01. Incident Management Operations (471) Flashcards

1
Q

Incident Management operations

Key phases of incident response;

  1. Planning
  2. Detection
  3. Initiation
  4. Analysis
  5. Containment
  6. Eradication
  7. Recovery
  8. Remediation
  9. Closure
  10. Post-Incident Review
  11. Retention of Evidence

471

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Planning

The develipment of written respinse plans, guidelines, and procedures to be followed when an incident occurs

471

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Detection

The moment in which an organisation is initially aware that a security incident is taking place or has taken place

472

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Initiation

Incident response begins. Declaration of an incident and notifications

472

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Analysis

Response teams collect and analyse available data to understand the incidents cause, scope, and impact

472

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Containment

Direct actions taken by incident responders to contain the advancement of an incident

472

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Eradication

Incident responders take steps to remove the source of the incident

472

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Recovery

After evaluation and eradication, recovery of systems to pre-incident state

473

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Remediation

Involves neccessary changes that will reduce or eliminate the possibility of a similar incident in the future

473

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Closure

Once eradication, recovery, and remediation have been completed, the incident can be closed

473

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Post-incident Review

Review of the cause, impact, and response to incident. Lessons to be learned

473

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Retention of Evidence

Identifying items that need to be retained as part of an incident i.e. items that might be used in legal proceedings.

473

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Incident Handling

Computer Security Incident Handling Guide by NIST
NIST-800-61

473

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MSSP

Managed Security Service Provider (MSSP)
Reasons that organisations chose to outsource security monitoring;

  1. Domain expertise
  2. Dedicated personnel
  3. Staffing shortage
  4. Cost Control

477

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Hunting

  • Using tools to proactively look for indicators of compromise (IOC)
  • Organisations should consider threat hunting only after reaching a mature level with monitoring capabilities

477

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Incident Response Retainer

A legal agreement between organisation and MSSP that contracts them to assist in the event of a security incident

477

A