3.3 Incident Response and Recovery Procedures Flashcards

1
Q

(E-Discovery)

A

The electronic discovery of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(E-Discovery)

Electronic inventory and asset control

A

must identify, track, classify, and assign ownership for important assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(E-Discovery)

Data Recovery

A

the process of recovering data from damaged, failed, corrupted, or inaccessible storage devices when it cannot be accessed using normal data access methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(E-Discovery)

Data Storage

A

strategies that includes backups to provide for recovery in the event of primary storage failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(E-Discovery)

Data Ownership

A

establish data owners and responsibility for all custodial duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(E-Discovery)

Data Handling

A

department managers that make decisions on how certain data should be used and managed
-data custodians are IT personnel that implement the decisions made by the data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(E-Discovery)

Legal Holds

A

process that permits organizational compliance with legal directives to preserve all digital and paper records in anticipation of possible litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(E-Discovery)

Data Retention policies

A

any data marked as legally requested data for destruction are immediately and indefinitely suspended until all relevant litigation has concluded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Data Breach)

A

The release of information to an unauthorized party or environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Data Breach)

Detection and collection

A

examination of hardware and software alerts, surveillance cameras, logs, network traffic, error messages, and feedback from employees and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Data Breach)

Data analytics

A

classifying the breach and assigning a priority level in order to ensure that the appropriate levels of attention and resources are provided to the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Data Breach)

Mitigation

A

Encryption is gold standard

Encryption can protect data during storage, transit, and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Data Breach)

Minimize

A

data minimization efforts can play a key role in both operational efficiency and security
“Dont keep what you dont need”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Data Breach)

isolation

A

containing the incident to a limited area to prevent spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Data Breach)

Recovery/reconstitution

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Data Breach)

Disclosure

A

the company must disclose all relevant data breach details to business stakeholders such as managers, human resources, and team leads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(Data Breach)

Response

A

when a data breach occurs, the firm must be ready to respond immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(Facilitate incident detection and response)

Hunt teaming

A

a comprehensive process of security teams seeking out any signs of attack against the organizational network

19
Q

(Facilitate incident detection and response)

Behavioral Analytics

A

process of measuring and identifying how entities typically act, or behave, and later comparing these measured behaviors to future samples of potentially spot deviations

20
Q

(Facilitate incident detection and response)

Heuristic Analytics

A

intelligently gathers data points from various host and network data sources within a specific environment
- it then scores each of these data point relative to one another to determine if the entity is threatening or not

21
Q

(Facilitate incident detection and response)

Establish and review system, audit, and security logs

A

SIEM solutions are critical components of automated security systems used in continuous monitoring

22
Q

(Incident and emergency response)

Chain of custody

A

detailed record of evidence handling, from its collection, preservation, and analysis, to representation in court and disposal

23
Q

(Incident and emergency response)

Forensic analysis of compromised system

A

digital forensics is the application of scientific methods to electronic data systems for the purposes of gathering specific information from a system

24
Q

(Incident and emergency response)

Continuity of operations

A

a continuity of operations plan refers to a government’s processes for maintaining functionality in the event of a serious public event

25
Q

(Incident and emergency response)

Disaster Recovery

A

involves the policies, staff, tools, and procedures to enable the timely recovery of an organization’s technological infrastructure from disruptive events

26
Q

(Incident and emergency response)

Incident Response team

A

a group of people who prepare for and respond to any emergency incident, such as a natural disaster or an interruption of business operations

27
Q

(Incident and emergency response)

Order of volatility

A

describes the order in which digital evidence should be collected before it disappears

28
Q

(Incident response support Tools)

dd

A

used for converting and copying files

29
Q

(Incident response support Tools)

tcpdump

A

Linux command used to capture network packets transferred over network

30
Q

(Incident response support Tools)

nbstat

A

tool that allows troubleshooting NetBIOS-related issues by displaying TCP/IP connections and protocol statistics based on NetBIOS network activity

31
Q

(Incident response support Tools)

netstat

A

command-line tool designed to display generalized network connections and protocol statistics for the TCP-IP protocol suite

32
Q

(Incident response support Tools)

netcat

A

linux command-line utility designed to connect to or host various types of network connections with other systems

33
Q

(Incident response support Tools)

memdump

A

linux command-line utility that can dump physical and kernel memory contents to both local storage and network locations

34
Q

(Incident response support Tools)

tshark

A

network protocol analyzer that captures network traffic from a live network or can read packets that were previously captured and saved into capture files

35
Q

(Incident response support Tools)

foremost

A

a forensic data recovery command-line tool used on linux primarily for law enforcement to recover deleted or corrupted data from drives

36
Q

(Severity of incident or breach)

Scope

A

defines the extent of an area affected or how widespread an incident or breach is

37
Q

(Severity of incident or breach)

Impact

A

defines the effect of an incident on business processes

38
Q

(Severity of incident or breach)

Cost

A

must take direct and indirect cost factors to consider, such as losing customer data, company downtime, and legal fees.

39
Q

(Severity of incident or breach)

Downtime

A

involves managing and delivering on expectations in terms of the amount planned and unplanned availability customers can expect during a given time

40
Q

(Severity of incident or breach)

Legal ramifications

A

involve stiff fines, penalties, and/or jail tie

41
Q

(Post-incident response)

Root-cause analysis

A

seeks to determine the root cause (or causes) of a problem

42
Q

(Post-incident response)

Lessons learned

A

give us the opportunity to evaluate mistakes, successes, assess what happened during the incident

43
Q

(Post-incident response)

After-action report

A

implements the security recommendations gleaned from the lessons learned report