Module 3: Incident Response and Handling Steps Flashcards
What can be used to detect information system security breaches
Intrusion Detection System (IDS)
What are common symptoms of a security incident
- Suspicious log entries
- The IDS generates an alarm
- Presence of unexplained user accounts on the network
- Presence of suspicious files
- Modified files or folders
- Unusual services running or ports opened
- Unusual system behavior
- Icons of drive changed/drives not accessible
- Number of packets received are more than expected
What is Incident Handling (IH)
A set of procedures to overcome the various kinds of incidents caused by the various vulnerabilities in the systems
What are the three basic functions of Incident Handling
- Incident reporting
- Incident analysis
- Incident response
What is Incident Response (IR)
To identify the attacks or incidents or incidents that have compromised the personal and business information in the system
Why is Incident Response required
- Protect Systems
- Protect Personnel
- Efficiently use the resources
- Address legal issues
What are the goals of Incident Response
- Examining whether or not the incident occurred
- Limiting the impact of incident on business and network operations
- Preventing future attacks or incidents
- Supporting enhancement of accurate information
- Creating guidelines and control measures for proper recovery and handling of evidence
- Safeguarding privacy rights recognized by law and policy
- Identifying illegal activity and taking legal action
- Providing useful recommendations with precise reports
- Swift detection, reporting, containment and recovery after an incident
- Limiting the exposure and compromise of the business data
- Securing the organization’s reputation and assets
What is an Incident Response Plan
It is a set of instructions to detect and respond to an incident
What is the team created for responding to the incident response plan
The Incident Response Team
The Incident Response Plan covers
- How information is passed to the appropriate personnel
- Assessment of the incident
- Incident containment and response strategy
- Restoration of systems and resource
- Documentation of the incident
- Preservation of the evidence
- Reporting of the incident to the appropriate personnel
What does an Incident Response Plan require these essential per-requisites
- Expert teams
- Legal review and approved strategy
- Company’s financial support
- Support from the top management
- Corrective action plan
- Physical resources
What is the most important aspect of incident handling and response
Preparation
How does preparation help the organization and incident response teams
It prepares them for a comprehensive risk response that include planning, risk assessment, control implementation, and resource allocation
What is an Incident Response Team
A team of experts capable of handling any computer security incidents that may occur in your organization
What does the Incident Response Team need to prepare for an incident
- Hardware and software for investigating incidents
- Forms and reports to investigate
- Policies and SOP’s
- Training programs for staff to prepare for incidents
What are the 17 steps of Incident Response and Handling
- Identification
- Incident Reporting
- Initial Response
- Communicating the Incident
- Containment
- Formulating a Response Strategy
- Incident Classification
- Incident Investigation
- Data Collection
- Forensic Analysis
- Evidence Protection
- Notifying External Agencies
- Eradication
- Systems Recovery
- Incident Documentation
- Incident Damage and Cost Assessment
- Review and Update the Response Policies
What is done in Step 1 Incident
An incident is analyzed for its nature, intensity, and its effects on the network and systems
Incident identification involves
- Validating an incident
- Identifying the nature of an incident
- Identifying and protecting the evidence
- Logging and making a report of whatever anomalies are observed
What actions are taken in the identification phase
- Audit log collection, examination, and analysis
- Incident Reporting and assessment
- Collect/protect system information
- Incident severity level
- Other systems analysis
- Assign members to incident task force
What is Step 2 Incident Recording
The process of storing the details of occurrence of an incident accurately
What information should be recorded
- The date and time of the incident occurred
- The date and time the incident was detected
- Who has reported the incident
- Description of the incident
- Systems involved
- Backup info such as error messages, log files, etc.
What is Step 3 Initial Response
It is the steps to be followed while responding to an incident are documented
What is Step 4 Communicating the Incident
A process where it helps in reducing the impact of the incident by facilitating a better coordination between different stakeholders affected with incident.
What is Step 5 Containment
To reduce loss and damage due to attacks by eliminating threat sources
What are the common techniques used in Containment
- Disabling of specific system services
- Changing of passwords and disabling account
- Complete backups of the infected system
- Temporary shutdown of the compromised system
- System Restoration
- Maintaining a low profile
What is the goal of Step 6 Formulating a Response Strategy
The goal of response strategy is to examine the most appropriate response procedure
What is the goal of Step 7 Incident Classification
Classifying incidents based on the severity of the incident with a high, medium, or low level
How is an incident classified
- Categorization (type of incident)
- Priority level
- Resource allocation
What is the goal of Step 8 Incident Investigation
Identifying the perpetrators who are responsible for the occurrence of incident
What is the investigation phase capable of determining
- Who is responsible for the incident?
- What is the reason behind the incident?
- When did the incident occur?
- Where exactly the incident happened?
- How to recover from the incident?
What are the two different phases in a computer security investigation
- Data collection
* Forensic analysis
What is the goal of Step 9 Data Collection
The process of gathering known facts and evidence that are required for forensic analysis