Sound the Alarm: Detection and Response Flashcards
Computer Security Incident Response Team (CSIRT)
A specialized group of security professionals that are trained in incident management and response.
Documentation
Any form of recorded content that is used for a specific purpose.
Endpoint Detection and Response (EDR)
An application that monitors an endpoint for malicious activity.
Event
An observable occurrence on a network, system, or device.
False negative
A state where the presence of a threat is not detected.
False positive
An alert that incorrectly detects the presence of a threat.
Incident
An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system.
Incident handler’s journal
A form of documentation used in incident response.
Incident response plan
A document that outlines the procedures to take in each step of incident response.
NIST Incident Response Lifecycle
A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-incident activity.
Security Operations Center (SOC)
An organizational unit dedicated to monitoring networks, systems, and devices for security threats or attacks.
Security Orchestration, Automation, and Response (SOAR)
A collection of applications, tools, and workflows that uses automation to respond to security events.
True negative
A state where there is no detection of malicious activity.
True positive
An alert that correctly detects the presence of an attack.
Command
An objective of CSIRT. Refers to having the appropriate leadership and direction to oversee the response.
Control
An objective of CSIRT. Refers to the ability to manage technical aspects during incident response, like coordinating resources and assigning tasks.
Communication
An objective of CSIRT. Refers to the ability to keep stakeholders informed.
Security analyst, Technical lead, and Incident coordinator
What are the three key security related roles under CSIRT?
Security analyst
This job title’s role is to continuously monitor an environment for any security threats.
Forensic investigator
This job title is commonly L2s and L3s (under CSIRT) who collect, preserve, and analyze digital evidence related to security incidents to determine what happened.
Threat hunter
This job title is typically L3s (under CSIRT) who work to detect, analyze, and defend against new and advanced cybersecurity threats using threat intelligence.
Endpoint
Any device connected on a network.
Log analysis
The process of examining logs to identify events of interest.
Command and control (C2)
The techniques used by malicious actors to maintain communications with compromised systems.
C2 is crucial in managing compromised devices during a cyber attack.