4 - Information Security Incident Management Flashcards
Who developed the Kill Chain and what are the phases
Lockheed Martin
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control
Actions on Objectives
Which NIST Pub is for the Computer Security Incident Handling Guide
NIST 800-61
What type of analysis should be performed prior to building our BCP or DR Plans
Business Impact Analysis (BIA) and
Criticality Analysis (CA)
List some examples of backup media rotation
FIFO
Grandfather-father-son using full and daily incremental or differential.
Tower of Hanoi
What is the difference between Incident Response testing and DR Testing
IRP - Doc Review, Walk through, and simulation
BCP/DR has parallel and cutover as well
What is the main purpose of the “chain of custody” procedures
To prove the integrity of investigation data
T or F documenting steps during actual security incidents will also determine whether the organization recovered from the incident
False
That is not the purpose of documenting and does not indicate if they actually recovered.
What is the primary purpose of incident responders being asked to review incident response procedures.
Helps find mistakes in incident response procedures before an actual incident occurs
What PCI-DSS requirement is to put contact information for card brands in their incident response plans
12.10.1
card brands should notified as soon as possible after a knowledge of a breach of credit card data.
What is the last step in a security incident
Post-Incident review or postmortem
Closure is second to last step
What is a good indicator on when Exec Management should be notified of a security incident
When regulators need to be notified
disruption in business
compromise of sensitive information
Purpose of a write blocker in the context of a security incident response
allows you to connect to hard drive that is the subject of a forensic analysis to a computer. The write block permits the computer to read from the subject hard drive but not permit any updates to the hard drive
for GDPR how quickly must an organization report a security breach of PII to SA
72 hours
What technology besides DLP will detect data exfiltration
Network anomaly detection since it is designed to baseline normal network behavior and report on a anomalous network traffic such as data exfiltration
What plan is to ensure effective notifications of internal and external parties
Crisis Response Plan