INCIDENT RESPONSE Flashcards

1
Q

Breach

A

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where: a person other than an authorized user accesses or potentially accesses personally identifiable information; or an authorized user accesses personally identifiable information for other than an authorized purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Event

A

Any observable occurrence in a network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploit

A

A particular attack. It is named this way because these attacks exploit system vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incident

A

An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intrusion

A

A security event, or combination of events, that constitutes a deliberate security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations or the nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

Weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a threat source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero Day

A

A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident Response

A

The priority of any incident response is to protect life, health and safety. When any decision related to priorities is to be made, always choose safety first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incident management goal

A

The primary goal of incident management is to be prepared. Preparation requires having a policy and a response plan that will lead the organization through the crisis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident Response

A

The incident response process is aimed at reducing the impact of an incident so the organization can resume the interrupted operations as soon as possible. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident Response goal

A

The priority of any incident response is to protect life, health and safety. When any decision related to priorities is to be made, always choose safety first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Incident response plan

A

 An incident response plan that will help preserve business viability and survival.
The incident response process is aimed at reducing the impact of an incident so the organization can resume the interrupted operations as soon as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IR Plan (1) Preparation

A

Preparation
-Develop a policy approved by management.
-Identify critical data and systems, single points of failure.
-Train staff on incident response.
-Implement an incident response team
-Practice Incident Identification. (First Response)
-Identify Roles and Responsibilities.
-Plan the coordination of communication between stakeholders.
-Consider the possibility that a primary method of communication may not be available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IR Plan (2) Detection Analysis

A

Detection and Analysis
-Monitor all possible attack vectors.
-Analyze incidents using known data and threat intelligence.
-Prioritize incident response.
-Standardize incident documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IR plan(3) Containment

A

Containment
-Gather evidence.
-Choose an appropriate containment strategy.
-Identify the attacker.
-Isolate the attack.

17
Q

IR plan (4) Post Incident Activity

A

Post-Incident Activity
-Identify evidence that may need to be retained.
-Document lessons learned.
-Retrospective
-Preparation
-Detection and Analysis
-Containment, Eradication and Recovery
-Post-incident Activity
-PreparationDetection and AnalysisContainment, Eradication and -RecoveryPost-incident Activity

18
Q

A typical incident response team

A

-Representative(s) of senior management
-Information security professionals
-Legal representatives
-Public affairs/communications representatives
-Engineering representatives (system and network)

19
Q

These teams are commonly known as computer incident response teams (CIRTs) or computer security incident response teams (CSIRTs). When an incident occurs, the response team has four primary responsibilities:

A

-Determine the amount and scope of damage caused by the incident.
-Determine whether any confidential information was compromised during the incident.
-Implement any necessary recovery procedures to restore security and recover from incident-related damage.
-Supervise the implementation of any additional security measures necessary to improve security and prevent recurrence of the incident.