Vous êtes sur la page 1sur 4

SCENARIO 10: PEER-TO-PEER FILE SHARING

IT GOVERNANCE
Expositor: Osvaldo Hernndez Morales

GENERAL INFORMATION
The organization prohibits the use of peer-to-peer file sharing services. The organizations network intrusion
detection sensors have signatures enabled that can detect the usage of several popular peer-to-peer file
sharing services. On a Monday evening, an intrusion detection analyst notices that several files sharing
alerts have occurred during the past three hours, all involving the same internal IP address.

Preparation

1. Would the organization consider this activity to be an incident? If so, which of the
organizations policies does this activity violate?

Yes, because it is considering as a computer security incident, according with


the FISMA suggestion the attack vector is an improper usage of the network
resources.

2. What measures are in place to attempt to prevent this type of incident from occurring
or to limit its impact?

Use packet sniffers and protocol analyzers to capture and analyze network
traffic, like Wireshark that can be implemented with low cost in Linux
systems.

Use laptops for that activities such as analyzing data, sniffing packets, and
writing reports

The network perimeter should be configured to deny all activity that is not
expressly permitted. This includes securing all connection points, such as
virtual private networks (VPNs) and dedicated connections to other
organizations.

The users need to know how their actions could affect the organization (e.g.
the use of applications like Bit torrent and Popcorn time).

Detection and Analysis

1. What precursors of the incident, if any, might the organization detect? Would any
precursors cause the organization to take action before the incident occurred?

A possible clue to what could be a peer-to-peer connection, is the installation


of a commonly programs like Tor, Skype, Bit Torrent, Popcorn time, an Internet

1
Television Network, this could be monitored by a program that send alert to an
administrator when those application are installed.

2. What indicators of the incident might the organization detect? Which indicators
would cause someone to think that an incident might have occurred?

A network intrusion detection sensor that alerts when a peer-to-peer connection


is opened.

3. What additional tools might be needed to detect this particular incident?

Users, system administrators, network administrators, security staff,


and others from within the organization may report signs of incidents.

4. How would the incident response team analyze and validate this incident? What
personnel would be involved in the analysis and validation process?

It is necessary to include in the team technicians trained in computer


networks and possibly a network engineer who is able to identify the
specific service that made the connection.

5. To which people and groups within the organization would the team report the
incident?

CIO

Head of information security

Legal department (if important documents was involved)

6. How would the team prioritize the handling of this incident?

Using the Information Impact Categories:

None: No information was exfiltrated, changed, deleted, or


otherwise compromised

Privacy Breach: Sensitive personally identifiable information


(PII) of taxpayers, employees, beneficiaries, etc. was accessed
or exfiltrated

Proprietary Breach: Unclassified proprietary information, such


as protected critical infrastructure information (PCII), was
accessed or exfiltrated

Integrity Loss: Sensitive or proprietary information was


changed or deleted.

Containment, Eradication, and Recovery

1. What strategy should the organization take to contain the incident? Why is this
strategy preferable to others?

2
Verify the type of information that was shared.

Make a log of the incident with de local system registry or with the network
devices.

Check de services, and determine if the peer-to-peer service is close or


still closed.

Time and resources needed to implement the strategy

Make a solution check to redirect the attacker to a sandbox with the same
service.

2. What could happen if the incident were not contained?

More information can be disseminated.

3. What additional tools might be needed to respond to this particular incident?

Tool like PeerGuardian is a software designed to protect the user


from the dangers of P2P networks, their job is to filter the
connections of those dangerous users (eg spammers, scammers,
etc.)

It is important to configure a firewall to avoid intrusion problems,


the windows firewall is not a very good option (although it is better
than nothing), a good recommendation is COMODO personal
firewall or Kerio Firewall.

4. Which personnel would be involved in the containment, eradication, and/or recovery


processes?

Technicians of networks, people who use the equipment to which the


IP address corresponds, and in charge of systems or computer
security.

5. What sources of evidence, if any, should the organization acquire? How would the
evidence be acquired? Where would it be stored? How long should it be retained?

Total amount of labor spent working on the incident.

Elapsed time from the beginning of the incident to incident discovery,


to the initial impact assessment, and to each stage of the incident
handling process (e.g., containment, recovery).

How long it took the incident response team to respond to the initial
report of the incident.

How long it took to report the incident to management and, if


necessary, appropriate external entities.

Reviewing logs, forms, reports, and other incident documentation for


adherence to established incident response policies and procedures

3
Identifying which precursors and indicators of the incident were
recorded to determine how effectively the incident was logged and
identified

Determining if the incident caused damage before it was detected

Post-Incident Activity

1. Who would attend the lessons learned meeting regarding this incident? What could
happen if the incident were not contained?

2. What could be done to prevent similar incidents from occurring in the future?

3. What could be done to improve detection of similar incidents?

General Questions

1. How many incident response team members would participate in handling this
incident?

2. Besides the incident response team, what groups within the organization would be
involved in handling this incident?

3. To which external parties would the team report the incident? When would each
report occur? How would each report be made? What information would you report
or not report, and why?

4. What other communications with external parties may occur?

5. What tools and resources would the team use in handling this incident?

6. What aspects of the handling would have been different if the incident had occurred
at a different day and time (on-hours versus off-hours)?

7. What aspects of the handling would have been different if the incident had occurred
at a different physical location (onsite versus offsite)?

Scenario Questions

1. What factors should be used to prioritize the handling of this incident (e.g., the
apparent content of the files that are being shared)?

2. What privacy considerations may impact the handling of this incident?

3. How would the handling of this incident differ if the computer performing peer-to-
peer file sharing also contains sensitive personally identifiable information?

Vous aimerez peut-être aussi