Netsec – Telegram
Netsec
7.39K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Forensic Readiness: Setting the Foundation for Cybersecurity
I’ve been involved in addressing many different cyberattacks in 2017 and early 2018, with some attacks being more successful than others. My involvement was usually in identifying the nature of the attack in a post mortem fashion or thwarting the advancement of an attack in progress. One common thread among all of them was the lack of forensic readiness by the organization that was attacked. So, what exactly is forensic readiness? Most organizations deploy some advanced hardware at the perimeter (such as firewall/application proxy) to control North-South traffic that is either generated from the local network heading to the Internet or vice versa. Other organizations adopt a more advanced model of installing an additional Intrusion Detection System on the network that monitors East-West traffic (traffic that moves between the users, servers, storage etc.). A logging system is installed to capture the events and then the assumption is that we can defend this echo system successfully. The reality, as many of you reading this blog understand, is that this type of installation is typical but inadequate. If something were to happen (user account hacked, USB device, malware traversing an email file or someone gaining access to a cloud tenancy, etc.), the logs provided by the firewall and the IDS device would not be sufficient to ascertain what happened let alone attempt to prosecute the case if the business was harmed. I’m going to walk you through some of the changes that I think are necessary for a strong foundation in cyber security and pertain only to the data collection portion of the forensic process. Identifying Sources of Data: • Local equipment such as firewalls, servers, local Active Directory controllers, wireless devices, etc. • Remote equipment: Similar to above but residing in a different location such as remote offices and data centers • Cloud providers: O365, Azure, AWS, Google, and other hosting providers whether hosting Infrastructure or Application as a Service Acquiring the data: • Set up an NTP server to synchronize all devices to ensure that incoming data has proper timing (for correlation purposes) • Configure the sources to send the logs to a centralized SIEM (Security Information and Event Management) system such as Splunk or AlienVault • Configure the sources to have the necessary settings for the logs in order to sufficiently identify an attack and/or present enough evidence to allow prosecution • Configure the cloud tenancies to adequately collect and forward the logs to the SIEM • Install Intrusion Detection Systems/Capabilities on your VPN tunnels and any other external connector with a partner or client and ensure that proper logging is enabled and forwarding to your SIEM Although data collection is a sub section of forensic readiness, it cannot be underestimated because in every incident I have participated in, the logs pertaining to the attack were never sufficient. Please feel free to comment on this blog and or contact me at uhoulila@crossrealms.com. Be on the lookout for my upcoming forensic toolkit, which addresses forensic readiness more comprehensively.

Submitted February 13, 2018 at 03:14AM by houlila
via reddit http://ift.tt/2G89q5Z
A safe os for daily use and crypto assets
Hi y'all, anybody here loving the DLT space? I do, it's exciting.Anyway, i'm running windows 10 on my PC and i've had it with this OS. Got weirdness going on every now and then and been trying to find those damn viruses or other malware, too scared to use my wallets, i need a better OS. I have just once tried Tails for a few days, besides that only windows.It's my daily PC that i use for browsing/watching/trading etc. I also want to run a Bitcoin lightning node if that is profitable AND mine anything profitable and popular. Specs: intel g3258 3.2ghz 4gb ram 120gb ssd 1tb hdd A single Ati 280x tri-xI've just had a look at linux Manjaro KDE from a usb stick, surprised that it looks and feels nice! I dont know if it has good enough safety and if it is suitable for running a lightning node/mining/keeping wallets/trading..When it comes to safety i'm new to most of the things i've read about such as tor, php, deep packet inspection, vpn and whatever else could work. But that's what i want and need with all the scamming in the cryptospace, sufficient safety.

Submitted February 13, 2018 at 04:10AM by Cryptocats2point0
via reddit http://ift.tt/2EnZZ6a