Security - Incident Response Flashcards

1
Q

What are the three types of incident detection methods?

A
  1. Passive - discovered when not actively looking for it, like when performing maintenance on a computer or reviewing network log files. Passive detection helps determine what and how a security incident happened.
  2. Active - actively looking for threats, like IDS is looking for threats. Active detection helps discover security incidents as they are occurring.
  3. Proactive - pentesting or threat hunting. It’s an important part of a security plan and should be an ongoing practice.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is the first responder?

A

The person or team that should be immediately notified when a security incident is discovered. The first responder is responsible for securing the affected systems and collecting all evidence. And stopping the threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps to take in an incident response?

A
  1. Gather evidence
  2. Establish the chain of custody
  3. Report the incident
  4. Follow-up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the first steps of the Gathering of Evidence phase in an incident response?

A
  1. Interview any witnesses.
  2. Take pictures of screens, error messages, and physical damage.
  3. Take detailed notes of the time, location, and details of the incident.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Order of Volatility and during what phase of an incident response is it done?

A

It’s done during the Gathering of Evidence phase.

  1. Copy RAM to an external drive
  2. Copy Swap file to an external drive
  3. Back up active network connections, browser history, and any evidence that a system was exploited to an external drive.
  4. File evidence - back up prohibited content, suspicious files, application files, and everything saved on the file system to an external drive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the last step in the Gathering of Evidence phase of an incident response?

A

Create an evidence grade sector-by-sector of the hard drive. The first responder should then use a write-blocker on the original hard drive to prevent changes to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens during establishing the chain of custody phase in incident response?

A

The chain of custody should document:

  1. System information including serial number, make, and model.
  2. Each instance of someone accessing the evidence. The documentation should include who accessed it, why it was accessed, what was done with it, and how it was secured again.

If the chain of custody is broken, the evidence will not be allowed in a court of law since it can no longer be proven that the evidence is unaltered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens during the Reporting the Incident phase of an incident response?

A

The first responder reports the incident to the proper authorities as outlined in the security plan. This can be law enforcement or an internal security team.

The first responder’s goal is to gather the evidence to establish the:
1. Who
2. What
3. When
4. Where
5. How
6. Why (if possible)

The authorities then take over the investigation to fill in the details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens during the Follow-Up phase of an incident response?

A
  1. Get operations back to normal and minimize the impact on production. This might involve replacing a workstation or re-configuring an affected server. Every incident requires unique solutions.
  2. Remediate all affected systems.
    - Clear all traces of the incident.
    - Verify that all affected systems are working properly.
    -Implement changes necessary to prevent a repeat of the security incident.
    - Document all changes.
  3. Schedule a hot-wash meeting to review the incident and steps for remediation. Make recommendations to prevent the incident from occurring again or to improve the organization’s response.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly