Incident Response Flashcards
List 6 types of events incident responses can be initiated by
- Automated detection systems or sensor alerts
- Agency user report
- Contractor or third-party ICT service provider report
- Internal or external organizational component incident report or situational awareness update
- Third-party reporting of network activity to known compromised infrastructure, detection of malicious code, loss of services, etc.
- Analytics or hunt teams that identify potentially malicious or otherwise unauthorized activity
List the 7 steps that advanced persistent threats follow to accomplish their objective and a description (Cyber Kill Chain)?
- Reconnaissance - harvesting email addresses, conference information and the like
- Weaponization - coupling exploit with backdoor into deliverable payload
- Delivery - delivering weaponized bundle to the victim via email, web, USB and others
- Exploitation - exploiting a vulnerability to execute code on victim’s system
- Installation - installing malware on asset
- Command and control - using command channel for remote manipulation of victim
- Actions on Objectives - accomplishing intruders original goals with “hands on keyboard” access
List the 5 Vulnerability and Incident Response Categories
- Incident
- Major Incident
- Breach
- Event
- Vulnerabilities
List the 6 Incident Response Phases
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons Learned
What are 4 Preparation Questions?
- Has everyone been trained on security policies?
- Have your security policies and incident response plan been approved by appropriate management?
- Does the Incident Response Team know their roles and the required notifications to make?
- Have all Incident Response Team members participated in mock drills?
What are 7 Identification Questions
- When did the event happen?
- How was it discovered?
- Who discovered it?
- Have any other areas been impacted?
- What is the scope of the compromise?
- Does it affect operations?
- Has the source (point of entry) of the event been discovered?
What are 7 Containment Questions?
- What’s been done to contain the breach short term?
- What’s been done to contain the breach long term?
- Has any discovered malware been quarantined from the rest of the environment?
- What sort of backups are in place?
- Does your remote access require true multi-factor authentication?
- Have all access credentials been reviewed for legitimacy, hardened and changed?
- Have you applied all recent security patches and updates?
What are 3 Eradication Questions?
- Have artifacts/malware from the attacker been securely removed?
- Has the system be hardened, patched, and updates applied?
- Can the system be re-imaged?
What are 5 Recovery Questions?
- When can systems be returned to production?
- Have systems been patched, hardened and tested?
- Can the system be restored from a trusted back-up?
- How long will the affected systems be monitored and what will you look for when monitoring?
- What tools will ensure similar attacks will not reoccur? (File integrity monitoring, intrusion detection/protection, etc)
What are 4 Lessons Learned Questions?
- What changes need to be made to the security?
- How should employee be trained differently?
- What weakness did the breach exploit?
- How will you ensure a similar breach doesn’t happen again?
Based on the Experian Data Breach Response Guide what is the average cost per lost or stolen record?
$148
Based on the Experian Data Breach Response Guide what is the average cost savings per record with an incident response team?
$14
Based on the Experian Data Breach Response Guide what is the number of records compromised in 2017 due to employee negligence or error?
145,927,550
Based on the Experian Data Breach Response Guide what is the average cost of a data breach?
$3.86 million
Who makes up the response team (8)?
- Customer Care
- Executive Leaders
- Incident Lead
- IT
- Legal
- PR
- HR
- Key outside partners