Detection and Analysis Flashcards
2nd Phase of Incident Response Plan
1
Q
Network-Related Indicators
A
Bandwidth
Beaconing
Irregular P2P communication
Rogue devices
Common protocols over nonstandard ports
2
Q
Host-Related Indicators
A
Capacity consumption
Unauthorized software
Whitelisting - modifying this list
Malicious processes
Memory contents
Unauthorized changes
File system
Unauthorized privileges
Data exfiltration
Registry changes
Unauthorized scheduled tasks
3
Q
Application-Related Indicators
A
Anomalous activity
New accounts
Unexpected output
Unexpected outbound communication
Service interruption
Memory overflows
Application logs
4
Q
Evidence acquisitions
A
Chain of custody
Validating data integrity
Preservation
Legal hold
5
Q
Data and log analysis
A
SPLUNK