9 - 1: Incident Response Programs Flashcards

1
Q

NIST Special Publication 800-61

A

Standard incident handling process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident Response Plan

A

Structure and guidance for responding to incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident Response Plan elements

A

1) Statement of purpose/scope 2) clear strategies and goals 3) Approach to responses 4) Approval from Sr management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Service providers

A

Round out areas where services within the organization are needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Communication plan

A

Ensure the right people are informed of and during a cybersecurity incident. Who AND how

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Involving law enforcement

A

Complex question as it may make some details public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident communications

A

Make sure they’re confidential and don’t risk alerting attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SIEM

A

Security Incident and Event Manager, coordinates information from a variety of sources - firewalls, IDS/IPS, event logs - to collect and analyze data for activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incidents may also be reported from ____ sources

A

External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident first response

A

Isolate the system, allow it to continue to run, but do not keep it connected to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident first response priority

A

Contain damage through isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Counterintelligence

A

As adversaries are trying to learn about your network, some organizations have programs to hinder or provide false information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Escalation and notification objectives

A

1) Evaluate severity 2) Escalate appropriately 3) Notify stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Low-impact events

A

Usually would not involve an after-hours response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Medium-impact events

A

Likely to have a security impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

High-impact events

A

May risk organizational security

17
Q

NIST containment criteria

A

1) Potential for damage and theft 2) Evidence preservation 3) Service availability 4) Resource requirements 5) Expected effectiveness 6) Solution time frame

18
Q

Mitigation ends with:

19
Q

3 stages of containment

A

segmentation, isolation, removal

20
Q

Segmentation

A

Logically separating compromised systems using VLANs

21
Q

Isolation

A

Separating a breached system from others

22
Q

Removal

A

Detaching breached systems from the entire platform

23
Q

Eradication

A

Removes traces of an incident

24
Q

Recovery

A

Return to normal operations

25
Validation
Checking the system has returned to its pre-compromise/breach state
26
Post-incident response steps
1) Lessons learned 2) Evidence retention 3) Generation of indicators of compromise
27
Who are best for lessons learned sessions?
Independent facilitators
28
Configuration manager
Assists with automated system validation