Course 6 - Sound the Alarm: Detection and Response Flashcards
To recall, the five core functions of the NIST CSF are:
identify, protect, detect, respond, and recover.
The NIST incident response lifecycle is another NIST framework with additional substeps dedicated to incident response. It begins with preparation. Next, detection and analysis, and then containment, eradication and recovery, and finally post-incident activity.
According to NIST, an incident is “an occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.”
An event is an observable occurrence on a network, system, or device.
five W’s of an incident: who triggered the incident, what happened, when the incident took place, where the incident took place, and why the incident occurred.
who triggered the incident,
what happened,
when the incident took place,
where the incident took place,
why the incident occurred.
Computer security incident response teams, or CSIRTs, are a specialized group of security professionals that are trained in incident management and response.
Depending on the organization, a CSIRT can also be referred to as an Incident Handling Team, or IHT, or Security Incident Response Team, SIRT.
National Institute of Standards and Technology (NIST) Incident Response Lifecycle
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-incident activity
A computer security incident response team (CSIRT) is a specialized group of security professionals that are trained in incident management and response. During incident response, teams can encounter a variety of different challenges. For incident response to be effective and efficient, there must be clear command, control, and communication of the situation to achieve the desired goal.
Command refers to having the appropriate leadership and direction to oversee the response.
Control refers to the ability to manage technical aspects during incident response, like coordinating resources and assigning tasks.
Communication refers to the ability to keep stakeholders informed.
An incident response plan is a…
…document that outlines the procedures to take in each step of incident response
An ______________ is an application that monitors system and network activity, and produces alerts on possible intrusions.
intrusion detection system
___________ have all the same capabilities as an IDS, but they can do more. They monitor system activity for intrusions and take action to stop it.
Intrusion prevention systems, or IPS,
Many tools have the ability to perform the function of both IDS and IPS. Some popular tools are….
Snort
Zeek
Kismet
Sagan
Suricata