Module 1: Introduction to Incident Response and Handling Flashcards

1
Q

What is a Computer Security Incident

A

A computer security incident might be any real or suspected adverse event in relation to the security of computer systems or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Security Attacks

A
  1. Repeated unsuccessful login attempts
  2. Unavailability of services due to DDoS
  3. Unintentional modifications to software/hardware/firmware
  4. Unauthorized use of systems
  5. System and application crashes
  6. Unauthorized use of other user’s accounts
  7. Gaining admin privilege to perform unauthorized access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Five levels of Data Classification

A
  1. Top Secret
  2. Highly confidential Information
  3. Proprietary Information
  4. Information of Internal Use
  5. Public documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Information System

A

It is a computer system that modifies the raw data into useful information to attain specific goals for an organization or an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Information Owner

A

This is a person who first creates, or initiates the creation or storage of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Information Custodian

A

This is a person who controls and implements security required to protect the information assets classified by the information owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Different forms of information warfare

A
  1. Hijacking television and radio transmissions
  2. Jamming television and radio transmissions
  3. Disabling logistics networks
  4. Spoofing or disabling the communication networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Weapons in information warfare

A
  • Viruses
  • Worms
  • Trojan Horses
  • Logic Bombs
  • Trap Doors
  • Rootkits
  • Chipping
  • Nano machines and Microbes
  • Electronic jamming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Key Concepts of Information Security

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is Confidentiality maintained?

A

Through user’s authentication and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does integrity refer to?

A

The reliability and trustworthiness of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a vulnerability

A

It is a flaw or weakness in the system, if exploited, might result in undesirable events such as compromise of security, violation of system integrity, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examples of a vulnerability

A
  • Weak passwords
  • Software bugs
  • Virus or malware
  • Script code injection or a SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a threat

A

It is an event, person, or circumstance that has the ability to damage the system by altering, deleting, disclosing of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack

A

Attack is the deliberate action of causing harm to the computer systems by exploiting known vulnerabilities and threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of Computer Security Incidents

A
  1. Malicious code or Insider Threat Attacks
  2. Unauthorized Access
  3. Unauthorized Use of Services
  4. Espionage
  5. Fraud and Theft
  6. Employee sabotage and abuse
  7. DoS
  8. Misuse
17
Q

Typical indications of security incidents

A
  • Failed logon attempts and creation of new user accounts
  • The IDS, IPS, firewalls, and system alerts
  • Log entries and audit files showing suspicious entries
  • Network slowdown, DoS attacks, and denial of login to legitimate users
  • Detecting of network traffic capturing devices like sniffers on the network
  • Unusual system crashes or poor system performance
  • Unusual occurrence of the security incident
  • Unusual usage patterns
18
Q

What is a Precursor Incident

A

Indicates the possibility of occurrence of a security incident.

19
Q

What is a Indication Incident

A

Implies that an incident has probably occurred or is in progress.

20
Q

Low level Incidents

A
  • Loss of personal password
  • Unsuccessful scans and probes in the network
  • Request to review security logs
  • Presence of any computer virus or worms
  • Failure to download anti-virus signatures
  • Suspected sharing of the organization’s accounts
  • Minor breaches of the organization’s acceptable use policy
  • Compromise of the system password
  • Unknown sharing of the company’s account
  • Misuse of the computer peripherals
21
Q

Middle Level Incidents

A
  • In-active external/internal unauthorized access to systems
  • Unfriendly employee termination
  • Localized worm/virus outbreak
  • Breach of the organization’s acceptable usage policy
22
Q

High Level Incidents

A
  • DoS attacks
  • Suspected break-in in any computer of a company
  • The presence of harmful malware
  • Cyber terrorism
23
Q

What are the two factors to prioritize an incident

A

Technical effect & criticality of the affected resources

24
Q

What is the goal of Incident Response

A

To handle the security incident in such a way that it reduces the damage and minimizes the cost and time to recover from the incident

25
Q

Who is in charge of Incident response

A

The Incident Response Team of the organization

26
Q

What is Incident Handling

A

It refers to a set of procedures and policies used to prepare for, detect, and overcome security incidents in an organization

27
Q

What is Incident Reporting

A

The process of reporting the information regarding the encountered security breach in a proper format.

28
Q

What is the time frame to handle incidents if they are a low-level incident

A

1 working day

29
Q

What is the time frame to handle incidents if they are a middle-level incident

A

Within a few hours on the same day of its occurrence

30
Q

What is the time frame to handle incidents if they are a high-level incident

A

These incidents are to be handled immediately