Topic 12A Flashcards

1
Q

cybersecurity incident

A

a successful or attempted violation of the security properties of an asset, compromising its confidentiality, integrity, or availability. Incident response (IR) policy sets the resources, processes, and guidelines for dealing with cybersecurity incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

incident response lifecycle is a seven-step process:

A

Preparation
Detection
Analysis
Containment
Eradication
Recovery
Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Case management tools

A

provide a database for logging incident details and coordinating response activities across a team of responders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preparation Phase:

A

Cybersecurity infrastructure:
Digital forensics
Incident detection tools
Case management tools

Cyber incident response team:
Legal - compliance laws
Human Resources - deals with employee contracts, employment law, and underlying personnel issues
Public relations

Communication plan:
Call list - A document listing authorized contacts for notification and collaboration during a security incident.

Stakeholder management

Incident response plan:
This lists the procedures, contacts, and resources available to responders for various incident categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Detection Phase:

A

is the process of correlating events from network and system data sources and determining whether they are indicators of an incident.

First responder:
The first experienced person or team to arrive at the scene of an incident.

Detection indicators may be recorded in a multitude of ways:

Matching events in log files, error messages, IDS alerts, firewall alerts, and other data sources to a pattern of known threat behavior.

Identifying deviations from baseline system metrics.
Manually or physical inspecting the site, premises, networks, and hosts. Running a proactive search for signs of intrusion is referred to as threat hunting.

Notification by an employee, customer, or supplier.

Publicly reporting new vulnerabilities or threats by a system vendor, regulator, the media, or other outside party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Analysis

A

Impact:
Data integrity
Downtime
Economic/publicity
Scope
Detection time
Recovery time

Kill chain category:
A model developed by Lockheed Martin that describes the stages by which a threat actor progresses to a network intrusion. The stages go in the following order:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control
Actions on Objectives

Playbooks:
A playbook is a data-driven standard operating procedure (SOP) to assist analysts in detecting and responding to specific cyber threat scenarios. The playbook starts with a report from an alert dashboard. It then leads the analyst through the analysis, containment, eradication, recovery, and lessons learned steps to take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Containment

A

issues facing the CIRT are the following:
What damage or theft has occurred already? How much more could be inflicted?
What countermeasures are available? What are their costs and implications?
What actions could alert the threat actor that the attack has been detected? What evidence of the attack must be gathered and preserved?
What notification or reporting is required at this stage of the incident?

Isolation-Based Containment:
A simple option is to disconnect the host from the network by pulling the network plug
Use a sinkhole - If a group of hosts is affected, you could use routing infrastructure to isolate one or more infected virtual LANs (VLANs). Not reachable from the rest of the network
Disable account or application

Segmentation-Based Containment:
uses VLANs, routing/subnets, and firewall ACLs to prevent a host or group of hosts from communicating outside the protected segment.
As opposed to completely isolating the hosts, you might configure the protected segment as a sinkhole or honeynet and allow the attacker to continue to receive filtered (and possibly modified) output to deceive them into thinking the attack is progressing successfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Eradication and Recover

A

ensuring that the system cannot be compromised through the same attack vector, or failing that, that the vector is closely monitored to provide advance warning of another attack.

Reconstitution of affected systems—by either removing the malicious files or tools from affected systems or restoring the systems from secure backups/images.

Re-audit security controls—by ensuring they are not vulnerable to another attack. This could be the same attack or from some new attack that the attacker could launch through information they have gained about the network.

Ensure that affected parties are notified and provided with the means to remediate their own systems. For example, if customers’ passwords are stolen, they should be advised to change the credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lessons learned meeting participants:

A

staff directly involved along with other noninvolved incident handlers, who can provide objective, external perspectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lessons learned report

A

An analysis of events that can provide insight into how to improve response and support processes in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

root cause analysis

A

A technique used to determine the true cause of the problem that, when removed, prevents the problem from occurring again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“five whys” model

A

Used to find the root cause.

This starts with a statement of the problem and then poses successive “Why” questions to drill down to root causes

One issue is that this can branch into different directions of inquiry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tabletop exercise

A

this is the least costly type of testing.

The facilitator presents a scenario, and the responders explain what action they would take to identify, contain, and eradicate the threat.

The training does not use computer systems.

The scenario data is presented as flash cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Walkthroughs

A

a facilitator presents the scenario as for a tabletop exercise, but the incident responders demonstrate what actions they would take in response.

the responders perform actions such as running scans and analyzing sample files, typically on sandboxed versions of the company’s actual response and recovery tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Simulations

A

a simulation is a team-based exercise, where the red team attempts an intrusion, the blue team operates response and recovery controls, and a white team moderates and evaluates the exercise.

This type of training requires considerable investment and planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat hunting

A

utilizes insights gained from threat intelligence to proactively discover whether there is evidence of TTPs already present within the network or system.

17
Q

Intelligence fusion and threat data

A

In threat hunting, using sources of threat intelligence data to automate detection of adversary IoCs and TTPs.

18
Q

Maneuver

A

a military doctrine term relating to obtaining positional advantage.

As an example, the attacker may trigger a denial of service attack to divert the security team’s attention, and then attempt to accelerate plans to achieve actions on objectives

19
Q
A