Section 5: Incident Response Flashcards
Cat 4 incident
Improper Usage
Authenticates identity of sender and receiver to ensure privacy of message contents (including attachments)
Reporting time frame:
Weekly
Disaster recovery plan (DRP)
A set of human, physical, technical and procedural resources to recover, within a defined time and cost, an activity interrupted by an emergency or disaster.
Examples of an incident
- Multiple failed login attempts from an unfamiliar system
- Denial of service
- Changes to hardware or software without owner’s consent
Investigation
Capability if identifying an adversary is required
Mitigation & Recovery
Procedures to contain the incident, reduce losses and return operations to normal
Incident Recovery
This phase ensures that affected systems or services are restored to a condition specified in the service delivery objectives (SDO) or business continuity plan (BCP). The time constraint up to this phase is documented in the recovery time objectives (RTO).
Activities in this phase include:
• Restore operations to normal
• Verify that actions taken on restored systems were successful
• Get system owners to test the system
• Help system owners declare normal operation
SEM
Automatically aggregate and correlate security event log data across multiple security devices. This allows security analysts to focus on a manageable list of critical events.
Security incidents are often made up of a series of events that occur throughout a network. By correlating data, the SEM can take many isolated events and combine them to create one single relevant security incident. These systems use either rule-based or statistical correlation. Rule-based correlations create situation-specific rules that establish a pattern of events. Statistical correlation uses algorithms to calculate threat levels incurred by relevant events on various IT assets
Computer emergency response team (CERT)
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control, and should also act as a single point of contact for all incidents and issues related to information systems.
Computer security incident response team (CSIRT)
A team established within an enterprise to respond to computer security incidents.
Cybersecurity disaster
A cybersecurity-related disaster may occur when a disruption in service is caused by system malfunctions, accidental file deletions, untested application releases, loss of backup, network DoS attacks, intrusions or viruses. These events may require action to recover operational status in order to resume service. Such actions may necessitate restoration of hardware, software or data files.
Business Continuity Plan Phases
- Prepare Business Impact Analysis (BIA)
- Identify and prioritize required resources
- Chose strategy to recover critical IS facilities
- Develop Disaster Recovery Plan
- Develop Business Continuity Plan
- Train staff and test plans
- Maintain plans
- Store plans for ease of access despite network failure
- Audit the plans
Full backups
Provide a complete copy of every selected file on the system, regardless of whether it was backed up recently. This is the slowest backup method but the fastest method for restoring data.
Incremental backups
Copy all files that have changed since the last backup was made, regardless of whether the last backup was a full or incremental backup. This is the fastest backup method but the slowest method for restoring data.
Differential backups
Copy only the files that have changed since the last full backup. The file grows until the next full backup is performed.
Emergency
Generally suggests a serious local incident, requiring management attention.