Organizations' security breaches and cyberattacks must be identified and resolved via computer incident investigations. These investigations must be done properly to be lawful, ethical, and effective. To ensure the inquiry is legal and does not violate privacy rights, relevant laws and professional procedures must be used. To succeed, an investigation must grasp the methods, personnel, and instruments of planned and organized big event investigations. Analyzing how evidence is held, evaluated, processed, and deployed in a big cyber-related investigation is crucial to ensuring court admissibility. This paper discusses computer incident investigations, including the people, structures, processes, and tools used in incident response, the roles of a Computer Emergency Response Team (CERT), and the standards, protocols, and concepts underlying business continuity, disaster recovery, and crisis management. The study also addresses how applicable laws and professional standards are applied to computer incident investigations and the methods, people, and technologies employed in a planned and organized significant incident investigation. This paper's findings are crucial for incident response, forensic investigation, and law enforcement.
Task 1
Security analysts, incident response teams, forensic investigators, IT personnel, legal counsel, and management may all play a role in the incident response process. When an event occurs, everyone involved must fulfill a certain function (Boeke, 2018). Network and system monitors may fall under the purview of security analysts, while forensic investigators may be tasked with delving further into occurrences to determine their root cause.
Because of the complexity of responding to an incident, having clear structures in place is crucial. Plans, rules, procedures, and guidelines may all be part of a formalized approach to handling incidents. In the case of a security breach, the incident response plan details the actions to be taken. The incident response plan lays out who is responsible for what, how they'll do it, what resources they'll have access to, and how they'll get the word out.
Incident response processes are crucial because they offer a methodical way to detect, investigate, and fix security breaches. Steps like "prepare," "identify," "contain," "investigate," and "recover" are common in incident response protocols. Several actions are taken at each stage to assist pinpoint the problem and lessen its impact. The goal of the containment procedure, for example, is to stop the incident from spreading to other systems.
Since tools help with both detection and containment, tools play a crucial role in incident response. Tools like network scanners, intrusion detection systems, forensic analysis programs, and malware analysis utilities may fall into this category. With the help of network monitoring technologies, security analysts can keep tabs on all network activity and quickly spot any signs of malicious intent. Systems and applications may be scanned for security flaws using vulnerability scanners, and intrusions can be detected with intrusion detection systems. Malware analysis tools evaluate the behavior of malicious software, whereas forensic analysis tools gather and examine data from impacted systems to pinpoint the origin of the event.
Some of the most crucial roles in a CERT and why they're so crucial are as follows:
Task 2
BC : The goal of business continuity (BC) planning is to keep critical company processes running smoothly in the face of an interruption. It entails making preparations for the continuity of essential business activities and putting those preparations into action.
DR: Restoring information technology (IT) systems and infrastructure to working order after a disaster is known as disaster recovery (DR). Data, programs, and infrastructure that have been lost or compromised as a result of a catastrophe or other occurrence must be recovered.
CM : Managing a crisis such that it has little effect on an organization is the goal of Crisis Management (CM). Organizational crisis management is the process of creating and enforcing strategies and protocols for dealing with unexpected events.
Continuity of operations (COOP), recovery from disaster (DR), and crisis management (CM) are all essential parts of a comprehensive approach to mitigating risk. An organization's ability to execute BC, DR, and CM strategies depends on its familiarity with the underlying standards, protocols, and concepts.
Requirements for a business continuity management system are outlined in ISO 22301, a standard that has gained widespread recognition (BCMS) (Arianto & Anggraini, (2019). To ensure that a company can effectively plan for, react to, and recover from disruptive situations, this document outlines best practices for creating, implementing, maintaining, and improving a business continuity management system (BCMS) (Nyre-Yu et al, 2019). Organizations may guarantee that their BC strategies are thorough, strong, and efficient if they follow this guideline.
Another well-known standard that offers guidance on creating BC and DR strategies for IT is NIST SP 800-34. Key processes in developing a contingency plan are outlined in this standard, including determining the scope of the plan, conducting a business impact analysis (BIA), determining recovery measures, and performing frequent tests and updates.
It is a framework for corporate IT governance that helps with things like business continuity, disaster recovery, and configuration management. The framework highlights the necessity for continuous development and the significance of matching these plans with the overarching aims of the company.
Another essential part of a business's BC, DR, and CM policies is the Incident Response Plan (IRP). The IRP details the actions to be done in the case of a security incident, such as the composition of the incident response team, the methods to be used, and the channels via which information will be disseminated. With a solid IRP in place, businesses can swiftly recover from security breaches with little disruption.
It is a crucial part of any business continuity (BC) or disaster recovery (DR) strategy. It helps businesses in determining which operations are crucial and how many interruptions each may cause. By assessing their unique vulnerabilities and threats, businesses are better able to use their limited resources effectively.
Two crucial metrics utilized in DR planning are the Recovery Time Objective (RTO) and the Recovery Point Objective (RPO). The Recovery Time Objective measures how long it takes to get IT back up and running after an interruption, whereas the Recovery Point Objective measures how much data may be lost. Organizations may use these data to set recovery targets and devise plans to mitigate the effects of disruptions.
Task 3
In order to detect and respond to a big event in a timely and efficient way, it is necessary to conduct an investigation that is both planned and organized. Some of the most crucial parts are as follows:
The IRT may use a variety of technologies, including intrusion detection systems, antivirus software, and forensic analysis tools, to help with the identification, containment, and investigation of the event. Communication tools may also be used by the IRT to help team members and stakeholders work together.
Network traffic logs, system logs, user account information, and network settings are all valid types of evidence in a large cyber-related inquiry. It is crucial to secure and store the evidence so that it may be utilized in court if required without tampering with its integrity.
To guarantee its admissibility in court, the evidence must first be properly identified and collected using forensic techniques (Settanni et al, 2017). This requires the use of specific tools and methods that do not impact the integrity of the original evidence.
As evidence is gathered, it is investigated using methods like digital forensics to determine what caused the event and what signs of the breach were there (Kitchin & Dodge, 2019). This may require evaluating user account information or network traffic records in search of suspicious behavior.
The evidence is then analyzed and compiled into a chronology and a comprehensive picture of the incident's effects. If required, this data will be shared with law police to aid with their investigation and cleanup efforts.
At last, the evidence is used to back any disciplinary or legal action taken against individuals at fault. This might include submitting the material to a judge or utilizing it in an internal reprimand.
Task 4
To guarantee that a computer incident investigation is handled lawfully, ethically, and successfully, it is crucial to follow applicable laws and professional standards. The following are some examples of legislation and professional standards that are relevant to computer incident investigations:
In conclusion, for a computer incident investigation to be lawful, ethical, and productive, investigators must follow applicable laws and professional standards. Data protection regulations, computer abuse and cybercrime legislation, professional standards, a chain of custody processes, usage of forensic technologies, and judicial procedures must all be followed.
This paper delves into the many facets of computer incident investigations, which are crucial to finding and fixing security lapses and cyberattacks inside a business. Business continuity, catastrophe recovery, and crisis management are all discussed in depth, as are the people, structures, procedures, and technologies involved in incident response, as well as the various responsibilities within a Computer Emergency Response Team (CERT). The article also looks at how applicable legislation and professional standards are applied to computer incident investigations, as well as the procedures, personnel, and technologies employed in a planned and organized significant incident investigation.
The study concludes by stressing the need for incident response teams to conduct investigations in accordance with applicable laws and professional norms to guarantee that they are doing so in a way that is legal, ethical, and fruitful. The report stresses the need of preserving the chain of custody, use reliable forensic equipment, and adhere to established protocols when presenting evidence in court. To perform computer incident investigations promptly and successfully, the information in this paper is crucial for businesses and people engaged in incident response, forensic investigation, and law enforcement.
Boeke, S., 2018. National cyber crisis management: Different European approaches. Governance , 31 (3), pp.449-464.
Tanczer, L.M., Brass, I. and Carr, M., 2018. CSIRT s and global cybersecurity: How technical experts support science diplomacy. Global policy , 9 , pp.60-66.
Arianto, A.R. and Anggraini, G., 2019. BUILDING INDONESIA’S NATIONAL CYBER DEFENSE AND SECURITY TO FACE THE GLOBAL CYBER THREATS THROUGH INDONESIA SECURITY INCIDENT RESPONSE TEAM ON INTERNET INFRASTRUCTURE (ID-SIRTII). Jurnal Pertahanan & Bela Negara| April , 9 (1).
Nyre-Yu, M., Gutzwiller, R.S. and Caldwell, B.S., 2019, November. Observing cyber security incident response: qualitative themes from field research. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 63, No. 1, pp. 437-441). Sage CA: Los Angeles, CA: SAGE Publications.
Settanni, G., Shovgenya, Y., Skopik, F., Graf, R., Wurzenberger, M. and Fiedler, R., 2017, June. Acquiring cyber threat intelligence through security information correlation. In 2017 3rd IEEE International Conference on Cybernetics (CYBCONF) (pp. 1-7). IEEE.
Kitchin, R. and Dodge, M., 2019. The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. Journal of urban technology , 26 (2), pp.47-65.
You Might Also Like:-
Computer Science Homework Help
What Are the Key Components of Enterprise Systems Architecture?
1,212,718Orders
4.9/5Rating
5,063Experts
Turnitin Report
$10.00Proofreading and Editing
$9.00Per PageConsultation with Expert
$35.00Per HourLive Session 1-on-1
$40.00Per 30 min.Quality Check
$25.00Total
FreeGet
500 Words Free
on your assignment today
Request Callback
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....
🚨Don't Leave Empty-Handed!🚨
Snag a Sweet 70% OFF on Your Assignments! 📚💡
Grab it while it's hot!🔥
Claim Your DiscountHurry, Offer Expires Soon 🚀🚀