Class 4
Logs
Logs help understand and respond to system failures
They are crucial for detecting and responding to security threats
You can proactively search for advanced threats
You can maintain records for regulatory and compliance purposes as well
Logs types:
Application
Audit
Security
Server / Web server
System
Network
Database
Log2TimeLine
This tool can help colerate events from different log sources. Useful if you don't have a SIEM
Image Forensics
Images have more information in them than we think. More information can be found in the metadata of an image (or file).
Steganography
This is the practice of concealing information within other data or media in a way that the hidden information is not easily detectable
This can be done with images, audio files, videos or even text
Incident Reports
What to Document?
The report needs to be highly specific and very thorough. Nothing can be missed or else it can be dismissed in court. Every step needs to be documented
There will be different sections of the report that require different types of language and technicality. This can usually be divided into two sections:
Executive Summary: Provides key incident details and recommendations to executives and stakeholders. Little to no technical language should be used and it should be a high level overview.
Last updated