Chapter 14: Incident Management Flashcards
What is an incident?
Any event that has a negative effoct on the confidentiality, availability, or integrity or an organization’s assets.
What is a computer security incident?
An incident that is the result of an attack or the malicous or intentional actions of users.
How does NIST SP 800-61 define a computer security incident?
A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.
What are the steps of incident response?
Detection Response Reporting Recovery Remediation and Review
List the ways in which an incident might be detected.
IDS/IPS systems send an alert
AV software displays a popup window
Automated tools scanning audit logs to send an alert when an event occurs
End users report problems such as inability to access a network resource.
What should the first step after indicent detection be?
Contain the incident, for example, unplug the NIC but don’t turn the system off.
What is a CIRT or CSIRT?
A designated incident reponse team. Computer Incident Response Team. S == Security.
What improves your chances of limiting incident damage?
Faster response time.
What should you do after containing a security incident?
Investigate.
What are requirements for incident reporting?
There can be many. Many jurisdictions have reporting requirements if PII is compromised.
Why are many incidents not properly reported?
Training. People aren’t trained properly to recognize them as incidents.
Why is finger pointing bad?
It takes focus away from fixing the problem.
What should the end result of remediation and review?
Often, a report by the C(S)IRT that may recommend changing procedures, adding security controls, or changing policies.
List the basic preventative measures to prevent attacks.
Keep systems and applications up to date
Remove or disable unneeded services and protocols
Use up-to-date antivirus software
Use firewalls
USe intrusion detection and prention systems.
What is malicous code?
Any script or program that performs an unwanted, unauthorized, or unknown activity on a computer system.
What is a drive-by-download?
Code downloaded and installed on a user’s sytem without the user’s knowledge. Occurs when the user visits an intended web page.
What is a zero-day exploit?
An atatck on a system exploiting a vulnerability that is unknown to others.