Lessons 20-24 Flashcards
(116 cards)
SCRIPTING TOOLS
- python- A high-level, versatile programming language. ( Writing scripts, building websites, data analysis, automation, machine learning.)
- Powershell- A task automation and configuration management framework from Microsoft, consisting of a command-line shell and scripting language. ( Managing Windows systems, automating administrative tasks.)
- Bash- A Unix shell and command language. ( Running commands and scripts on Unix/Linux systems, automating tasks.)
- Macro- A set of instructions that automate repetitive tasks within software applications. (Automating tasks in applications like Microsoft Excel or Word.)
SCRIPTING
A set of instructions used to automate a sequence of repetitive tasks
VBA ATTACK
Visual Basic for Applications) attack is a type of cyber attack that exploits the VBA programming language used in Microsoft Office applications like Excel, Word, and Access. Attackers embed malicious VBA code into Office documents, and when the document is opened and macros are enabled, the code executes, potentially compromising the user’s system.
Security orchestration automation and response (SOAR)-
an automation tool that reduces response times, improves consistency and amplifies the productivity of incident response teams.
INCIDENT MANAGEMENT
Is Inclusive of roles and responsibilities, strategies, and procedures for preparing for, responding to, and managing security incidents
Security incident-
an event or action that endangers the confidentiality, integrity, or availability of information or information systems.
Data breach
when data is exfiltrated or extracted, or there is a loss of control. A data breach may trigger reporting and notification requirements.
Incident prevention & Incident preparation-
- threat modeling, risk assessment, controls implementation, monitoring, and assurance activities.
- planning, documenting, assigning responsibilities, training, and practicing response capabilities.
Incident detection & Incident response
- monitoring incident reporting, analysis, and participation in threat intelligence and information-sharing activities.
- validation, containment, mitigation, eradication, recovery, and evaluation activities.
INCIDENT PLAYBOOK
Is a set of instructions for planning for, and responding to, a specific type of event, attack or scenario
Categorization
the process of classifying incidents based on severity.
Escalation thresholds
the point at which an incident or issue requires a higher level of attention or response.
INCIDENT RESPONSE TEAM
IRT
a group of experts who are responsible for managing and responding to cybersecurity incidents within an organization.
Walkthrough
personnel or departments review (walkthrough) their plans and procedures for completeness. Accuracy is the objective
Tabletop
scenario-based group workshop focuses on the application of plans and procedures as well as participant readiness. Objectives are familiarity, coordination, and accuracy.
Simulation-
a localized scenario that simulates an actual event. A pre-planned simulation is scheduled, and attendees are invited. Surprise simulation, attendees are notified “at the moment” objective: readiness
VALIDATION
Determine whether an incident has occurred and, if so, the type, extent, and magnitude of the problem
Indicator-
tells us that something is happening or has happened
PRIORITIZATION
The process of determining the order of importance or urgency. It is the most critical decision point in the incident handling process.
CONTAINMENT
A short-term approach to limiting or reducing the impact of an incident
ERADICATION
Is inclusive of the steps taken to correct and or eliminate the root cause (not just the symptoms) that led to the incident
Root cause analysis (RCA)
a method of problem-solving used to investigate known problems and identify what happened and the underlying causes
The main goal of RCA is to prevent the problem from recurring by eliminating the root cause
CYBER INVESTIGATIONS
Can be triggered by a variety of incidents. (intrusion, extortion, insider activity)
3 types of investigations: criminal, civil, and internal (administrative)
Evidence collection is the first step of the investigation.
Direct evidence
supports the truth of an assertion directly