Chapter 5 Building an Incident Response Program Flashcards

1
Q
  • Any observable occurrence on a network
  • i.e. user accessing a files stored on a server, administrator changing permissions on a shared folder, and an attacker conducting a port scan
A

Event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Any event that has negative consequences

- i.e. malware, server crash, use your accessing file they are not authorized to view

A

Adverse event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices
  • i.e. accidental loss of sensitive information, intrusion into a computer system by an attacker, the use of a keylogger to steal a password, and a launch of a denial-of-service attack
A

Security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A team responsible for responding to computer security incidents that occur within an organization by following standardized response procedures and incorporating their subject matter expertise.

A

Computer Security Incident Response Teams (CSIRT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the phases of incident response according to NIST?

A
  1. Preparation
  2. Detection and Analysis
  3. Containment eradication and Recovery
  4. Post-incident activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Part of the Preparation phase

- NIST recommends that every organization’s incident response toolkit include at the minimum, the following.

A
  • Digital forensic workstations
  • Backup devices
  • Laptops for data collection, analysis, and reporting
  • Spare server and networking equipment
  • Blank removable media
  • Portable printer
  • Forensic and packet capture software
  • Bootable USB media containing trust two copies of forensic tools
  • Office supplies and evidence collection materials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Part of the Detection and Analysis phase

- NIST 800-61 describes four major category sources of security event indicators: what are they?

A
  1. Alerts
  2. Logs
  3. Publicly available information
  4. People
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • One of NIST 800-61 four major categories of security event indicators
  • Originates from intrusion detection and prevention systems, SIEMs, Management Systems, antivirus software, file integrity checking software, and third party monitoring services.
A

Alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • One of NIST 800-61 four major categories of security event indicators
  • Generating by operating systems, services, applications, network devices and network flows
A

Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • One of NIST 800-61 four major categories of security event indicators
  • Provides info about new vulnerabilities
  • Keeping up with new exploits can prevent some incidents from occurring and assist in analyzing new attacks
A

Publicly available information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • One of NIST 800-61 four major categories of security event indicators
  • Represents users inside the organization or external sources who report suspicious activity that may indicate a security incident is in progress
A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Part of the Detection and Analysis phase

- NIST recommends the following actions to improve the effectiveness of an incident analysis

A
  • Profile networks and systems to measure the characteristics of expected activity
  • Understand normal behavior of users, systems, networks, and applications
  • Create a logging policy that specifies the information that must be logged by systems, applications, and network devices
  • Perform event correlation to combine information from multiple sources
  • Synchronize clocks across servers, workstations, and network devices
  • Maintain an organization-wide knowledge base that contains critical information about systems and applications
  • Create network traffic as soon as the incident is suspected
  • Filter information to reduce clutter
  • Seek assistance from external resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Containment, Eradication, and Recovery phase of the process is designed to achieve these objectives:

A
  • Select the containment strategy appropriate to the incident circumstances
  • Implement the selected containment strategy to limit the damage caused by the incident
  • Gather additional evidence, as needed to support the response effort and potential legal action
  • Identify the attackers and attacking systems
  • Eradicate the effects of an incident and recover normal business operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Post-incident activity includes what?

A
  • Lessons Learned review

- Evidence retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST recommends that incident response policies contain what key element?

A
  • Statement of management commitment
  • Purpose of objectives of the policy
  • Scope of the policy (to whom it applies and under what circumstances)
  • Definition of cybersecurity incidents and related terms
  • Organizational structure and definition of roles, responsibilities, and level of authority
  • Prioritization or severity rating scheme for incidents
  • Performance measures for the CSIRT
  • Reporting and contact forms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Design to be a step-by-step recipe style responses to cyber security incidents

A

Playbooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In addition to the core team members the CSIRT may include a representation from the following:

A
  • Technical subject matter experts
  • IT support staff
  • Legal counsel
  • Human resource staff
  • Public relations in marketing staff
18
Q

NIST provides the following attack vectors that are useful for classifying threats

A
  • External removable media
  • Attrition (brute-force, DDoS attacks)
  • Web
  • Email
  • Impersonation
  • Improper usage
  • Loss or theft of equipment
  • Unknown
  • Other
19
Q

Highly skilled and talented attackers focused on a specific objective

A

Advanced persistent threat (APT)

20
Q

Vulnerabilities that are unknown to the security community and as a result are not included in security test performed by vulnerability scanners and other tools and have no patches available to correct them

A

Zero-day vulnerabilities

21
Q
  • NIST functional impact categories

- No effect to the organization’s ability to provide all services to all users

A

None

22
Q
  • NIST functional impact categories

- Minimum affect the organization can still provide all critical services to all users but has lost efficiency

A

Low

23
Q
  • NIST functional impact categories

- Organization has lost ability to provide a critical service to a subset of system servers

A

Medium

24
Q
  • NIST functional impact categories

- Organization is no longer able to provide some critical services to any users

A

High

25
Q
  • Economic impact categories

- The organization does not expect to experience any Financial impact or the financial impact is negligible

A

None

26
Q
  • Economic impact categories

- The organization expects to experience a financial impact of $10,000 or less

A

Low

27
Q
  • Economic impact categories

- The organization expects to experience of financial impact of more than $10,000 but less than $500,000

A

Medium

28
Q
  • Economic impact categories

- The organization expects to experience a financial impact of $500,000 or more

A

High

29
Q
  • NIST recoverability effort categories

- The time to recover is predictable with existing resources

A

Regular

30
Q
  • NIST recoverability effort categories

- The time to recovery is predictable with additional resources

A

Supplemented

31
Q
  • NIST recoverability effort categories

- Time to recovery is unpredictable additional resources and outside help are needed

A

Extended

32
Q
  • NIST recoverability effort categories

- Recovery from an incident is not possible launch investigation

A

Not Recoverable

33
Q
  • NIST information impact categories

- No information was exfiltrated, changed, deleted, or otherwise compromise

A

None

34
Q
  • NIST information impact categories
  • Sensitive personally identifiable information (PII) of taxpayers, employees, beneficiaries, and so on was accessed or exfiltrated
A

Privacy breach

35
Q
  • NIST information impact categories
  • Unclassified proprietary information, such as protected critical infrastructure information (PCII) was accessed or exfiltrated
A

Proprietary breach

36
Q
  • NIST information impact categories

- Sensitive or proprietary information was changed or deleted

A

Integrity loss

37
Q
  • Private organization information impact categories

- No information was exfiltrated, changed, deleted or otherwise compromise

A

None

38
Q
  • Private organization information impact categories
  • Information regulated by an external compliance obligation was accessed or exfiltrated. i.e. protected health information under HIPAA or payment card information protected under PCI DSS
A

Regulated information breach

39
Q
  • Private organization information impact categories
  • Sensitive intellectual property was accessed or exfiltrated. This may include product development plans, formulas, or other sensitive trade secrets
A

Intellectual property breach

40
Q
  • Private organization information impact categories
  • Corporate confidential information was accessed or exfiltrated. This includes information that is sensitive but does not fit under the categories of regulated information or intellectual property. i.e. corporate accounting information or about mergers or act or acquisitions
A

Confidential information breach

41
Q
  • Private organization information impact categories

- Sensitive or proprietary information was changed or deleted

A

Integrity loss