Chapter 5.4 Flashcards

1
Q

Containment

A

Containment is a stage in the incident response lifecycle. In this stage, the goal is to limit the scope and reach of the event. One approach in containment is to isolate infected systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recovery

A

Recovery is a stage in the incident response lifecycle. This stage ensures the threat no longer exists and all systems are brought back to a secure state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

reporting requirements

A

The suspicion of data theft is typically enough to have to trigger reporting procedures. This involves notifying stakeholders, regulation entities, and customers if applicable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Escalation

A

Increased involvement of senior staff in the management of an incident is called escalation. Escalation may be necessary if no response is made to an incident within an acceptable time frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tabletop exercise

A

With a tabletop exercise, staff will “ghost” the same procedures as they would in a disaster, without actually creating disaster conditions or applying or changing anything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

walkthrough exercise

A

Walkthroughs are used to provide basic awareness and training for disaster recovery team members. These exercises describe the contents of disaster recovery plans and other plans, and the roles and responsibilities outlined in those plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Functional exercise

A

Functional exercises are implemented as action-based sessions where employees can validate all plans by performing scenario-based activities in a simulated environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Full-scale exercise

A

Full-scale exercises are action-based sessions that reflect real situations. These exercises are held onsite and use real equipment and real personnel as much as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

scope

A

The scope of an incident (broadly the number of systems affected) is not a direct indicator of priority. A large number of systems might be infected with a type of malware that degrades performance, but is not a data breach risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

privacy officer

A

A privacy officer is responsible for oversight of any Personally Identifiable Information (PII) assets managed by a company. This role ensures that the processing and disclosure of PII complies with legal and regulatory frameworks and also oversees the retention of PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

eradication

A

Eradication is an incident response lifecycle phase pertaining to finding the root cause of an incident. For example, a user clicking a malicious link in an email is a root cause for a potentially larger problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

preparation

A

Preparing for an incident response means establishing the policies and procedures for dealing with security breaches, along with personnel and resources to implement those policies. A triage plan is developed during this phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

roles and responsibilities

A

roles and responsibilities can be defined and acted out in an exercise. Assigning solid roles and responsibilities avoids the possibility of confusion and missed steps during an incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COOP

A

Continuity of Operations (COOP) is a collection of processes that enable an organization to maintain normal business operations in the face of some adverse event. COOP is not part of the exercise process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data integrity

A

Data integrity is typically the most important factor in prioritizing incidents and will often be based on the value of the at-risk data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

downtime

A

Downtime is the degree to which an incident disrupts business processes. An incident can either degrade (reduce performance) or interrupt (completely stop) the availability of an asset, system, or business process. An alternate business practice (paper and pen) can commonly be utilized while systems are down.

17
Q

after-action report

A

Lessons learned is a stage in the incident response lifecycle. During this stage, the incident and related actions are reviewed for what went right and what went wrong data. An after-actions report is a result of a lessons learned session.

18
Q

change management

A

Change management is a formal process that oversees change in an organization. Change can be proactive or reactive, and is usually executed for improvements.

19
Q

corrective action report

A

A corrective action report is a formal response setting out a plan to correct a defect in a system, such as a security vulnerability.

20
Q

lessons learned

A

Lessons learned is a stage in the incident response lifecycle. During this stage, the incident and related actions are reviewed for what went right and what went wrong data.

21
Q

identification

A

Identification is a stage in the incident response lifecycle. In this stage, it is determined whether an incident has taken place. The assessment of how severe the incident might be is followed by notification of the incident to stakeholders.

22
Q

disaster recovery planning

A

Disaster recovery planning entails many pieces. Most important is the assignment of roles and responsibilities. Having individuals assigned to tasks helps to avoid overlap and confusion during an incident.

23
Q

order of restoration

A

Order of restoration is a guideline for restoring systems after an incident. Using such a guideline helps dependent systems start up in the proper order.

24
Q

preservation of evidence

A

Preservation of evidence is a concept and process that is used during an incident investigation. Preservation of evidence is used to protect evidence from damage or tampering.