-
Essay / Incident Response Containment Strategy
Table of ContentsSteps for responding to the incidentTypes of disasters, response, and recovery.Disaster recovery issuesSteps for responding to the incidentBuffer overflow is a vulnerability that has was first detected in the 1980s when Robert Morris created a worm that infected ten percent of the Internet in two days. The vulnerability concerns buffers which are the smallest memory locations for programs allowing direct access to write and read memory (Foster, 2005). A buffer overflow occurs when data to be stored in a particular buffer is overwritten in later spaces, causing the data to be overwritten or over-read. In our case, the Incident Response Strategic Decisions team discovered a potential worm that could compromise the security of Microsoft IIS servers. Our team must act quickly because the worm situation can get out of control in a very short time and the effects could be disastrous. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay First, the team must identify that the threat is real, which means we need to test it to determine the vulnerability. When reviewing the source code, we focus on areas that require access, modification, and buffer usage. For example, areas where input is provided by a user pose a potential stack overflow point because it is easy to exploit (McGraw, 2004). useful information? Please answer yes or no: »);gets (client_answer);}The code above asks the user a question and requests a yes or no answer. The user can enter "not really" forcing the program to crash instead of displaying an error message and asking the question again. Process flow diagram to determine which strategy to use. Process flow diagram to determine when to pass information to senior management. must be informed immediately that suspicions are confirmed because the potential threat could turn into disaster in moments. Disaster recovery process Types of disasters, response and recovery. Stack Attacks The smallest memory is a stack. The worm overloads the stack and tricks the program into opening malware it has stored elsewhere. The computer then implements what the code dictates. Heap attacks are associated with larger memory spaces such as those used to store images and text. Such an attack is difficult to implement for the attacker because the heap does not have direct access to the memory of the executable code. format, the code can be manipulated such that a buffer overflow is reached. disasters. Once we identify the problem, we identify the best strategy to solve it. Protection techniques can be classified into: Static – Provides correction to the software with tools such as STOBO and RATS (Viega, 2003). Dynamic - (hardware and software) monitors and protects data at the source or other end of an overflow Isolation - not run in stack memory and limit the space of a process. (using SPEF and sandboxing)Disaster Recovery IssuesThe main problem with disaster recovery is lack of preparation. Individuals and organizations should prepare for disasters by backing up cloud storage while using data duplication tools to reduce storage costs (Patterson, 2013). Keep in mind: this is just an example. Get now..