Chapter 5.4 Flashcards
Containment
Containment is a stage in the incident response lifecycle. In this stage, the goal is to limit the scope and reach of the event. One approach in containment is to isolate infected systems
Recovery
Recovery is a stage in the incident response lifecycle. This stage ensures the threat no longer exists and all systems are brought back to a secure state.
reporting requirements
The suspicion of data theft is typically enough to have to trigger reporting procedures. This involves notifying stakeholders, regulation entities, and customers if applicable.
Escalation
Increased involvement of senior staff in the management of an incident is called escalation. Escalation may be necessary if no response is made to an incident within an acceptable time frame.
Tabletop exercise
With a tabletop exercise, staff will “ghost” the same procedures as they would in a disaster, without actually creating disaster conditions or applying or changing anything.
walkthrough exercise
Walkthroughs are used to provide basic awareness and training for disaster recovery team members. These exercises describe the contents of disaster recovery plans and other plans, and the roles and responsibilities outlined in those plans.
Functional exercise
Functional exercises are implemented as action-based sessions where employees can validate all plans by performing scenario-based activities in a simulated environment.
Full-scale exercise
Full-scale exercises are action-based sessions that reflect real situations. These exercises are held onsite and use real equipment and real personnel as much as possible.
scope
The scope of an incident (broadly the number of systems affected) is not a direct indicator of priority. A large number of systems might be infected with a type of malware that degrades performance, but is not a data breach risk
privacy officer
A privacy officer is responsible for oversight of any Personally Identifiable Information (PII) assets managed by a company. This role ensures that the processing and disclosure of PII complies with legal and regulatory frameworks and also oversees the retention of PII.
eradication
Eradication is an incident response lifecycle phase pertaining to finding the root cause of an incident. For example, a user clicking a malicious link in an email is a root cause for a potentially larger problem.
preparation
Preparing for an incident response means establishing the policies and procedures for dealing with security breaches, along with personnel and resources to implement those policies. A triage plan is developed during this phase.
roles and responsibilities
roles and responsibilities can be defined and acted out in an exercise. Assigning solid roles and responsibilities avoids the possibility of confusion and missed steps during an incident response.
COOP
Continuity of Operations (COOP) is a collection of processes that enable an organization to maintain normal business operations in the face of some adverse event. COOP is not part of the exercise process.
data integrity
Data integrity is typically the most important factor in prioritizing incidents and will often be based on the value of the at-risk data.