pace it - prohibited content and activity

12
Dealing with prohibited content or activity.

Upload: pace-it-at-edmonds-community-college

Post on 09-Aug-2015

14 views

Category:

Education


1 download

TRANSCRIPT

Dealing with prohibited content or activity.

Page 2

Instructor, PACE-IT Program – Edmonds Community College

Areas of Expertise Industry Certifications

PC Hardware

Network Administration

IT Project Management

Network Design

User Training

IT Troubleshooting

Qualifications Summary

Education

M.B.A., IT Management, Western Governor’s University

B.S., IT Security, Western Governor’s University

Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions.

Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.

Brian K. Ferrill, M.B.A.

Page 3

Dealing with prohibited content or activity.PACE-IT.

– First response.

– Documentation.

– Chain of custody.

Page 4

First response.Dealing with prohibited content or activity.

Page 5

Prohibited content or activity can be anything that is against the law or is restricted by company policy.

Unauthorized programs being installed, additional drives being added, virus activity and other malware, unauthorized access, and viewing proscribed content can all be deemed as either prohibited content or activities. As an IT professional, it is your responsibility to know your organization’s IT acceptable use and security policies.

First response.Dealing with prohibited content or activity.

Page 6

First response.Dealing with prohibited content or activity.

– Identify.» Recognize the activity or content is either unauthorized

or illegal.• Know your organization’s acceptable use and security

policies.» If it is against policy, it is a security incident by

definition.

– Report through the proper channels.

» If it is clearly illegal, the obligation is to report not only through the chain of command but also to the proper authorities.

» To not report is to become an accessory.» Follow the proper procedures for reporting.

• Know your organization’s security policies.

– Data and services preservation.» All data and services need to be preserved as evidence.» Often, the best approach is to not touch and to restrict

access.» Turning off or using the keyboard can destroy evidence.» If required to stop a virus or malware attack, unplug the

network cable only.

Page 7

Documentation.Dealing with prohibited content or activity.

Page 8

Documentation.Dealing with prohibited content or activity.

– Proper documentation is vital.» Use the appropriate documentation form.

• Know your organization’s acceptable use and security policies.

» As a first responder, your observations can be key evidence; document them thoroughly.

» Interview and document the responses of other people involved.

» Documentation can be used as evidence.• Chain of custody documentation is vital.

» Properly documenting an incident can lead to improved future responses.

– Document any changes.» Document any steps that have been taken to reduce

security risks.• Remember that any changes to the system may alter

the evidence.• Remember to preserve the situation to as close to

how it was found as possible.

Page 9

Documentation.Dealing with prohibited content or activity.

– Chain of custody.» Chain of custody logs establish control of the

evidence.» Chain of custody logs show who has and when

they have had access to the evidence.• Chain of custody logs in themselves are also

evidence as they verify that what is presented in court is the same as what was collected.

• An improper chain of custody can negate any evidence that has been collected.

– Protecting evidence.» Restrict physical access to the systems involved.» Never power down; the contents of RAM can be

recovered with specialized tools, but it is volatile.» If anything is changed, evidence may be lost; do

not access files (the attributes will be changed and evidence will be lost).

» Secure the evidence.• Create a solid chain of custody.

Page 10

What was covered.Dealing with prohibited content or activity.

Know your organization’s acceptable use and security policies. Be able to identify prohibited content or activity. Report incidents through the proper channels. Practice data and services preservation techniques: restrict access to the affected system; don’t use the system; and, if necessary to stop an ongoing virus or network attack, only unplug the network cable.

Topic

First response.

Summary

Proper documentation is vital. It can provide key evidence in any legal proceedings. A chain of custody document will be vital in proving who had access to the affected systems and the collected evidence. Document any changes that have occurred. Protect the evidence by: restricting access to the systems, not powering the system down, and securing the evidence by creating a solid chain of custody.

Documentation.

Page 11

THANK YOU!

This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53.

PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.