Security+ 3 Flashcards

1
Q

When conducting any forensic data capture investigators should take note of current time from reliable source and compare it to time of device (recording the time offset).

Write Blockers : prevent accidental modification of disk during imaging.

NetFlow : captures high level info about all communications on network. includes : IP addresses and ports, timestamp. amount of data transferred, but not payload of actual packets; routers and firewalls capture NetFlow data.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Operational Investigations : look into technology issues, resolve normal operations as quickly as possible, use very low standards of evidence, involve root cause analysis.

Digital Forensics : techniques that collect, preserve, analyze and interpret digital evidence.

Order of Volatility : network traffic, memory contents, system and process data, files, logs, and archived records.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Eradication and Recovery : remove effects of incident and return to normal operations. Technical Recovery ex : rebuild compromised systems, remove malware, disable breached accounts, restore corrupted or deleted data.

Incident Reconstitution : identify and remediate vulnerabilities, ex : applying security patches, updating firewall rules, implementing intrusion prevention, strengthening access controls.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Triaging Incidents : low impact : minimal potential to affect security, normally handled by 1st responders, dont require after hours response, Moderate impact : significant potential to affect security, trigger incident response team activation, require prompt notification to management, High impact : may cause critical damage to info or systems, gets immediate full response, requires immediate notification to senior management, demand full mobilization to incident response team.

Incident Mitigation : control damage and loss to org. through containment, consider : damage potential, evidence preservation, service availability, resource requirements, expected effectiveness, solution timeframe.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Incident Data Sources : IDS/IPS, firewalls, authentication systems, integrity monitors, vulnerability scanners, system event logs, NetFlow records, anti-malware packages, etc …

Escalation and Notification Objectives : escalate incident severity based on impact, escalate response to appropriate level, notify management and other stakeholders.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Incident Response Procedures : contains detail of the plan and tactical guidance to incident responders. ex : notification, escalation, reporting, system isolation, forensic analysis, and evidence handling.

Communications with : senior executives, legal counsel, public relations, regulatory agencies, law enforcement. Components of IR team : management, info security, subject matter experts, legal counsel, public affairs, HR, physical security staff. Also have test scenarios to test staff capabilities etc …

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Supply Chain Assessment : Security professionals should pay careful attention to managing vendor relationships that protects confidentiality, integrity, and availability of their org.’s info and IT systems.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly