Incident response Flashcards

1
Q

workplace

A

Team dedicated to IR

Team that deals with cyber security and IR

Team that deals with IR and the digital forensics that follows

An outsourced team that deal with cyber security, IR and digital forensics

Could work in lab and have artefacts handed to you to work on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

give 5 examples of an incident

A

Data breach

DDoS attack on a network

Malware infection

Unauthorised access

Murder, robbery, fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is IR in digital forensics

A

Digital forensic professional would deal with digital devices aspects or an incident not the blood splatter etc

Might be given artefacts

Might have to go and collect digital artefacts yourself

Might have to let another team have an artefact to analyse the blood on it etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

dealing with an incident

A

Varies depending on job role and incident

First digital forensics person there

Public sector – crime scene

Private sector – organisations building, policy violations

If you are called to perform an investigation within an organisation, you might have some policy violations, you might have some laws broken, you might not know until you start investigating and you might not know how serious an incident is initially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the 6 stages on incident response

A
plan
respond
acquire
analyse
report
learn
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is stage 1 of the incident response

A

preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

stage 1 of incident response - preparation

A

Always have a plan

Need to have tools

Set up your lab

Have procedures in place

Organisations may have a set of policies that will feed into your plans and procedures, you should also follow ACPO and the law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an IR plan

A

About how does what, when

Mission statement

Incident severity list

Communication tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

incident severity list

A

A plan might list incidents in order of severity, prioritising dealing with certain aspects in particular ways depending on how sever the incident is. May also depend on size of team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

communication tree

A

so everyone in the team and externally who will be part knows who they need to communicate with and report to, along with the appropriate contact info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

field tool kit

A

You can use
- If you can’t explain what you did and how it changed the original data you are not competent to use that tool to touch the original data

Reliable

Verifiable

Effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

procedures

A

flow chart

adopt pre-defined procedural chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

stage 2 of incident response - respond - the call out

A

Can get a call out to attend a crime scene

Read case brief

May need help from colleagues
- Still your responsibility to ensure ACPO is followed by everyone

Allows you to work out what you can seize as evidence at the crime scene, and what you might need to add to a warrant request

May need to check a warrant gives you the ability to collect enough devices at a crime scene and hasn’t just been written up as a specific device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

stage 2 of incident response - respond - at the crime scene

A

Sketch

Photograph

Contemporaneous notes

Chain of custody

Bag and tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

stage 2 of incident response - respond - dealing with devices

A

A computer powered on

A computer powered off

A laptop

A mobile phone

A digital camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

stage 3 of incident response - acquire

A

After numbering artefacts, taking photographs and all the paperwork, can start acquisition process

If device is powered off, then it is fairly easy to deal with

If device is powered on, then it is more complex

Might need to forensically image a device at the scene

17
Q

stage 4 of incident response - analysis - back at the lab

A

Analyse each of the artefacts collected from the crime scene

Mobile phones: XRY & XAMN

Computer/laptop hard drives: FTK imager, FTK, registry viewer

Digital pictures/photographs: FTK, griffeye

18
Q

stage 5 of incident response - reporting

A

2 main forms of reporting within digital forensics:

  • Technical report = technical details about what you found during the analysis of the artefacts, explained clearly so non-technical readers can follow the report through
  • Expert witness report = takes key findings from the technical report and reports them to the court. They contain the technical details in plain English as well as some legal terms
19
Q

stage 6 of incident response - learn - plan

A

What happened?

Improvements?

CPD?

Plan for next time?