Final Flashcards

1
Q

Incident response handling consists of:

A

 Incident reporting
 Incident analysis
 Incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident life cycle phases

A

 Preparation
 Detection, collection, and analysis
 Containment, eradication, and recovery
 Post-incident activity: documenting, reporting, reviewing the incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collecting Digital Evidence

A

 Preserve incident-related data ASAP
 Collect volatile data first then non-volatile
 Clearly defined chain of custody: to prevent allegations of tampering of evidence; keep detailed log of each step with photos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk

A

function of the probability of occurrence of a loss and the cost of a loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

Potential cause of an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

Weakness of asset(s) that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Six Processes in Risk assessment

A
 Context establishment 
 Risk assessment 
 Risk treatment 
 Risk acceptance 
 Risk communication and consultation 
 Risk monitoring and review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Context Establishment

A

Prerequisite: understand organization (business purpose, mission, values, ect), determine purpose of process, set basic criteria, scope, boundaries, establish organization operating the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 Subprocesses

A
  1. Risk Identification
  2. Risk Analysis
  3. Risk Evaluation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Identification

A

identify what/how/where/why could happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk analysis

A

 Quantitative: use numerical values to describe magnitude of potential consequences and their likelihood
 Qualitative: use high-med-low scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk evaluation

A

 Compare risk level with risk acceptance criteria

 Output: prioritized list of risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Treatment

A
  • select security measures(reduce, retain, avoid/transfer risk)
  • reduce risk by reducing: threat’s potential, impact of successful attack
  • security measure evaluation: cost, efficiency/effectiveness, timeframe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk communication & consultation

A

 Residual risks: Risk level that remains after security measures have been applied
 Goal of risk communication: Establish a common understanding of risk among the organization’s stakeholders
 Plan for communication under both normal and emergency conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk monitoring & review

A

 Risk management is a never-ending process
 Regularly review threats and security measures : Performance may degrade over time
 Conduct regular internal, independent audits
 Keep documentation up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Type of occurrences to consider

A

 Loss of Internet access
 Loss of bidirectional communication
 Loss of life
 Loss of data

17
Q

Physical Security Threat categories

A

 Environmental threats
 Technical threats
 Human-caused threats

18
Q

Environmental Threats

A
 Inappropriate temperature and humidity
 Fire and smoke
 Chemical, radiological, and biological hazards
 Water damage
 Dust
 Infestation
19
Q

Technical Threats

A

 Electrical power: undervoltage, dips in voltage supply, brownouts, power outages
 Electromagnetic interference

20
Q

Human-Caused Physical Threats

A

Unauthorized access, Theft, Vandalism/misuse

21
Q

Reconnaissance tools

A

Ping, traceroute, port scan, os discovery, vulnerability scanner

22
Q

Compromise Tools

A

pass attacks, exploit attack code, buffer overflow, SQL injection, automated custom attack toolkits, social engineering

23
Q

Cover-up Methods

A

change logs, rootkits, tunneling, encryption, fragment IP packets