Unit 2b Flashcards
Purpose of various incident and vulnerability reporting processes is to improve overall security posture of AF Enterprise Network (AFEN), AF information systems, and stand-alone computing devices through quick positive control and reporting of network as well as information system incidents
Incident Response
Includes network/system incidents such as intrusions, scans, probes, and malicious logic events
Incident
Weakness in information system, cryptographic system, or components that could be exploited
Vulnerabilities
End users and AF network professionals must report all identified incidents and vulnerabilities, which groups should be informed?
Network Operations & Security Center (NOSC) and NCC personnel, Functional System Administrators (FSA), Work Group Managers, Information System Security Officers (ISSO), Information Systems Security Managers (ISSM)
Mark all unclassified reports as “For Official Use Only” (FOUO) and
protect report from public distribution under Freedom of Information
Act.
Unclassified Report Guidance
Include attempted entry, unauthorized entry, and attacks on information system
Incident Categories
Review of critical audit logs by network professionals
Incident Detection
NCCs, NOSCs, and AFNOSC record suspicious and unauthorized network as well as information systems access and activity
Incident Reporting
ASIM sensors utilized to monitor various enclaves that make up AFEN
ASIM-Identified Incidents
All end users accessing AFEN are required to report unusual network, information system, and stand-alone computing device events suspected to stem from some form of malicious logic
Malicious Logic Incidents