09 - Cybersecurity and Incident Response

Class: CYBR-405


Notes:

Module Objectives

By the end of this module, you should be able to:

Network High

07 - Inbox/Visual Aids/image-11.png505

Birth of TCP/IP

In the early 1970s, the U.S. Department of Defense funded a project through DARPA to solve this problem. Two researchers, Vint Cerf and Bob Kahn, were tasked with creating a protocol that could allow different networks to communicate with each other.

Transmission Control Protocol / Internet Protocol, or TCP/IP.

TCP/IP Continued

IP (Internet Protocol)

IP figures out where the data should go,
and TCP makes sure it actually gets there correctly.

TCP (Transmission Control Protocol)

Early Internet

07 - Inbox/Visual Aids/image-12.png400

Defense in Depth

"An approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information. If one mechanism fails, another steps up immediately to thwart an attack. This multi-layered approach with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors".

07 - Inbox/Visual Aids/image-13.png414
Notes:

"Hackers don't break in, they log in"

1. Stolen Credentials
2. Exploited Vulnerabilities

Notes:

Weakness

  1. The "castle approach" focuses defenses on external threats.
  2. Once inside, the only thing controlling movement is easily defeatable by changing roles (RBAC).
  3. An admin (role) can easily move laterally (spread) to other systems increasing the negative impact to the organization.
  4. The volume of different applications and frequency of different vulnerabilities (i.e. backdoors) makes it challenging to keep everything patched to stay ahead of our adversaries.

Notes:

Screenshot 2026-03-16 at 9.36.01 AM.png

Indicators of Compromise

How do you know when you are sick?
Fever
Feel Bad
Coughing
Tired
Throwing up
Upset Stomach
Cold Sweats
Etc.

How do you know when you got attackerd?

Anatomy of Cyber Attack

Reconnaissance
The threat actor uses the internet, social media, or other tools to discover likely attack courses.

Weaponization
Code and other tactics, techniques, and procedures are found or developed to exploit the target's vulnerabilities.

Delivery
Weaponized code is transmitted to the target.

Exploitation & Installation
The attacker uses the tactics to dismantle internal controls in the target to avoid detection.

Command & Control
This may Include screen capture, malwere execution, or spawning new Virtual opersing eystem environments.

Execution
This can include extraction or destruction of IT and OT assets, installation of ransomware, IP theft, etc-

Cyber Kill Chain

07 - Inbox/Visual Aids/image-14.png450

Digital Forensics

Who - who are the attackers?
What - what did they take?
When - when did they get in?
Where - where did they go?
Why - why me? (why did my controls fail)
How - how did they get in?

Today's Adversaries

Averages

00 - TAMU Brain/6th Semester (Spring 26)/CYBR-405/Visual Aids/image-1.png569

U.S. Losses due to Cybercrime

00 - TAMU Brain/6th Semester (Spring 26)/CYBR-405/Visual Aids/image-2.png569

Preparing the Investigation Team

Before initiating the search:

Goal of scene processing

Digital evidence is volatile

Slow response can cause digital evidence to be lost
Time to prepare is before you get the call!

Determining the Tools You Need

My Teams

Documenting Evidence

Create or use an evidence custody form

An evidence custody form serves the following functions:

Notes:

Incident Response Life Cycle

00 - TAMU Brain/6th Semester (Spring 26)/CYBR-405/Visual Aids/image-3.png440

Notes:

Preparation (Prevention)

Always have in your backpack:

Exercise

Stage 1 - Preparation

Incident Handler Communications and Facilities:

Incident Analysis Hardware and Software:

Incident Analysis Resources:

Incident Mitigation Software:

Many incident response teams create a jump kit, which is a portable case that contains materials that may be needed during an investigation. The jump kit should be ready to go at all times. Jump kits contain many of the same items listed in the bulleted lists above. For example, each jump kit typically includes a laptop, loaded with appropriate software (e.g., packet sniffers, digital forensics). Other important materials include backup devices, blank media, and basic networking equipment and cables. Because the purpose of having a jump kit is to facilitate faster responses, the team should avoid borrowing items from the jump kit.

Each incident handler should have access to at least two computing devices (e.g., laptops). One, such as the one from the jump kit, should be used to perform packet sniffing, malware analysis, and all other actions that risk contaminating the laptop that performs them. This laptop should be scrubbed and all software reinstalled before it is used for another incident. Note that because this laptop is special purpose, it is likely to use software other than the standard enterprise tools and configurations, and whenever possible the incident handlers should be allowed to specify basic technical requirements for these specialpurpose investigative laptops. In addition to an investigative laptop, each incident handler should also have a standard laptop, smart phone, or other computing device for writing reports, reading email, and performing other duties unrelated to the hands-on incident analysis.

Exercises involving simulated incidents can also be very useful for preparing staff for incident handling; see NIST SP 800-84 for more information on exercises 23 and Appendix A for sample exercise scenarios.

Stage 2 - Detection and Analysis

An incident is something we need to respond to, while an event is just an occurrence

Stage 3 - Containment

Malware us spreading across the network

Stage 4 - Eradication and Recovery

The malware has been removed

Stafe 5 - Post-Incident Activity

What document should the team produce after the incident

The problem we have in America is that 60% of our GDP is because of small businesses. A small business can't handle this, none of this. Small manufactures