Security Operations 4.8 Flashcards
Preparing for an incident
Communication methods. Phones and contact information.
Incident handling hardware and software
Incident analysis and resources.
Incident mitigation software. Clean OS and application images.
Incident Planning.
Testing, Limited amount of time. Evaluate response.
Table top exercises. Performing a full-scale disaster drill takes times and has an opportunity cost.
Everyone sitting around a table and working through discussing what would be done in a IR.
See where there might be room for improvement in a IR situation.
Simulation
Phishing simulation. Creating a phishing email attack. Send to your user community.
Test the phishing get the filter.
Root cause analysis
Determine the ultimate cause of an incident, find the root cause.
Threat hunting
Finding the attacker before they find you.
Digital forensics