Final Flashcards
Incident response handling consists of:
Incident reporting
Incident analysis
Incident response
Incident life cycle phases
Preparation
Detection, collection, and analysis
Containment, eradication, and recovery
Post-incident activity: documenting, reporting, reviewing the incident
Collecting Digital Evidence
Preserve incident-related data ASAP
Collect volatile data first then non-volatile
Clearly defined chain of custody: to prevent allegations of tampering of evidence; keep detailed log of each step with photos
Risk
function of the probability of occurrence of a loss and the cost of a loss
Threat
Potential cause of an incident
Vulnerability
Weakness of asset(s) that can be exploited by a threat
Six Processes in Risk assessment
Context establishment Risk assessment Risk treatment Risk acceptance Risk communication and consultation Risk monitoring and review
Context Establishment
Prerequisite: understand organization (business purpose, mission, values, ect), determine purpose of process, set basic criteria, scope, boundaries, establish organization operating the process
3 Subprocesses
- Risk Identification
- Risk Analysis
- Risk Evaluation
Risk Identification
identify what/how/where/why could happen
Risk analysis
Quantitative: use numerical values to describe magnitude of potential consequences and their likelihood
Qualitative: use high-med-low scale
Risk evaluation
Compare risk level with risk acceptance criteria
Output: prioritized list of risks
Risk Treatment
- select security measures(reduce, retain, avoid/transfer risk)
- reduce risk by reducing: threat’s potential, impact of successful attack
- security measure evaluation: cost, efficiency/effectiveness, timeframe
Risk communication & consultation
Residual risks: Risk level that remains after security measures have been applied
Goal of risk communication: Establish a common understanding of risk among the organization’s stakeholders
Plan for communication under both normal and emergency conditions
Risk monitoring & review
Risk management is a never-ending process
Regularly review threats and security measures : Performance may degrade over time
Conduct regular internal, independent audits
Keep documentation up to date