Domain 4 - Incident Response and Recovery Flashcards
IP Plan Elements
- Statement of Purpose
- Strategies and goals for incident response.
- Approach to incident response.
- Communication with other groups.
- Senior leadership approval.
NIST SP 800-61
Incident Response Plan
Communication Plans
Ensure that all participants have timely, accurate information.
What is crucial for effective incident identification?
Monitoring.
SIEM
SECURITY INCIDENT AND EVENT MANAGEMENT
Security solution that collects information from diverse sources, analyzes it for signs of security incidents, and retains it for later use.
First responder responsibilities
Isolate affected systems
Highest priority of a first responder must do what?
Containing damage through isolation.
Second Step for First Responder?
Escalate and Notify
Containment Strategy Evalutation
- Damage Potential
- Evidence Preservation
- Service availability
- Resource requirements.
- Expected effectiveness.
- Solution Time frame
Evidence types
Real - Tangible Objects
Documentary - Written/Digital Information
Testimonial - Witness Statements.
Documentary Evidence Rules
- Must be authenticated (testify)
- Best Evidence Rule
- Parol Evidence Rule
Best Evidence Rule
Original documents are superior to copies.
Parol Evidence Rule
Written contracts are assumed to be the entire agreement.
Forms of Testimonial Evidence
- Direct - Witness provides evidence
2. Expert Opinion - Expert draws conclusions.
Goal of Digital Forensics
Investigate techniques that collect, preserve, analyze, and interpret digital evidence.
Volatility
Relative permanence of a piece of evidence; evidence that may not last long is more volatile than more permanent sources of evidence.
Order of Volatility
- Network Traffic
- Memory Contents
- System and Process Data
- Files
- Logs
- Archive records
Risk to transferring data during evidence?
That data will be added to device.
Device used to prevent accidental modification of disks during imaging?
Write Blockers or Forensic Disk Controllers.
What is used to protect digital evidence from being tampered with?
Hashes
Flaw with Full Packet Capturing?
Requires a lot of storage.
What does Netflow Capture?
High level info - IP addresses and ports; timestamps; amount of data transferred.
What devices capture Netflow data?
Routers and Firewalls
2 Uses of Software Forensics
Intellectual Property & Malware Origin
Embedded Devices
Special-purpose computers found inside smart devices found in homes, businesses, and industrial settings.
What provides a paper trail for evidence?
Chain of Evidence OR Chain of Custody
Evidence Log Events
- Initial Collection
- Transfer
- Storage
- Opening & Resealing the container
Evidence Log Entry Details
- Investigator Name
- Date and Time
- Purpose
- Nature of Action
3 Components to Incident Reporting
- Notification
- Real Time Updates
- Documentation
Who must the Federal Government notify of Cybersecurity incidents?
US-CERT
What do Formal Incident Reports have?
Historical Documentation.
3 Major Steps in the Electronic Discovery Process
- Preservation - Litigation Hold & Suspending automatic deleting.
- Collection - Documents on file servers, endpoint servers, email messages, enterprise systems.
- Production - Documents provided to attorneys.
Litigation Hold
Require the preservation of relevant electronic and paper records.
Federal Law requires Businesses to report incidents to US-Cert?
No.
During what phase of e-discovery does an organization share information with the other side?
Production
Business Continuity Planning (BCP)
Set of controls designed to keep a business running in face of an adversity. Natural or man-made.
Business Continuity Plan is part of what core security concept?
Availability.