(9) Security Incident Definitions Flashcards

1
Q

What is an event?

A

An event is an observable happening in a system or network. A security event specifically is observable and has to do with a security function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an adverse event?

A

An adverse event is any event that has less than ideal consequences. Malware infection, server crash, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a security incident?

A

A security incident is a clear violation of company policies as it has to do with proper use of company equipment or systems, software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are computer security incident response teams (CSIRTs)?

A

CSIRTs are responsible for reacting to security incidents that happen within an org by following standard (thought of beforehand) processes to secure the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an incident response process?

A

An example of an incident response process is preparation, detection/analysis, containment eradication and recovery, and post incident activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the incident response process a straight forward process to follow?

A

Incident response processes can be straight forward but most often involve looping back to prior processes for new detection and containment activities, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does it take to construct a Computer Security Incident Response Team (CSIRT)?

A

Constructing a CSIRT takes a lot of work to get up and running. It takes preparation to make sure it has a proper policy foundation, has operating procedures that will be effective in the orgs computing environment, gets proper training and is prepped to response properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of materials and assembly should an ORG have for a security preparation?

A

Backup equipment, blank removable media, forensic and packet capture software, Office supplies and evidence collection materials and bootable USB media with trusted copies of forensic tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

According to the NIST 800-61 guideline, describe how Alerts should work

A

Alerts should originate from intrusion detection and prevention systems, SIEM systems, antivirus software, file integrity checking software, and others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to NIST 800-61, describe how logs should play a role in a security program

A

Logs should be those that are produced by the OS, services, apps, network flows and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to NIST 800-61, describe public available information

A

Public available information is information shared with the public about any new developments in terms of exploits and vulnerabilities in a lab environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to NIST 800-61, describe People

A

People describes those who work inside the org or external sources that report the activity that may indicate that an issue is currently happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly