Final Flashcards
Incident response handling consists of:
Incident reporting
Incident analysis
Incident response
Incident life cycle phases
Preparation
Detection, collection, and analysis
Containment, eradication, and recovery
Post-incident activity: documenting, reporting, reviewing the incident
Collecting Digital Evidence
Preserve incident-related data ASAP
Collect volatile data first then non-volatile
Clearly defined chain of custody: to prevent allegations of tampering of evidence; keep detailed log of each step with photos
Risk
function of the probability of occurrence of a loss and the cost of a loss
Threat
Potential cause of an incident
Vulnerability
Weakness of asset(s) that can be exploited by a threat
Six Processes in Risk assessment
Context establishment Risk assessment Risk treatment Risk acceptance Risk communication and consultation Risk monitoring and review
Context Establishment
Prerequisite: understand organization (business purpose, mission, values, ect), determine purpose of process, set basic criteria, scope, boundaries, establish organization operating the process
3 Subprocesses
- Risk Identification
- Risk Analysis
- Risk Evaluation
Risk Identification
identify what/how/where/why could happen
Risk analysis
Quantitative: use numerical values to describe magnitude of potential consequences and their likelihood
Qualitative: use high-med-low scale
Risk evaluation
Compare risk level with risk acceptance criteria
Output: prioritized list of risks
Risk Treatment
- select security measures(reduce, retain, avoid/transfer risk)
- reduce risk by reducing: threat’s potential, impact of successful attack
- security measure evaluation: cost, efficiency/effectiveness, timeframe
Risk communication & consultation
Residual risks: Risk level that remains after security measures have been applied
Goal of risk communication: Establish a common understanding of risk among the organization’s stakeholders
Plan for communication under both normal and emergency conditions
Risk monitoring & review
Risk management is a never-ending process
Regularly review threats and security measures : Performance may degrade over time
Conduct regular internal, independent audits
Keep documentation up to date
Type of occurrences to consider
Loss of Internet access
Loss of bidirectional communication
Loss of life
Loss of data
Physical Security Threat categories
Environmental threats
Technical threats
Human-caused threats
Environmental Threats
Inappropriate temperature and humidity Fire and smoke Chemical, radiological, and biological hazards Water damage Dust Infestation
Technical Threats
Electrical power: undervoltage, dips in voltage supply, brownouts, power outages
Electromagnetic interference
Human-Caused Physical Threats
Unauthorized access, Theft, Vandalism/misuse
Reconnaissance tools
Ping, traceroute, port scan, os discovery, vulnerability scanner
Compromise Tools
pass attacks, exploit attack code, buffer overflow, SQL injection, automated custom attack toolkits, social engineering
Cover-up Methods
change logs, rootkits, tunneling, encryption, fragment IP packets