Proactive Detection and Response T&D

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/90

flashcard set

Earn XP

Description and Tags

Last updated 12:47 AM on 2/8/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

91 Terms

1
New cards

Value Chain

A guiding principle in breach response that focuses on protecting the business value chain

2
New cards

Exposure

A guiding principle in breach response that involves identifying leaked data to understand the exposure level

3
New cards

Future Risk

A guiding principle in breach response that requires documenting the attack path and detection gaps to mitigate future risk

4
New cards

Investigation Lead

A role required in large scale incident response to coordinate repeatable, well-defined tasks for analysts

5
New cards

Preparation

The IR cycle phase where you ready the environment, establish taskforces, and engage external entities

6
New cards

Identification and Scoping

The IR cycle phase where you confirm the nature of the attack and define affected systems

7
New cards

Containment/Intel Development

The IR cycle phase where you use active defense to limit attacker movement while remaining undetected

8
New cards

Eradication/Remediation

The IR cycle phase where you perform a coordinated, one-time removal of the attacker after the investigation

9
New cards

Recovery

The IR cycle phase where you resume normal business operations, which can be integrated with remediation steps

10
New cards

Lessons Learned/TI Consumption

The IR cycle phase where you finalize case documentation and conduct improvement workshops

11
New cards

Active Defence

A strategy with the objective to slow down attackers during the containment phase of an incident response

12
New cards

Active Hunting

A strategy that proactively identifies visibility gaps and prepares for attacks by assuming a breach has already occurred

13
New cards

Cyber Deception

Traps to distract attackers with false data, ideally for large-scale environments

14
New cards

Bit Flipping

A cyber deception technique that changes file magic headers

15
New cards

Zip Bombs

A cyber deception technique that uses overly large uncompress archives

16
New cards

Fake Mail

A cyber deception technique that populates victim email with fake data

17
New cards

Canary Tokens

Files, folders, links or URLs that throw an alert when accessed

18
New cards

Honeypots

Simulated machine services used as a cyber deception technique

19
New cards

Security Onion's Intrusion Detection Honeypot

An example of a honeypot tool

20
New cards

Honeyswarm

An example of a honeypot tool

21
New cards

Deutsche Telekom's T-Pot

An example of a honeypot tool

22
New cards

Thinkst

An example of a canary token tool

23
New cards

MITRE Engage

An example of a canary token tool

24
New cards

Preparedness

A key principle in enterprise IR that involves documentation, training, and rehearsing with the team

25
New cards

Collaboration

A key principle in enterprise IR that focuses on communication and team coordination

26
New cards

Speed

A key principle in enterprise IR that emphasizes the ability to respond quickly

27
New cards

Flexibility

A key principle in enterprise IR that requires the ability to adapt and adjust response

28
New cards

Continuous Improvement

A key principle in enterprise IR that involves reviewing and evaluating effectiveness

29
New cards

Horizontal Visibility

The percentage of devices and networks you can see

30
New cards

Vertical Visibility

What you see on the devices and networks you cover

31
New cards

Always-on Visibility Stack

Visibility tools that include EDR, Netflow, and SIEM

32
New cards

On-demand Visibility Stack

Visibility tools that include PCAP and Forensic Agents

33
New cards

IR Funnel

An efficiency strategy that starts with a large number of machines, narrows down, then performs deep-dive investigation

34
New cards

Resource Pools

A flexible efficiency approach that uses a set of tasks defining the resources needed

35
New cards

Network Sweeps

A resource pool task type used in incident response

36
New cards

Data Stacking

A resource pool task type used in incident response

37
New cards

Host Triage

A resource pool task type used in incident response

38
New cards

Malware Analysis

A resource pool task type used in incident response

39
New cards

Deep-dive Forensics

A resource pool task type used in incident response

40
New cards

IR Lead

The role that controls the investigation from start to end, manages the Spreadsheet of Doom, and runs status briefings

41
New cards

Analyst

The role that fulfills tasks assigned by the IR lead, performs hunting tasks, and supports IT

42
New cards

Malware Analyst

The role that dissects malware and extracts IOCs

43
New cards

Intel Analyst

The role that ingests all investigation data, advises analysts, and develops knowledge bases about adversaries

44
New cards

Sweep/Hunt

A predefined task type in incident response resource management

45
New cards

Triage

A predefined task type in incident response resource management

46
New cards

Deep Dive

A predefined task type in incident response resource management

47
New cards

OWA

A predefined task type in incident response resource management

48
New cards

Persistence Stack

A predefined task type in incident response resource management

49
New cards

Crew Resource Management (CRM)

Originally used in aviation, it aims to reduce information loss during urgent situations and is applied to incident response

50
New cards

Mission Analysis

A CRM principle ensuring short-term, long-term, and contingency plans are available

51
New cards

Assertiveness

A CRM principle involving willingness to actively participate, state, and maintain a position until disproven

52
New cards

Decision Making

A CRM principle requiring informed decisions in a logical and understandable way

53
New cards

Communication

A CRM principle ensuring clear information, instructions, or commands

54
New cards

Leadership

A CRM principle involving the ability to direct and coordinate activities

55
New cards

Adaptability and Flexibility

A CRM principle requiring the ability to alter the course of action based on new information

56
New cards

Situational Awareness

A CRM principle measuring how accurately the picture matches reality

57
New cards

10 for 10

A technique involving 10 minutes to evaluate situations during incident response

58
New cards

T.E.A.M.

Time out, Evaluation, Anticipation, Message - a technique to improve communication and team coordination

59
New cards

Aurora

IR case tracking software that scales and provides nice visualization features

60
New cards

DFIR-IRIS

IR case tracking software that tracks artifacts and timelines in a web app and can bulk upload via CSV

61
New cards

KAPE

A free triage collection and post-processing application written by Eric Zimmerman, designed for Windows only with crowd-sourced target files

62
New cards

Velociraptor

An open source tool for triage acquisition that can run as standalone collector or persistent, supporting multiple platforms

63
New cards

Windows.Triage.Targets

The Velociraptor artifact that replaced Windows.KapeFiles.Targets

64
New cards

Server.Import.Extras

The Velociraptor artifact that enables the Windows.Triage.Targets artifact

65
New cards

Server.Utils.ImportCollection

The Velociraptor artifact used to ingest triage zip data into the server

66
New cards

Windows.System.Pslist

The Velociraptor artifact used to collect list of running processes

67
New cards

Windows.Network.NetstatEnriched

The Velociraptor artifact used to collect list of active network connections

68
New cards

Windows.System.DNSCache

The Velociraptor artifact used to list the DNS cache

69
New cards

SOAR

Security Orchestration, Automation, and Response platforms that help security teams manage workloads through automation

70
New cards

dfTimewolf

A tool designed to chain together modules in a recipe to accomplish forensic processing jobs, developed by Google IR team

71
New cards

TimesketchExporter

A dfTimewolf module that exports sets of plaso or csv to timesketch

72
New cards

TimesketchEnhancer

A dfTimewolf module that enhances timesketch with additional reporting

73
New cards

LocalPlasoProcessor

A dfTimewolf module that processes list of file paths with plaso

74
New cards

SCPExporter

A dfTimewolf module that sends files via SCP

75
New cards

AWSCollector

A dfTimewolf module that creates an analysis VM and copies AWS volumes to it for analysis

76
New cards

AWSLogsCollector

A dfTimewolf module that reads logs from AWS account

77
New cards

AzureCollector

A dfTimewolf module that creates an analysis VM and copies Azure volumes to it for analysis

78
New cards

GoogleCloudCollector

A dfTimewolf module that creates an analysis VM and copies GCP volumes to it for analysis

79
New cards

GCPLogsCollector

A dfTimewolf module that collects Google Cloud Platform logs

80
New cards

OpenRelik

An open-source, Apache-2.0 licensed platform specifically designed to streamline and enhance collaborative digital forensic investigations, developed by Google IR team

81
New cards

Node-RED

A flexible IT framework designed for flow-based programming, originally designed for IoT use

82
New cards

Plaso

A traditional timeline analysis tool used with log2timeline

83
New cards

pinfo

A plaso tool used to retrieve information from plaso storage file

84
New cards

psort

A plaso tool used to filter, sort and process the plaso storage file

85
New cards

Timesketch

An open-source tool from Google IR team for collaborative timeline analysis, powered by elasticsearch

86
New cards

Sketches

A Timesketch concept that groups one or more timelines in a case

87
New cards

Timelines

A Timesketch concept that holds datasets based on timestamp

88
New cards

Stories

A Timesketch concept that allows analysts to write the narrative of their findings

89
New cards

hashR

A tool that provides hash sets of known-good and known-bad files for filtering and enrichment

90
New cards

Context Links

A Timesketch feature that enables quick lookups for IOCs on sites like VirusTotal, URLhaus, and Alien VaultOTX

91
New cards

timesketch_importer.py

A CLI tool for importing timelines into Timesketch

Explore top flashcards

Los retrato vocab
Updated 1170d ago
flashcards Flashcards (23)
Kapitel 4
Updated 1115d ago
flashcards Flashcards (69)
Unit 1 Chem
Updated 383d ago
flashcards Flashcards (69)
Bio 2 e-ipsi
Updated 58d ago
flashcards Flashcards (22)
TECTONICS
Updated 638d ago
flashcards Flashcards (40)
Los retrato vocab
Updated 1170d ago
flashcards Flashcards (23)
Kapitel 4
Updated 1115d ago
flashcards Flashcards (69)
Unit 1 Chem
Updated 383d ago
flashcards Flashcards (69)
Bio 2 e-ipsi
Updated 58d ago
flashcards Flashcards (22)
TECTONICS
Updated 638d ago
flashcards Flashcards (40)