3.3 Incident Response and Recovery Procedures Flashcards

1
Q

(E-Discovery)

A

The electronic discovery of evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(E-Discovery)

Electronic inventory and asset control

A

must identify, track, classify, and assign ownership for important assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(E-Discovery)

Data Recovery

A

the process of recovering data from damaged, failed, corrupted, or inaccessible storage devices when it cannot be accessed using normal data access methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(E-Discovery)

Data Storage

A

strategies that includes backups to provide for recovery in the event of primary storage failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(E-Discovery)

Data Ownership

A

establish data owners and responsibility for all custodial duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(E-Discovery)

Data Handling

A

department managers that make decisions on how certain data should be used and managed
-data custodians are IT personnel that implement the decisions made by the data owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(E-Discovery)

Legal Holds

A

process that permits organizational compliance with legal directives to preserve all digital and paper records in anticipation of possible litigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(E-Discovery)

Data Retention policies

A

any data marked as legally requested data for destruction are immediately and indefinitely suspended until all relevant litigation has concluded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Data Breach)

A

The release of information to an unauthorized party or environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Data Breach)

Detection and collection

A

examination of hardware and software alerts, surveillance cameras, logs, network traffic, error messages, and feedback from employees and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(Data Breach)

Data analytics

A

classifying the breach and assigning a priority level in order to ensure that the appropriate levels of attention and resources are provided to the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(Data Breach)

Mitigation

A

Encryption is gold standard

Encryption can protect data during storage, transit, and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Data Breach)

Minimize

A

data minimization efforts can play a key role in both operational efficiency and security
“Dont keep what you dont need”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Data Breach)

isolation

A

containing the incident to a limited area to prevent spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(Data Breach)

Recovery/reconstitution

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(Data Breach)

Disclosure

A

the company must disclose all relevant data breach details to business stakeholders such as managers, human resources, and team leads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(Data Breach)

Response

A

when a data breach occurs, the firm must be ready to respond immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(Facilitate incident detection and response)

Hunt teaming

A

a comprehensive process of security teams seeking out any signs of attack against the organizational network

19
Q

(Facilitate incident detection and response)

Behavioral Analytics

A

process of measuring and identifying how entities typically act, or behave, and later comparing these measured behaviors to future samples of potentially spot deviations

20
Q

(Facilitate incident detection and response)

Heuristic Analytics

A

intelligently gathers data points from various host and network data sources within a specific environment
- it then scores each of these data point relative to one another to determine if the entity is threatening or not

21
Q

(Facilitate incident detection and response)

Establish and review system, audit, and security logs

A

SIEM solutions are critical components of automated security systems used in continuous monitoring

22
Q

(Incident and emergency response)

Chain of custody

A

detailed record of evidence handling, from its collection, preservation, and analysis, to representation in court and disposal

23
Q

(Incident and emergency response)

Forensic analysis of compromised system

A

digital forensics is the application of scientific methods to electronic data systems for the purposes of gathering specific information from a system

24
Q

(Incident and emergency response)

Continuity of operations

A

a continuity of operations plan refers to a government’s processes for maintaining functionality in the event of a serious public event

25
(Incident and emergency response) | Disaster Recovery
involves the policies, staff, tools, and procedures to enable the timely recovery of an organization's technological infrastructure from disruptive events
26
(Incident and emergency response) | Incident Response team
a group of people who prepare for and respond to any emergency incident, such as a natural disaster or an interruption of business operations
27
(Incident and emergency response) | Order of volatility
describes the order in which digital evidence should be collected before it disappears
28
(Incident response support Tools) | dd
used for converting and copying files
29
(Incident response support Tools) | tcpdump
Linux command used to capture network packets transferred over network
30
(Incident response support Tools) | nbstat
tool that allows troubleshooting NetBIOS-related issues by displaying TCP/IP connections and protocol statistics based on NetBIOS network activity
31
(Incident response support Tools) | netstat
command-line tool designed to display generalized network connections and protocol statistics for the TCP-IP protocol suite
32
(Incident response support Tools) | netcat
linux command-line utility designed to connect to or host various types of network connections with other systems
33
(Incident response support Tools) | memdump
linux command-line utility that can dump physical and kernel memory contents to both local storage and network locations
34
(Incident response support Tools) | tshark
network protocol analyzer that captures network traffic from a live network or can read packets that were previously captured and saved into capture files
35
(Incident response support Tools) | foremost
a forensic data recovery command-line tool used on linux primarily for law enforcement to recover deleted or corrupted data from drives
36
(Severity of incident or breach) | Scope
defines the extent of an area affected or how widespread an incident or breach is
37
(Severity of incident or breach) | Impact
defines the effect of an incident on business processes
38
(Severity of incident or breach) | Cost
must take direct and indirect cost factors to consider, such as losing customer data, company downtime, and legal fees.
39
(Severity of incident or breach) | Downtime
involves managing and delivering on expectations in terms of the amount planned and unplanned availability customers can expect during a given time
40
(Severity of incident or breach) | Legal ramifications
involve stiff fines, penalties, and/or jail tie
41
(Post-incident response) | Root-cause analysis
seeks to determine the root cause (or causes) of a problem
42
(Post-incident response) | Lessons learned
give us the opportunity to evaluate mistakes, successes, assess what happened during the incident
43
(Post-incident response) | After-action report
implements the security recommendations gleaned from the lessons learned report