Lessons 20-24 Flashcards
SCRIPTING TOOLS
- python- A high-level, versatile programming language. ( Writing scripts, building websites, data analysis, automation, machine learning.)
- Powershell- A task automation and configuration management framework from Microsoft, consisting of a command-line shell and scripting language. ( Managing Windows systems, automating administrative tasks.)
- Bash- A Unix shell and command language. ( Running commands and scripts on Unix/Linux systems, automating tasks.)
- Macro- A set of instructions that automate repetitive tasks within software applications. (Automating tasks in applications like Microsoft Excel or Word.)
SCRIPTING
A set of instructions used to automate a sequence of repetitive tasks
VBA ATTACK
Visual Basic for Applications) attack is a type of cyber attack that exploits the VBA programming language used in Microsoft Office applications like Excel, Word, and Access. Attackers embed malicious VBA code into Office documents, and when the document is opened and macros are enabled, the code executes, potentially compromising the user’s system.
Security orchestration automation and response (SOAR)-
an automation tool that reduces response times, improves consistency and amplifies the productivity of incident response teams.
INCIDENT MANAGEMENT
Is Inclusive of roles and responsibilities, strategies, and procedures for preparing for, responding to, and managing security incidents
Security incident-
an event or action that endangers the confidentiality, integrity, or availability of information or information systems.
Data breach
when data is exfiltrated or extracted, or there is a loss of control. A data breach may trigger reporting and notification requirements.
Incident prevention & Incident preparation-
- threat modeling, risk assessment, controls implementation, monitoring, and assurance activities.
- planning, documenting, assigning responsibilities, training, and practicing response capabilities.
Incident detection & Incident response
- monitoring incident reporting, analysis, and participation in threat intelligence and information-sharing activities.
- validation, containment, mitigation, eradication, recovery, and evaluation activities.
INCIDENT PLAYBOOK
Is a set of instructions for planning for, and responding to, a specific type of event, attack or scenario
Categorization
the process of classifying incidents based on severity.
Escalation thresholds
the point at which an incident or issue requires a higher level of attention or response.
INCIDENT RESPONSE TEAM
IRT
a group of experts who are responsible for managing and responding to cybersecurity incidents within an organization.
Walkthrough
personnel or departments review (walkthrough) their plans and procedures for completeness. Accuracy is the objective
Tabletop
scenario-based group workshop focuses on the application of plans and procedures as well as participant readiness. Objectives are familiarity, coordination, and accuracy.
Simulation-
a localized scenario that simulates an actual event. A pre-planned simulation is scheduled, and attendees are invited. Surprise simulation, attendees are notified “at the moment” objective: readiness
VALIDATION
Determine whether an incident has occurred and, if so, the type, extent, and magnitude of the problem
Indicator-
tells us that something is happening or has happened
PRIORITIZATION
The process of determining the order of importance or urgency. It is the most critical decision point in the incident handling process.
CONTAINMENT
A short-term approach to limiting or reducing the impact of an incident
ERADICATION
Is inclusive of the steps taken to correct and or eliminate the root cause (not just the symptoms) that led to the incident
Root cause analysis (RCA)
a method of problem-solving used to investigate known problems and identify what happened and the underlying causes
The main goal of RCA is to prevent the problem from recurring by eliminating the root cause
CYBER INVESTIGATIONS
Can be triggered by a variety of incidents. (intrusion, extortion, insider activity)
3 types of investigations: criminal, civil, and internal (administrative)
Evidence collection is the first step of the investigation.
Direct evidence
supports the truth of an assertion directly
Circumstantial evidence
relies on inference to connect it to a conclusion of fact.
E-DISCOVERY
Refers to any process in which digital data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal law case.
A legal hold
an order that suspends the modification, deletion, or destruction of records or media. Can be issued to avoid evidence spoliation
evidence spoliation
the intentional, reckless, or negligent withholding, hiding, altering, fabricating, or destroying evidence.
EVIDENCE COLLECTION
Collection of digital evidence is the first step of a forensic investigation.
Governed by 2 main rules
Admissibility of evidence- whether the evidence can be used in court
Weight of evidence- the quality and completeness of the evidence
There is tension between response(find and fix) teams and evidence collectors.
VOLATILITY
The acquisition of evidence before it disappears is overwritten or is no longer useful
The goal is to create a snapshot of the environment as it existed at the time of the attack or incident
Persistent data-
data that does not change and is preserved when the device is turned off
Volatile data
data that easily degrade and can be lost when the device is turned off.
chain of custody
is chronoligiacl documentation that records the collection, control, transfer, analysis, and disposition of evidence.
Factual witness
a person who is knowledgeable about the facts of the case through direct participation or observations
Expert witness
a person who has knowledge beyond that of an ordinary person. Experts can give opinions
DIGITAL FORENSICS
The application of science to the identification, collection, examination, and analysis of data (evidence) while preserving the integrity of the information.
CHECKSUM INTEGRITY
A checksum is a single value derived from a block of digital data to detect errors that may have been introduced during its transmission or storage
Checksums are like hashes as they are used to verify data integrity however, they use simpler algorithms and are smaller than hashes.
FILE RECOVERY TERMINOLOGY
Cluster- a fixed length block of disk space indexed in a file allocation table or equivalent
Slack space- The space between the end of a file and the end of a cluster. Slack spaces can contain data from RAM or segments of deleted files
Unallocated (free) space- are clusters that are not allocated to a file. Clusters can contain deleted file fragments.
Carving is the process by which deleted files or fragments are recovered
Metadata- data about data
write blocker
used to intercept inadvertent drive writes
clone
exact copy of the entire physical hard drive.
DATA BREACH
an incident where unauthorized individuals or entities gain access to legally protected or confidential information stored by an organization, resulting in the potential misuse, loss, theft, or exposure of that data.
THE DARK WEB
Is part of the internet that in not indexed by search engines and is known for its anonymity. Compromised data often ends up on the dark web after a data breach occurs.
Disclosure
the requirements to reveal the situation
Notification
the act of informing affected parties
INFORMATION SHARING
Describes a means of conveying information or experience from one trusted party to another
An information sharing and analysis center (ISAC)
is a trusted sector-specific entity that facilitates sector-specific and or geographic-specific information sharing about vulnerabilities, threats, and incidents