1.2: Security Incident Management Flashcards
What is a security incident
Any event that represents a violation of an organizationn’s security policy.
Types of Security Incidents
- Computer account abuse - sharing of user account credential
- Computer or network trespass - unauthorized person accesses a computer network
- Interception of information - eavesdropping on communications
- Malware
- Denial of Service (DoS) attack
- Distributed Denial of Service (DDoS) attack
- Equipment theft
- Disclosure of sensitive information
Is a vulnerability that is discovered a security incident?
No, it’s not a security incident, but it may prompt a response that is similar to an actual incident.
How should an effective response to incident be?
Documented and rehearsed
The phase of incident response
- Planning - development of written response procedures that are followed when an incident occurs.
- Detection - when the organization became aware or active or past incident
- Initiation - Response to the incident begins
- Evaluation - response team analyze available data, in order to understand the cause, scope, and impact of the incident.
- Eradication - step to remove the source of incident
- Recovery - brining system back to their pr-incident state
- Remediation - changes that will reduce or eliminate similar incident occurring.
- Closure - After eradication, recovery, and remediation are completed
- Post-incident Review - Lesson learned
What Incident response testing
. Incident response testing helps to improve the quality of those plans, which will help the organization to better respond when an incident occurs.
Types of activities carried out during incident response testing
- Document review
- Walkthrough
- Simulation
These tests should be performed once a year.
How is incident prevention primarily accomplished?
Through knowledge of vulnerabilities and actions to remove them.
Important elements in the prevention of security incident
- Vulnerabilities and treat monitoring :
- Situation awareness
- Threat hunting
- Vulnerability management - tools and techniques to detect vulnerabilities in network devices, servers etc.
- Advanced anti-malware : at the network boundaries , servers, endpoints, and mobile devices.
- system hardening - configured only essential services on a system.
- Intrusion detection - gives early warning of network-or computer-based attacks.
- Intrusion prevention - Like IDS, but can actively block activities that resemble attacks.
When is a forensic investigation required
when a security incident has occurred and it is necessary to gather evidence to determine the facts.