Cybersecurity Incident Reponse ( Chapter 4)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

a plan for responding to a cybersecurity incident methodically. If an incident is “nefarious”, steps are taken to quickly contain, minimize, and learn from the damage (AT&T).

Incident response

<p>Incident response </p>
2
New cards
  • a division under Cybersecurity Bureau of Department of Information and Communication Technology (DICT).

  • responsible in receiving, reviewing, and responding to computer incident reports and activities.

  • This division will ensure that a systematic information gathering/ dissemination, coordination and collaboration among stakeholders, especially computer emergency response teams.

National Computer Emergency Response Team (NCERT)

3
New cards

NIST Cyber Security Framework

  • Identify – focus on the identifying and knowing what should be protected.

  • Protect – implementation of necessary level of protection for the identified assets.

  • Detect capability to recognize if there is any cyber security incident impacting the protected assets.

  • Respond – capability to handle the detected cyber security incidents.

  • Recover – restore business operation.

<ul><li><p><strong>Identify</strong> – focus on the <strong>identifyin</strong>g and knowing what should be protected. </p></li><li><p><strong>Protect </strong>– implementation of <strong>necessary level of protection</strong> for the identified assets. </p></li><li><p><strong>Detect </strong>–<strong> capability to recognize</strong> if there is any cyber security incident impacting the protected assets. </p></li><li><p><strong>Respond </strong>– capability to <strong>handle the detected cyber security incidents. </strong></p></li><li><p>Recover – <strong>restore business operation.</strong></p></li></ul><p></p>
4
New cards

Incident Response Lifecycle

knowt flashcard image
5
New cards

Preparation

knowt flashcard image
6
New cards

Focus on: Unusual Activities and Events

• Alerts and reports about potential malicious activity or vulnerabilities. This can include alerts from your technology or network provider. • Loss or breach of a device, including personal mobiles that staff use to access work emails. • General day-to-day indicators, such as unusual email activity, incident reports, or being informed by staff or customers that breach has already occurred.

. Detection and Analysis

7
New cards

Focus on: Applying different strategies

  • Removing the system from the network by disconnecting it

  • Isolating the systems by way of network segmentation

  • Utilize virtual local area network (VLAN)

  • Utilize firewall sets

  • Careful gathering of information and evidence for legal proceedings

  • Redirecting traffic

  • Whitelisting of IP’s to boot out attackers

Containment

8
New cards

5 THINGS NOT TO DO DURING AN INCIDENT

knowt flashcard image
9
New cards

4 THINGS TO DO DURING AN INCIDENT

knowt flashcard image
10
New cards
  • Wipe out content and re-image of affected system hard drives to ensure any malicious content is removed

  • Preventing the root cause- understanding what caused the incident •

  • Preventing future compromise, for example by patching a vulnerability exploited by attacker

  • Applying basic security best practices- example upgrading old software versions and disabling unused services.

  • Scan for malware

Eradication

11
New cards

Involves cautiously bringing back all systems affected to full operation after verifying systems are clean, and the threats removed.

Recovery Phase

12
New cards
  • Lessons learned meeting

  • When was the problem first detected and by whom • The scope of the incident

  • How it was contained and eradicated

  • Worked performed during recovery

  • Areas where the CERT team were effective

  • Areas that need improvement

Post Incident Activity

<p>Post Incident Activity </p>
13
New cards
  • It derived from military kill chain

  • Describe the structure of an attack

  • 7 stages of targeted attack

  • Trademark of Lockheed Martin

What is the Cyber Kill Chain?

<p>What is the Cyber Kill Chain? </p>
14
New cards
15
New cards
16
New cards
term image
17
New cards
term image
18
New cards
  • Preparing the malwares & hacking tools for the attack

  • Malicious payload is created

Example: Known malware, Customized Malware, 0 day, Metasploit

Weaponization

19
New cards

The attacker sends the malicious payload to the victim

Example:

  • File attachment on email

  • •External devices

  • Malicious Website

  • SET

Delivery

20
New cards

Exploiting a vulnerability to execute code on victim’s system

Example:

  • Exploiting Legacy system

  • Exploiting old versions of software

Exploitation

21
New cards

Installing malware on the asse

Installation

22
New cards

Command channel for remote manipulation

Command and Control (C2)

23
New cards

With ‘Hands on keyboard’ access, intruders accomplish their original goals

Actions On Objectives

24
New cards

Network Admin Essentials

knowt flashcard image
25
New cards

Attacks on Different LayersA

knowt flashcard image
26
New cards

Attacks on Different LayersA

knowt flashcard image
27
New cards

TCP three-way handshake (connection establishment) and four waved hands (close connection

knowt flashcard image