Five Steps to Investigate and Respond to Malware Incidents as a SOC Analyst - PowerPoint PPT Presentation

About This Presentation
Title:

Five Steps to Investigate and Respond to Malware Incidents as a SOC Analyst

Description:

Malware is nothing but malicious software that damages your system without your knowledge. There are many types of malware like Trojan horse, spyware, ransomware, worms, virus, or any other spiteful code that damages our system. And, when the SOC team detects this malware or is notified about this infectious application, then that situation is called Malware Incident. The SOC team begins an investigation of the malware immediately after identifying it to know the gravity of the problem. – PowerPoint PPT presentation

Number of Views:2
Slides: 12
Provided by: infosectrain
Tags:

less

Transcript and Presenter's Notes

Title: Five Steps to Investigate and Respond to Malware Incidents as a SOC Analyst


1
Five Steps to Investigate and Respond to Malware
Incidents as a SOC Analyst
www.infosectrain.com sales_at_infosectrain.com
2
Malware is nothing but malicious software that
damages your system without your knowledge. There
are many types of malware like Trojan horse,
spyware, ransomware, worms, virus, or any other
spiteful code that damages our system. And, when
the SOC team detects this malware or is notified
about this infectious application, then that
situation is called Malware Incident. The SOC
team begins an investigation of the malware
immediately after identifying it to know the
gravity of the problem.
www.infosectrain.com sales_at_infosectrain.com
3
  • There are four essential skills required for SOC
    analyst and they are
  • Critical thinking
  • Performing under pressure
  • Strong fundamental skills
  • Curious mind
  • In this blog, we will discuss about who notifies
    the SOC team about malware and the steps taken by
    the SOC team to investigate the malware. Let us
    discuss the life of a SOC analyst
  • Who notifies the SOC team about malware?
  • There are various stakeholders involved in
    notifying the SOC team about malware they are
  • Customers, Employees, or Clients Whenever a
    malware attack happens, you will observe the
    abnormal behaviour of the system like pop-up
    messages, many irrelevant advertisements, system
    crashes, or Blue Screen Of Death. When this
    behaviour is followed by Customers, Employees, or
    clients, they will notify Security Operations
    teams to investigate the problem.
  • Defense and SOC security tools notify the
    malware Due to the advanced technology nowadays,
    it is becoming challenging to absorb the defects
    in the system hence SOC teams use different
    defense tools that will notify the malware in the
    system. These detections are differentiated into
    two categories as given below, and without these
    tools and the improved technologies behind them,
    the life of a SOC analyst would be tough
  • Behavior-based detection.
  • Signature-based detection.   


www.infosectrain.com sales_at_infosectrain.com
4

Now let us discuss the Investigation and incident
response steps taken by the SOC
team Preparation Preparation is the first
important step in the process of responding to
malware attacks. In this step, the SOC team
installs a security system in a place that
identifies an incident. Identification As SOC
teams have set up a Security system, this will
alert the Intrusion Detection Systems, and web
filtering gateways detect the unusual external
connection. And then, the SIEM solutions will
connect the dots of an attacker passing through
the endpoint solution or the internal
network. Containment Containment takes place to
stop the further spread of the damage or the
malware to the network. Containment is needed to
concentrate on the next stage of the
response. Eradication Eradication is one of the
most complicated stages in the incident response
process because it includes forensic analysis to
discover the degree of presence of the threat
actor. Security staff must make sure they
eliminate the entire existence. By re-imaging the
machine, backdoors searching and determining the
root cause analysis of the incident. Recovery Re
covery is the final stage in the incident
response. In this stage, we get the infected
systems up and run them to reduce the potential
monetary loss caused by the infected system. So,
these are the five steps taken by the SOC team to
investigate and give the incident response.

www.infosectrain.com sales_at_infosectrain.com
5
Why Infosec Train InfosecTrain provides 80
hours of training with 4 hours per day with the
industry-certified trainers who use this time to
train you excellently and with real-life
examples. You will get the recorded sessions by
which you can learn at your own pace. To enroll
in our course and get a deep understanding of the
topic, please visit our website InfosecTrain 
www.infosectrain.com sales_at_infosectrain.com
6
About InfosecTrain
  • Established in 2016, we are one of the finest
    Security and Technology Training and Consulting
    company
  • Wide range of professional training programs,
    certifications consulting services in the IT
    and Cyber Security domain
  • High-quality technical services, certifications
    or customized training programs curated with
    professionals of over 15 years of combined
    experience in the domain

www.infosectrain.com sales_at_infosectrain.com
7
Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
8
Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
9
Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
10
(No Transcript)
11
Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-722-11127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com