Lesson 12: Explain Incident Response and Monitoring Concepts Flashcards
Define an ‘Incident’
An event that interrupts standard operations or compromises confidentiality, integrity, or availability.
Define an ‘Incident response policy/plan (IRP)’
Defines the resources, processes, procedures, and guidelines for dealing with cybersecurity incidents.
What are the seven steps of CompTIA’s incident response lifecycle?
- Preparation
- Detection
- Analysis
- Containment
- Eradication
- Recovery
- Lessons learned
Define the first step (preparation) of the CompTIA incident response lifecycle
Hardening systems, writing policies and procedures, and setting up confidential lines of communication; implies creating IRP.
What features does a security information and event management (SIEM) have to assist in preparation?
- Incident detection for collection and analysis of environment
- Digital forensics for validating data
- Case management tools for logging incidents and coordinating response activities
Define the second step (detection/identification) of the CompTIA incident response lifecycle
The process of correlating events from network and system data sources and determining whether they are an IoC.
Define a ‘Call list’
A document listing authorized contacts for out-of-band notification and collaboration during a security incident.
Define the third step (analysis) of the CompTIA incident response lifecycle
Process in which IoCs are assessed to determine validity, impact, category, and priority.
What is necessary for an IoC to be a true positive incident?
Correlating multiple indicators.
What is the next step after validating a true IoC?
Identify the type of incident and the data or resources affected; establishing the category and impact allows determination of priority.
How does the value of data affect impact of an IoC?
The move valuable the data the higher the impact of the IoC.
Define ‘downtime’ and how it can affect impact
The degree to which an incident disrupts business processes; Longer downtime means higher impact.
When determining the scope, what factors can affect impact of the IoC?
The number of affected systems; the type of affected systems, and how the systems have been affected.
How does detection time affect the impact of an IoC?
The longer it takes to detect an IoC, the more potential damage that can take place.
What is the purpose of an incident category?
To ensure that all response team members and other organizational personnel have a shared understanding of the meaning of terms, concepts, and descriptions.
What does effective incident analysis depend on?
Threat intelligence; insight into adversary tactics, techniques, and procedures (TTPs).
Define a ‘cyber kill chain’
describes the stages by which a threat actor progresses to a network intrusion.
Define the first step (Reconnaissance) in the cyber kill chain
Mapping an attack surface and identifying potential attack vectors using network probes, Open Source Intelligence (OSINT), and social engineering.
Define the second step (weaponization) in the cyber kill chain
Coding an exploit to take advantage of a vulnerability discovered through reconnaissance coupled with a payload to deliver the exploit and maintain covert access.
Define the third step (Delivery) in the cyber kill chain
Weaponized code is inserted into the environment using a selected attack vector.
Define the fourth step (exploitation) in the cyber kill chain
Weaponized code is executed on the target system and gains the capability to deliver the payload.
Define the firth step (installation) in the cyber kill chain
Payload is successfully installed on the target system using methods to remain undetected and achieve persistence.
Define the sixth step (Command and Control) in the cyber kill chain
The payload establishes a connection to a remote server, enabling the attacker to connect to the target and download or fabricate additional attack tools.
Define the seventh step (Action on Objectives) in the cyber kill chain
Adversary uses the compromised system to achieve or progress towards goals, such as data exfiltration, DoS/vandalism, or escalating access.