Updated date:

Computer Security Jump Bag

Author:
jumpbag

Managing a Computer Security Jump Bag

A Jump Bag is the term used to describe the bag or container holding all of the tools you need to appropriately respond to a computer security incident. The hard part is ensuring that the jump bag is ready to deploy at a moment's notice and that it will contain all of the necessary tools and accessories.

SANS Incident Handling Course covers the topic of Incident Handling in-depth. It is a great course which I have taken.

Have a Security Policy - It should contain an Incident Response section.

A security policy will document the assets that are most important to a business and provide a foundation upon which an incident response plan will be based. The other important item to identify in the policy is to define expected behaviors and rules the response team must follow.

  • SANS Security Policy Project
    The ultimate goal of this SANS project is to offer everything you need for rapid development and implementation of information security policies. You'll find a great set of resources posted here already including policy templates for twenty-four impo
  • NIST Security Documents
    Track down National Institute of Standards and Technology publication 800-61 which is a Computer Security Incident Handling Guide.

Get something to carry all of your tools. - Look for one with many pockets.

  • A Computer bag at a minimum with lots of pockets.
  • A Backpack is another option but it will depend upon the equipment you need to have.
  • Suitcase. A complete set of response equipment can get heavy, a rolling computer bag or suitcase with wheels is nice.

Tools to Document Your Response - Document Everything!

Some companies choose to prosecute people who attack, steal or exploit their resources. Detailed documentation can be submitted as evidence. Be aware that some institutions will prosecute their staff if they respond in a way which causes evidence to be lost. It is also useful to always have two people working on the response to validate the work being done and to reduce a defense argument that the evidence was tampered with.

  • Paper Notebooks. Be sure to keep track of time and actions taken. If this is a forensic investigation a special binding might be required for the notebook so the evidence is not questioned.
  • Pens, yes multiple pens and make sure they are not erasable.
  • Audio Recording Device. Tape or Digital but be sure you have enough space to record events. Depending on the purpose of the response, there is not always enough time to write everything down do being able to record audio notes, saves time. Remember to state the time when you make a voice note.
  • Digital Camera. Some models can validate their photos. The Nikon D2X can authenticate photos and know if they have been tampered with.
  • Time Keeping Device. Watch, cell phone etc.

Have a Laptop - Be sure you have a system to use to respond with.

Be sure your system has adequate capabilities (memory, CPU, etc.) to respond to an incident.

  • Power cord
  • Be sure you have and adequate network card, no less than 100MB. You might prefer a giga-bit card since many networks are adapting this technology. The idea is to be able to monitor the network with your laptop.
  • Have adequate memory for the tools you may be using.
  • Have a CDRW or preferrable a DVD-RW device.
  • Have USB ports to support USB media devices.
  • Have a wireless network card if you support wireless networks.

Backup Media - Make sure it is new media, not reused (defense tampering argument)

It is possible that you will need to move files or devices in order to investigate an issue.

  • Hard Drive. Minimum 250GB. At least one SCSI, IDE or USB device.
  • Pen Drive. Given the cheap prices, 4GB minimum.
  • CDROM Media
  • DVD Media

Wireless Attack Response - Wireless networks are everywhere.

Many companies have installed wireless networks to improve network access for their employees and allow them to be mobile. Wireless networks introduce many security issues so be sure to have appropriate hardware.

  • Wireless Network card with external antenna connector.
  • Directional Antenna. These can help you find rouge access points.
  • Wireless Auditing software. Kali Linux(etc.)

Communication Resources - Stay in Touch.

If your computer has been hacked, do not use it or the network to communicate with others about the incident.

  • Your Cell Phone, your charger and a spare battery.
  • Call list. Always have your site's call list in your bag. If this is an external site, get one immediately for the location.
  • GPG or other encryption software to support the transfer of information.
  • If a team is responding, you might want FRS radios to support your communication. If the attack is wireless, you might be managing a deployed response team. A reviewer has added a hint - FRS radios are not allowed in EU - they are ok for US use only. EU can use PMR and LPD radios which are almost the same, except PMR has 8 channels, LPD has 79 channels. For most real-life situations PMR solutions should work.

Network/Technical Tools - Be able to connect and monitor.

  • A hub, not a switch or even better a network tap. It might be possible to monitor the traffic to the exploited host by using a hub. Many advanced switches can mirror a port for you to tap into and many networks support ingress and egress VLANS. Remember interrupting an active attack may let the attacker know you are responding.
  • Cross-over cable. These are sometimes hard to find.
  • A few ethernet network cables, preferably long (25ft.).
  • An RJ45 cable extender. Sometimes a 25 foot cable is not enough.
  • RJ45-Serial adapter. Cables to communicate with network equipment via serial connections might be necessary.
  • Hardware Drive Write Blocker which will prevent an investigator from altering a drive under investigation
  • Any other cables which are popular, USB, Firewire, serial, IDE, SCSI, SATA/eSAT.
  • A 9 pin to rj45 serial adapter in case you need to connect via a terminal application. It is also useful to have 9 pin gender changers.

Miscellaneous tools, equipment and resources

  • If it is possible, have a private room set up for coordinating the response team and reviewing collected evidence. The investigation should be kept private and the team protected from unnecessary interruptions. The private room is especially necessary if you are responding to an internal incident which might lead to the forensic investigation of an employee's system.
  • Zip Lock Bags for Evidence.
  • LED Flash Light.
  • Computer Tool Kit. Some agencies require that hardware (drives) impacted by an intrusion be removed, secured and sent to higher level security officials for further analysis or to be placed within better controlled environments.
  • Business Cards (Your Credentials). It is possible for those responding to intrusion to be available as witnesses if a company pursues prosecution of computer crimes. Not all intrusions or compromises are done by external entities.
  • Permanent Markers to mark evidence.
  • A Leatherman multi-tool is very handy.
  • A Power strip, you will have a lot of electronic equipment with you.
  • Cable ties to organize cables in case you had to remove some.
  • Anti-Static Bags for storage of electronic devices or drives.

The Most Important Thing to Remember When Responding to An Incident

Relax.

Take your time and do not damage or invalidate evidence. What is the reason for your response, to return the system to an operational status or to collect evidence? What actions are you allowed to take? What actions can you take that will not alert the attacker to your response? Do you have proper authorization to proceed, is the authorization in writing and signed?

Protect and Control the Evidence.

Your procedures and collection processes may be questioned in court. If evidence is encountered you should have two people with the evidence at all times to avoid defense arguments of the possibility evidence was tampered with.

  • Make sure you keep evidence under lock and key and only access it when two people are present. Be sure to record the date and time of each access to evidence.
  • Police or Flagging Tape. Mark off the area or systems under investigation so no one accidentally tampers with the system under investigation.
  • Post signs to inform users what not to touch and who to contact for further information.
  • Document all access to the safe or cabinet where evidence is kept.
  • Mark all evidence with a date and time. (zip lock bag idea).

Jump Bag Rules - As was re-enforced by the SANS class, do NOT borrow from the bag.

Under no circumstance, borrow from your jump bag.

  1. Never take anything from the jump bag.
  2. Audit the jump bag every quarter to be sure your tools are up to date.
  3. Refresh your jump back after it is used.

Incident Response Books

Amazon Audio Devices

Amazon USB Pen Drives

Be able to move data around if possible and be sure to encrypt your data. Sometime forensic auditors want all of their tools on a USB device to keep from needing to use tools or applications on a compromised system.

Portable Hard Drives

Lacie has released new drives with multiple connections types on each.

Digital Cameras on Amazon

Some cameras can authenticate their photos which is a critical feature for digital evidence. Check the specs on the model you choose.

Find an Appropriate Bag - Save your back and get one with wheels.

Lots of pockets are also useful.

Conclusions

This lens is another in my list of lenses covering computer security. Stop by my Computer Security and War Driving lenses if you get a chance

Reader feedback is a good way to share your experience.

Reader Feedback Please - Please submit any additional ideas you have.

webguru_india on November 07, 2012:

It's a great lens. Keep sharing such nice information with us. Also don't forget to check my blog here at http://www.squidoo.com/lensmasters/webguru_india

anonymous on July 26, 2012:

Interesting post! I didn't realize that there was really something like this out there. I am assuming that computer security companies in Toronto would have one of these.

PhyllisCOliver on February 14, 2012:

This is a very good and reliable information, i wouldn't know this if it weren't for you.

online computer support

roberts580 on May 13, 2011:

interesting lens. even if we use different computer security policies to handle the incident management, there are possible attacks through online. to tackle these problems we need to upgrade our computer with updated antivirus software. i invite you to visit our website for clamxav os x for a best anti virus.

huvalbd on March 05, 2011:

Good lens with excellent attention to detail.

tilakahuja on December 05, 2010:

When you work with our private uniformed security guards, you are working with professional, dedicated, specially trained individuals who take pride in keeping you safe and secure. We are committed to provide you such services. We are one of the top security companies in Toronto. http://www.guardsecurity.ca/

BlackLeatherBriefcases on October 30, 2010:

This is exactly what I was looking for. Thanks for sharing this great lens! That is very interesting Smile I love reading and I am always searching for informative information like this!

black leather briefcase

SpyCamsSite on July 04, 2010:

nice lens lots of good information

Spy Cams Site

projectobserve on April 10, 2010:

Nice idea for security issue of computer. Though I have not suffering too much security issue but I think I have all the tool to overcome any security issue.

Thanks for nice lens.

TheUncleJacks on March 07, 2010:

Good lens! Thanks for information. I hope, this is also good information about ziplock bags.

VerticalJumpProject on September 09, 2008:

Learn something new everyday! 5* ...From the vertical jump project top secret fat loss

anonymous on June 16, 2008:

wow!

This is wonderful lens about computer security methods. I really appreciate with your lens, I think this lens is more useful to the people.

I have created one more important lens that focuses on private investigator directory,

thanks for giving such a great information.

Related Articles