Module 4 Flashcards
4 steps to incident response life cycle
from NIST 800-61 R2
- Preparation
- Detection and Analysis
- containment, eradication, recovery
4 post incident activity
what are the 4 functional impact categories and explain them
- None
- Low
- Medium
- High
what are the four informational impact categories
- None
- privacy breach
- proprietary breach
- integrity loss
list 7 incident attack vectors
- External/Removable media
- attrition - brute force methods
- web
- improper usage - resulting from a violation of acceptable use policies
- loss or theft of equipment
7, other - this attack does not fit in the other categories
what incident response life cycle step do the actions below belong in
- choosing a containment strategy
- evidence gathering and handling
- -identify the attacking hosts
- eradication and recovery
containment, eradication, and recovery
what part of the incident life cycle do these actions belong to
- lessons learned
- using collected incident data
- evidence retention
Post-Incident Activity
what is CSIRT
computer security incident response team
what is the function of CSIRT
responsible for providing incident response services to part or all of the organization
define incident response plan
provides the roadmap for implementing the incident response capabilities - provides foundation for the response policy
define incident response policy
policy governing incident response is highly individualized to the organization
define incident procedures
SOP (standard operating procedures)
what are some parties your incident response team might be communicating with
- other incident response teams
- internet service provider
- incident reporters
- law enforcement agencies
- software and support vendors
- customer constituents, and media
impact categories low, medium, high are based off what standards
FIPS 199
what is the acronym FIPS
Federal Information Processing standards
what functional impact category would this definition below to:
minimal effect: the organization can still provide all critical services to all users but has lost efficiency
Low