4.2 Policies, Procedures & Processes Flashcards

1
Q

Define incident response plan (5)

A
  1. Document and information prepared in advance so that everyone knows what do
  2. Contact info for necessary responders
  3. Hardware & software needed for the response
  4. Analysis resources, such as network diagrams
  5. Policies with the process that will be followed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tabletop exercises

A

Incident preparedness exercise where everyone is gathered to discuss the process of a simulated security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Walk-through exercise

A

Expansion of a tabletop exercise where the actual hardware and software used in the response is verified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Simulation exercise

A

An actual live test of a security incident, such as sending phishing emails to see how many users provide their credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stakeholder management

A

All stakeholders should be involved incident planning and incident exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List 3 major attack frameworks and their use

A
  1. MITRE ATT&CK - pre-attack information gathering
  2. Diamond Model of Intrusion Analysis - used during an attack
  3. Cyber Kill Chain - attack model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MITRE ATT&CK

A

Information database generated from previous attacks to become familiar with how to recognize attacks and what they are trying to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Diamond Model of Intrusion Analysis (CAVI) (2)

A
  1. Government developed model to help understand attacks
  2. Four corners - capability, adversary, victim, infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber Kill Chain (RWA) (2)

A
  1. Military developed model applied to cybersecurity
  2. 3 Stages - reconnaissance, weaponization, and action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident response stages (PRICE + L) (6)

A

Preparation, recovery, Identification, containment, eradication, lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly