity Monitoring of the internal files could be done whereby any files modified or changed would be identified and reported on to a central location. Audits should also be carried out more often, as this would ensure that an “error” does not go on for days or months without ever being flagged. Doing audits more frequently, would have helped detect the suspect much sooner. Social Engineering detection and awareness program should be made available and compulsory. Had personnel been trained on the aspects of Social Engineering the auditor may have been able to detect that they were a target. Finally, using proper authentication before giving out additional access should be looked into, it could be a face to face authentication or additional identifiers that could have been asked to verify if the user are authentic.
- Recommend a recovery procedure to restore the computer systems back to their original state prior to such attacks
Having a well structured strategy which creates policy, guidance, process and procedures would aid in the quick restoration of the computer systems to their former state. Along with having the proper teams in place to ensure all key aspects of recovery and emergency response are don. Planning would help ease the recovery process by having simulated and exercised similar events. The steps of recovery could have been refined so that the recovery process is seamless. Definedmotives for each team are required so that there are no personnel over stepping into other department's boundaries. This could cause data to be convoluted and efforts duplicated. Personnel should also have defined roles and responsibilities to ensure the authorized steps are accomplished accurately and timely. Vulnerability scanning and Anti-Virus protection has to be done to ensure that all vulnerabilities are identified and re mediated would help in restoring the system to their original state. Finally, ensuring data replication was occurring from the main server to an off site server would allow the team, through logging, and forensics to identify when the intrusion originally happened. Having this data would have helped the Staff to pull the data from the backups up to the point from which the intrusion happened. This would help to ensure that not all data was lost and stored in evidence and would bring the systems backup to their former state.

Similar Documents

Premium Essay

Fxt2 Task 2

...A1. The Nature of the incident was that an employee was able to hack into the computer system and gain access to the financial payroll system, human resources and even email system. This employee used several methods in order to gain access into the system: IP spoofing, Data modification, Man in the middle attack and compromised-key attack. As a result the employee was able to tamper with payroll system. An auditor discovered the discrepancies and tried to make upper management aware of the situation through email, but the email was intercepted by the hacker. The hacker impersonated an employee and persuaded the auditor into granting him more access into the system which resulted in additional sabotage into the payroll system. Hacker tampered with more financial records. A2. Who needs to be notified? The first persons that need to be notified are IT department and financial department in order to verify and assess the magnitude of the intrusion. The Incident Response Plan must be follow in order to determine who will be the first people that should be contacted. They will then have a protocol on who they should contact which will most likely be upper management key members of the corporation which should be IT director, HR director, Legal director and security director. They will all follow the IRP (Incident Response Plan) for additional assistance. IT director should probably notify his network administrator, programmer and additional tech support in order to determine...

Words: 1826 - Pages: 8

Free Essay

Fxt2 Task 2

...-Describe the nature of the event: A sophisticated intrusion was detected in the company’s financial records that encompassed multiple stealthy tactics, leaving the company in a predicament they never would have imagined. A financial auditor performing their daily tasks identified an error within the company’s financial amounts. They identified that multiple paychecks with modified amounts were sent to an individual. In their attempts to notify appropriate personnel via email, the emails were sniffed; modified and fictitious communications were conducted between the auditor and the attacker. The attacker was then able to gain additional access into more financial records, whereby more modifications were conducted; to include the presidents and other’s salary and then took those deductions and added them to their paycheck. IT personnel were able to identify that an internal system was conducting a man-in-the-middle attack by spoofing an internal Internet Protocol address, whereby all traffic that was sent to a specific location was involuntarily sent to another system. The culprit was lack of access controls, central reporting systems, authentication controls, and a lack of host based intrusion prevention systems. These controls and systems would have prevented this type or at minimal detected this type of attack and could have saved the company many hours of labor costs. -Identify who needs to be notified based on the type and severity of the incident: In incidents such as...

Words: 2798 - Pages: 12

Premium Essay

Wgu Fxt2 Task 2

...SUBDOMAIN 427.1 ­ ENTERPRISE CONTINUITY PLANNING Competency 427.1.5: Responding to Attacks and Special Circumstances ­ The graduate identifies, evaluates, and applies network response procedures for attacks with special circumstances. Competency 427.1.7: Continued Assessments During a Disaster ­ The graduate assesses needs, threats, and solutions prior to and during a network disaster. Scenario: An employee hacked into the human resource records system at the employee’s place of business and changed the employee’s base salary rate to obtain a pay raise. The employee did this by spoofing an IP address in order to eavesdrop on the network. Once the employee identified where the data was stored and how to modify it, the employee made the changes and received two paychecks with the new amount. Fortunately, an auditor happened to discover the error. The auditor sent an e­mail to several individuals within the organization to let them know there was a potential problem with the employee’s paycheck. However, the employee was able to intercept the message and craft fake responses from the individuals the original e­mail was sent to. The employee and the auditor exchanged e­mails back and forth until the employee was soon given access permissions for some other financial records. With this new information, the employee was able to lower the salaries of the president of the company and several other employees and then to include the salary difference in the employee’s own paycheck. The...

Words: 667 - Pages: 3

Premium Essay

Data Protection

...FXT2 Task 2 Follow-Up re: Human Resources Data Modification 1. Identify areas that were not addressed by the IT staff’s response to the incident. Based on the narrative, the only corrective measure the company implemented was PKI. As noted in the original evaluation, several areas need to be addressed: * Climate/culture of the organization * Employee training for social engineering attacks * Positive identification of employees when granting role-based access * Vulnerabilities within and without the network, specifically to sniffers and eavesdropping * The ease with which the employee changed his pay rate, indicating a single system used for HR profiles rather than segregated duties & systems * The PKI that was installed only addressed the HR system, rather than the entire organization Honestly, the whole environment at this company needs a complete evaluation and overhaul! 2. Outline the other attacks mentioned in the scenario that were not noticed by the organization. * Social Engineering * Sniffing/Eavesdropping * Unauthorized Privilege Escalation * Network Penetration * Spoofing a. Describe the nature of the attacks not noticed by the organization. By “the nature of the attacks” I interpret this to mean the source of the attacks, or the skillset required to carry out the attacks. I believe this employee was tenured based on their ability to: * Hack into the HR system * Successfully intercept the email from...

Words: 801 - Pages: 4

Premium Essay

Fxt2-Task2

...ENTERPRISE CONTINUITY PLANNING Responding to Attacks and Special Circumstances Continued Assessments During a Disaster By Charles Paddock FXT2 – Task 2 November 5th, 2012 A. Perform a post event evaluation of how the organization’s IT staff responded to the attack described in the scenario by doing the following: 1. Describe the nature of the incident. The nature of the incident was that an internal employee successfully hacked into the human resources, payroll and electronic mail systems. The employee was then able to manipulate payroll data, intercept emails and impersonate staff through electronic means. There were a number of techniques used in this attack such as network eavesdropping, IP spoofing, social engineering, man in the middle, and escalation of access privileges. All of these types of attacks are consistent with an experienced hacker who knew what he was after. The incident was only discover because of an auditor reviewing the records and noticed the changes. When the auditor notified management of the discrepancies via email his emails were intercepted and the hacker negotiated higher access privileges by posing as management and IT Staff. 2. Identify who needs to be notified based on the type and severity of the incident. The first call should be to the Security and IT teams to secretly verify the attack and prevent further escalation. In the case where you believe we have been hacked and you do not know the extent of the...

Words: 1283 - Pages: 6

Premium Essay

Enterprise Continuity Planning

...------------------------------------------------- ENTERPRISE CONTINUITY PLANNING FXT2 TASK 2 November 10, 2015 chrystal kimbrough WGU November 10, 2015 chrystal kimbrough WGU EXPLANATION SUMMARY ENTERPRISE CONTINUITY PLANNING A company’s worst fear came to fruition when an employee hacked into his own records on the human resource system and was successful in modifying their own records. The employee gave himself an increase in pay by increase his base salary rate. The employee had success in performing this crime by spoofing an IP address, allowing their self the ability to eavesdrop on the network. By spoofing the specific IP address, the employee was able to find the location of the data and successfully modified it for their gain. After the fact, the employee received two paychecks containing the fraudulent salary. An auditor, who was effectively performing their job duties, became aware of the fraudulent acts of the employee, and thus sent an email to several pertinent individuals within the organization making them aware of the situation and that there is potentially a discretion with the employee’s paycheck. Probably on the “look-out” for reaction from their errant ways, the employee somehow was able to intercept the emails that were intended for the original recipients. The employee then created falsified responses, posing them to seem as if they were coming from the intended individuals that the original email was sent to. This exchange went on back and...

Words: 3197 - Pages: 13