Chapter 10 - Incident and Disaster Response Flashcards
(105 cards)
What three things are successful attacks commonly called?
Successful attacks are commonly called:
- Security Incidents
- Breaches
- Compromises
What are the four severity levels of incidents?
The four severity levels of incidents are:
- False Alarm - AKA false positives.
- Minor Incidents - Small virus outbreaks, etc.
- Major Incidents - Beyond the ability of on-duty staff, requires a computer security response team to be assembled, and require action beyond the IT department.
- Disaster - Fire, flood, terrorist attacks. Threatens business continuity.
Why is speed of response important?
Speed of response is important because the majority of attackers will continue to do harm until they are stopped. In addition, attacks generally cause systems to fail, and each minute they are down is money lost.
What is the purpose of a CSIRT?
A CISRT, or a computer security incident response team, is a team of IT and IT security professionals dedicated to resolving an incident, as well as members from legal, PR, and senior management.
What is business continuity?
Business continuity is the day-to-day revenue-generating operations of the firm.
Who should head the business continuity team?
A senior manager should head the business continuity team.
Why is accuracy of response important?
Accuracy is important, as haste can lessen accuracy, allowing people to overlook the root cause in the rush to fix.
Define incident response in terms of planning.
In terms of planning, incidence response is only as effective as the plans set, and in most situations, no plan will fit exactly. Improvisation is key.
Why are rehearsals important?
Rehearsals are important because they allow a firm to practice plans and procedures that may only come up in a true crisis.
What is a walkthrough or table-top exercise?
A walkthrough/table-top exercise is the simplest form of rehearsal, where key personnel gather together and discuss, step by step, what each will do during an incident.
Why is a live test better than a tabletop?
A live test is preferential to a tabletop because actually going through the steps can actually reveal small flaws that might not be apparent in a tabletop.
What is the problem with live tests?
The main problem with live tests is that they are expensive.
Distinguish between detection and analysis.
Detection is the act of learning that an incident has occurred. Analysis is the act of understanding the incident, determining the damage potential, and to gather information needed for containment and recovery.
Why is good analysis important for the later stages of handling an attack?
In the later stages, good analysis will help uncover the root cause of the issue, and allow for diagnosis and repair.
What is escalation?
Escalation is the act of increasing the priority of an incident.
What is containment?
Containment is the method by which the damage is stopped from progressing.
Why is disconnection undesirable during containment?
Disconnection is undesirable during containment because, while it stops the attack, it prevents legitimate users from using services. This can have significant business impact.
What is black holing? Why may this only be a temporary containment solution?
Black holing is a method of containment where the packets from a particular IP address are automatically dropped to prevent an attack? This may wind up being only a temporary solution because of the ease in which an attacker could spoof a new IP address.
Why might a company allow an attacker to continue working in the system for a brief period of time? Why is this dangerous?
A company might allow an attacker to continue working in the system for a brief period of time in order to gather more information on the attacker, provided the damage isn’t too severe. This is dangerous, because the longer the attacker is in the system, the more likely they are to erase their presence from logs, or gain access to do more severe damage.
What are the three major recovery options?
The three major recovery options are:
- Repair During Continuing Operation
- Restoration From Backup Tapes
- Total Software Reinstallation
What are the two main reasons that repair during continuing operation good?
The two main reasons that repair during continuing operation is good is that:
A. It reduces downtime
B. No data is lost, as there is no need to use a restore tape
Why may not repair during continuing operation work?
Repair during continuing operation may not work because it is not always possible to find all the Trojans, rootkits, and other tools of the break-in.
Why is the restoration of data files from backup tapes undesirable?
The reason that restoration from tape is undesirable is that any data collected since the last update will be lost, or if the attack began before the restore, the restore could restore Trojans and such.
What are the potential problems with total software reinstallation?
Total software reinstallation comes with data loss, but that is still dependent on the organization still having the original installation media.