4.8 - Incident Response

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:54 AM on 11/17/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

Incident Response (IR) Process

The formal 7-step "playbook" for what to do when (not if) you get breached.

Prepare, Detect, Analyze, Contain, Eradicate, Recover, Lessons Learned.

(A good way to remember: Please Don't Anger Cats, Even Rabid Lions)

2
New cards

Step 1: Preparation

When: Before any attack.

Action: Getting your tools (SIEM, EDR), team (call list), and training (tabletop exercises) ready.

3
New cards

Step 2 and 3: Detection and Analysis

When: The moment the attack begins.

Action: An alarm fires (e.g., a SIEM alert) (Detection). You investigate to see if it's a real attack or a false positive (Analysis).

4
New cards

Step 4: Containment

When: As soon as you confirm a real attack.

Action: Stop the bleeding! You isolate the infected systems from the network (e.g., unplug the network cable).

Goal: This does not fix the problem, but it stops the attack from spreading. This is the most urgent step during an attack.

5
New cards

Step 5: Eradication

When: After the attack is contained.

Action: Find the root cause of the breach (e.g., an unpatched server) and remove the attacker/malware. (e.g., Patch the server, delete the malware).

6
New cards

Step 6: Recovery

When: After the threat is gone.

Action: Return to normal business. (e.g., Reconnect the now-clean server to the network, restore data from backups).

7
New cards

Step 7: Lessons Learned

When: After the incident is over.

Action: A formal meeting to ask, "What went wrong? How do we prevent this exact attack from ever happening again?"

Goal: To improve your Preparation for the next incident.

8
New cards

Threat Hunting

What it is: Proactively searching for attackers, assuming they are already inside your network and have avoided your automated alerts.

Analogy: You're not waiting for the alarm; you're actively patrolling the halls looking for an intruder.

9
New cards

Digital Forensics

What it is: The process of collecting and preserving evidence in a way that is admissible in a court of law.

Goal: To prosecute a crime. This is slow and methodical. (IR is fast and "stops the bleeding").

10
New cards

Legal Hold

What it is: An order from the legal department to PRESERVE ALL DATA related to a case.

Action: You must stop all automatic deletion (like log rotation or email deletion policies). Do not delete anything.

11
New cards

Chain of Custody

What it is: A formal document (a logbook) that tracks evidence.

Purpose: It shows who had the evidence (e.g., a hard drive), when they had it, and why they had it. This proves the evidence was not tampered with.

12
New cards

Acquisition (Forensic

What it is: The process of making a copy of the evidence.

Action: You create a bit-for-bit (forensic) image of the hard drive. You NEVER work on the original evidence; you work on the copy.

13
New cards

E-Discovery

What it is: The process of searching through massive amounts of electronic data (emails, documents, databases) to find specific evidence for a legal case.

Analogy: Finding the "smoking gun" email in a 10-million-email archive.

14
New cards

Simulation

What it is: A "live-fire" drill.

Scenario: A "Red Team" (attackers) actually tries to breach the network, and the "Blue Team" (defenders) tries to stop them.

Goal: To test your real tools and team skills.

15
New cards

Tabletop Exercise

What it is: A "talk-through" drill.

Scenario: The IR team sits in a conference room. Someone presents a scenario ("A new ransomware is on our file server. What do we do?").

Goal: To test your processes and communication, not your tech.

Explore top flashcards