Unit 5 – Incident Response Vocabulary

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms and definitions from Unit 5 Incident Response lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Incident Response Team

Designated group responsible for preparing for, responding to, and recovering from security incidents.

2
New cards

Team Leader (Incident Response)

Ensures all team members understand their roles during a security incident.

3
New cards

Technical Specialist

Provides the technical expertise to assess and determine the scale of a security incident.

4
New cards

Documentation Specialist

Records and maintains all details of the incident response process.

5
New cards

Legal Advisor

Interprets laws and regulations relevant to computer forensics and incident response for the organization.

6
New cards

Incident Response Plan

Formal document that defines team roles, responsibilities, procedures, and reporting requirements for handling incidents.

7
New cards

Incident Categories

Standard classifications used to label types of security events or incidents (Cat 0–Cat 9).

8
New cards

Roles and Responsibilities

Section of the incident response plan that assigns duties to each team member.

9
New cards

Reporting Requirements/Escalation

Guidelines detailing how and when users must report potential security incidents and to whom they escalate issues.

10
New cards

Exercise Planning

Scheduled simulations used to test the effectiveness of the incident response plan and team readiness.

11
New cards

User Roles

Expectations and duties of end-users regarding detection, reporting, and mitigation of security incidents.

12
New cards

Event

Any observable occurrence in a system or network.

13
New cards

Incident

An assessed event that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system.

14
New cards

Category 0 – Training/Exercise

Activities related to training events or exercises that simulate incidents.

15
New cards

Category 1 – Root-Level Intrusion

Unauthorized access to administrator or root functions of a system.

16
New cards

Category 2 – User-Level Intrusion

Unauthorized access gained at a non-administrator (user) level.

17
New cards

Category 3 – Unsuccessful Activity Attempt

Failed attempt at unauthorized access or malicious activity.

18
New cards

Category 4 – Denial of Service

Activity that prevents or impairs normal system or network functionality.

19
New cards

Category 5 – Non-Compliance Activity

Authorized user actions that violate Air Force or organizational policy.

20
New cards

Category 6 – Reconnaissance

Activity that gathers information about a network or system (e.g., scanning).

21
New cards

Category 7 – Malicious Logic

Installation or execution of software such as viruses, worms, or Trojan horses.

22
New cards

Category 8 – Investigating

Events currently under review to determine if they constitute an incident.

23
New cards

Category 9 – Explained Anomaly

Events identified as false alarms or benign activities after analysis.

24
New cards

First Responder (Cyber)

Person who initially reacts to an incident with the primary goal of containment.

25
New cards

Containment

Immediate actions taken to limit the scope and impact of an incident (e.g., isolating an infected host).

26
New cards

Six Phases of Incident Response

Detection & Reporting; Preliminary Analysis & Identification; Preliminary Response Actions; Incident Analysis; Response & Recovery; Post-Incident Analysis.

27
New cards

Detection and Reporting

Phase in which potential incidents are discovered and communicated to responders.

28
New cards

Preliminary Analysis and Identification

Initial review to confirm the incident type and severity.

29
New cards

Preliminary Response Actions

Steps taken to contain a potential threat and prevent further contamination.

30
New cards

Incident Analysis (Phase)

Detailed examination to determine what happened and identify the root cause.

31
New cards

Response and Recovery

Efforts to eradicate threats, restore services, and implement preventive measures.

32
New cards

Post-Incident Analysis

Formal review capturing lessons learned and improvement actions after recovery.

33
New cards

Plan of Action & Milestones (POA&M)

Document developed by the Comm Focal Point outlining tasks, timelines, and responsibilities for restoration and prevention.

34
New cards

Root Cause Analysis

Series of analytical steps used to identify the fundamental reason an incident occurred.

35
New cards

Gather Information (RCA Step)

Collect all relevant data, logs, and details about the incident for analysis.

36
New cards

Validate the Incident

Continuous review to confirm accuracy of information and that an incident truly occurred.

37
New cards

Determine the Operational Impact

Assess how the incident affects missions and coordinate with AF-DAMO or other bodies for impact analysis.

38
New cards

Coordinate (RCA Step)

Engage appropriate organizations and stakeholders during the analysis process.

39
New cards

Determine Reporting Requirements

Identify mandatory reports and notifications based on incident type and scope.

40
New cards

Cyber Incident Report

Detailed document outlining affected systems, probable attacker, attack vector, and technical/operational impacts.

41
New cards

Network Intelligence Report

Report focusing on incidents or activities linked to foreign threats or potential threats to DoD networks.

42
New cards

Postmortem (Incident Response)

Review capturing lessons learned, root causes, execution issues, policy gaps, and defense inadequacies after an incident.