CHP 12 Flashcards
Incident Response Lifecycle
Preparation, Detection, Analysis, Containment, Eradication, Recovery, Lessons learned
SOP
standard operating procedure (SOP)
LLR
lessons learned report (LLR)
An analysis of events that can provide insight into how to improve response and support processes in the future. or after-action report (AAR).
Intelligence Fusion
In threat hunting, using sources of threat intelligence data to automate detection of adversary IoCs and TTPs.
Digital Forensics
Digital forensics is the practice of collecting evidence from computer systems to a standard that will be accepted in a court of law.
fact
Disk image acquisition refers to acquiring data from nonvolatile storage
Due Process
A term used in US and UK common law to require that people only be convicted of crimes following the fair application of the laws of the land.
Live acquisition
this means copying the data while the host is still running.
write blocker
A write blocker prevents any data on the disk or volume from being changed by filtering write commands at the driver and OS level.
EPP
Endpoint Protection Platform (EPP):
Purpose: Protects devices from threats like viruses and malware.
How It Works: Uses antivirus, anti-malware, and firewall tools to block attacks.
ESI
electronically stored information (ESI)
EDR
Endpoint Detection and Response (EDR):
Purpose: Detects and responds to advanced threats on devices.
How It Works: Monitors device activities, detects suspicious behavior, and provides tools for investigation and response.
XDR
Extended Detection and Response (XDR):
Purpose: Provides a broader security view across multiple systems.
How It Works: Collects and analyzes data from various security tools (like EPP and EDR) to detect and respond to threats more effectively.
OVAL
Open Vulnerability and Assessment Language (OVAL)—an XML schema for describing system security state and querying vulnerability reports and information.
XCCDF
Extensible Configuration Checklist Description Format (XCCDF)—an XML schema for developing and auditing best practice configuration checklists and rules.