427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet337/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   333   334   335   336   337   338   339   340   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
Intelligence Resources • Chapter 11
409
427_Botnet_11.qxd 1/9/07 9:56 AM Page 409


your organization from wanting a police presence, but catching the botherder
or hacker who attacked your network will prevent further attacks in the
future.
Preserving evidence of the attack is essential to a successful investigation.
Keeping the server up and running is a goal of IT staff, while keeping evi-
dence intact is the goal of an investigation. Specialists in law enforcement may
request computers aren’t touched until they are analyzed.To avoid modifying
any of the contents of the drive, it may be necessary to remove the drives of
any systems that were affected by the attack, which may contain the bot or
other related files (such as pirated software, movies, or other items stored on
the drive). As mentioned previously, the hard drive may be required as evi-
dence if law enforcement is contacted. Once the hard drive is removed,
replace it with a clean version of the drive that doesn’t contain the bot.This
may involve restoring information to the drive from a backup, or making a
copy of the existing drive and removing the botnet and restoring any items it
may have altered (such as registry entries). If your organization is the victim
of a DoS attack, such actions would be overkill, as you would only need to
gather log files, router statistics, and other samples of the network traffic
during the attack. In any situation, however, it is vital that you provide law
enforcement with as much access as they require, even if it is supervised by a
member of your IT staff. If there is information that will require warrants or a
subpoena to release, you should try to identify it early, so the investigators can
obtain them early.
It is also important to remember that the first officers to respond to an
incident may not necessarily be the ones performing an investigation. When a
call is made to police, an officer is sent to respond to the incident. If the inci-
dent requires special investigation skills, other units specializing in these areas
will be called. Most police departments in North America have a Technology
Crime Unit or a partnership with larger law enforcement organizations to
perform computer forensic investigations. In some cases, local police may refer
the case to federal law enforcement if it involves computers or suspects in
other states, provinces, or countries.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   333   334   335   336   337   338   339   340   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish