4.2 Importance of policies, processes and procedure in Incident response Flashcards

1
Q

Incident response process: what are the stakeholders involve in this process ?

A
  • Incident response team
  • IT security management
  • Compliance officer
  • Technical staff
  • User community
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident response process: what framework can be used for incident response lifecycle?

A

NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident response process: how a company can be “prepared” for an incident ?

A
  • Use communication methods (phone, email)
  • Set up incident handling hardware and software
  • Have incident analysis resources (documentation, network diagrams, baseline, critical file hash value)
  • Policies & procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incident response process: how to know that an incident has occured?

A

Monitor the system and network (antivirus, IPS/IDS, network flow)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Incident response process: what to do when a security incident occurs ?

A

Isolate it in a sandbox (VM) and analyze it. Clean out the sandbox when done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Incident response process: how to recover from the incident ?

A

Eradicate the bug (remove the malware) and recover the system (restore from backup, rebuild from scratch, replace compromised file etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident response process: why documentation is important?

A

To understand when and why the incident happened. How the incident was resolved and what can be done next time it happened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incident response planning: why exercise are important in incident management?

A

To test yourselves before an actual real incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident response planning: what is COOP ?

A

Continuity of Operations Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack frameworks: what is MITRE ATT&CK framework?

A

Framework that determine the actions of an attacker: identify point of intrusion, understand methods used to move around, identify potential security techniques to block future attacks etc

The framework is available online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack frameworks: what is Diamond Model of Intrusion Analysis framework?

A

Apply scientific principles to intrusion analysis: measurement, testatbility and repeatability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack frameworks: what are the 4 corners of Diamond Model of Intrusion Analysis framework?

A
  • Adversary: the attacker
  • Capability: how the attacker uses (malware, exploit etc)
  • Victim: it could be a person, assets, email etc
  • Infrastructure: describe hat was used to gain access (IP, domain names, email etc)

The 4 points are all connected. Therefor Adversary would uses the infrastructure and develops a capability. The victim is exploited by the capability and connect to the infra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attack frameworks: what is Cyber Kill Chain framework?

A

Framework with 7 phases of a cyber attack:
- Reconnaissance: gather info
- Weaponization: build a payload inc. exploit & backdoor
- Delivery: send the weapon
- Exploit: Execute code on victim
- Installation: malware is install
- Command & control: get remote access
- Actions on objectives: attacker can remotely carry out objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly