Incident Response, BCP, DRP, Backups (Lesson 16) Flashcards

1
Q

Incident Examples

A
A Computer Intrusion.
 Denial of Service Attack.
 Theft of information.
 Computer Misuse.
 A power failure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident Response Goals

A

Confirms or disproves an Incident.
Accumulate accurate and timely information.
The proper retrieval and handling of Evidence.
The protection of privacy rights as established by law and policy.
Minimal disruption of business and network operations.
The legal or civil action against offenders.
Accurate reports and useful recommendation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident Response Preparation

A
Risk Management.
 Host preparation.
 Network Preparation.
 Network Policies and Procedures.
 A Response toolkit.
 The Incident Response Team.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incident Response Priorities in order of importance

A

P1 - Protect human life and safety.
P2 - Protect classified and sensitive data.
P3 - Protect proprietary, scientific and managerial data.
P4 - Prevent damage to systems.
P5 - Minimize service disruption of computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Incident discovery

Strange activities

A
System crashes
 Unusual hard disk activity.
 Unexplained Reboots.
 Account discrepancies
 Sluggish response
 Strange login hours.
 Failed logins with bad passwords.
 Unusual activity  with the su command.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

finger

A

a protocol to find out about an individual user or users logged onto a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

users command

A

Checks the file /etc/utmp and displays the users logged onto the system. UNIX keeps track of who is logged onto the system in a file called /etc/utmp.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ps command

A

Provides a snapshot of all processes running on the system at any given moment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

netstat command

A

Lists all the active and pending TCP/IP connections between your machine and other machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

lastcomm command

A

Checks the file /var/adm/acct and prints out a list of commands executed by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ttywatch command

A

A utility that allows the System Administrator to monitor every tty on their system and allows them to record the keystrokes for later playback (similar to a VCR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

traceroute command

A

A utility that allows the System Administrator to trace the route of an IP packet from their host to a particular foreign host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stopping the Intruder.

A

Power Down?
-Interrupts users.
-Deletes evidence
-Damage the file systems.
Ask him/her to leave?
-Intruder may damage the system to prevent being caught.
Kill his/her processes?
-Use the ps command to list all his/her processes.
-Change all compromised account passwords.
-Use the kill command to terminate the processes.
-Check for backdoors/sniffers/undesired programs.
Break the connection?
-Interrupts other users.
What about kernel level activity?
-Changes to the kernel may negate ability to accomplish some of the checks we mentioned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer Forensics Principles

A

P1: Preserve the evidence in an unchanged state. (think Forensic Image)
P2: Thoroughly and completely document the Investigative Process. (chain-of-custody)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Four different types of Backups

A

Full: Backup everything every time
Differential: only backup that which has changed since the last full backup (typically)
Incremental: Only backup that which has changed since the last full or incremental backup.
Delta: backup only the portions of files that have changed since the last delta or full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BCP

A

Business Continuity Plans

17
Q

Three phases to the BCP

A

Continuation of activities: enable a very limited set of functions, the essentials for business to continue.
Resumption of activities: provide for a full, or almost full, range of business functions.
Restoration of activities: bring back a normal operating environment in a permanent facility.

18
Q

BIA

A

Business Impact Assessment/Analysis (BIA): used to determine what is important for inclusion in the BCP/DRP. Will assess how unavailability of each system/process would affect the organization.

19
Q

DRP

A

Disaster Recovery Plan