9: Incident Handling Response and Governance

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:48 AM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Security Event

Any observable occurrence in a system or network. Ex: User login, file access

2
New cards

Security Incident

An event that violates or threatens to violate security policy or standard practice. Ex: malware infection, DoS

3
New cards

Security Breach

A confirmed incident resulting in unauthorised access to sensitive data. Ex: Credentials stole, records leaked

4
New cards

Incident Response Lifecycle : NIST SP 800-61

1) Preparation

2) Detection & Analysis

3) Containment

4) Eradication

5) Recovery

6) Post-Incident Activity

5
New cards

Preparation

Policies & Procedures -

IRP, Playbooks & Runbooks, Communication protocols

Team & Tools -

Assign roles: manager, analyst, Deploy SIEM, IDS/IPS, Establish secure comm channels

Training & Testing -

Red team/Blue team drills, User awareness training, Test backup & recovery systems

6
New cards

Detection & Analysis

Detection Sources -

SIEM alerts and correlation rules, IDS/IPS signature & anomaly alerts, Antivirus notifications, User & helpdesk reports

Analysis Steps -

  1. Validate Alert : eliminate false positives

  2. Gather context : 4W

  3. Classify severity : Low/Med/High/Critical

  4. Determine scope : isolated/widespread

  5. Preserve evidence : system logs, snapshots

  6. Notify stakeholders per the escalation matrix

7
New cards

Containment

Short-term containment -

Isolate affected systems, Block malicious IPs at firewall, Disable compromised accounts

Long-term containment -

Apply temporary patches, Implement additional monitoring, Prepare clean systems for restoration

8
New cards

Eradication

Remove root cause completely:

Delete malware, rootkits, backdoors.

Patch exploited vulnerabilities, Reset all compromised credentials, Verify the integrity of critical files, Conduct antivirus scan

9
New cards

Recovery

Restore systems from clean backups

Gradually reconnect to production network

Monitor closely for signs of re-infection

Validate restoration

Change all passwords and rotate keys

10
New cards

Post-Incident Activity

Produce formal incident report

Update IR plan based on findings

Improve detection rules & playbooks

Conduct lessons-learned meeting

Management & board-level briefings

11
New cards

Incident Response Team Structure

IR Manager = Leads response, authorises containment decisions, executive communication

SOC Analyst = Monitors alerts, triages events, performs initial investigation

Forensic Analyst = Evidence preservation, disk & memory forensics, chain of custody

Threat Intel = Provides TTP context, threat actor profiling

Legal/Compliance = Regulatory obligations, disclosure requirements

Communications = Internal & external messaging, PS, Customer notification

12
New cards

Governance Frameworks for Incident Response

NIST SP 800-61 Rev.2 = US NIST Standard, 6 phase lifecycle, adopted globally, free and detailed guidance.

ISO/IEC 27035 = International standard, 5 phase model, integrates with ISO 27001, risk-based approach.

SANS PICERL = Preparation ID Containment, Eradication Recovery Lessons, Practitioner focused

GDPR (Art. 33 & 34) = 72 hour breach notification, notify supervisory authority, applies to EU personal data

13
New cards

Incident Severity Classification

knowt flashcard image
14
New cards

Types of Digital Evidence

Volatile (Collect 1st) - RAM, running processes, network connections

Semi-volatile - Temp files, registry

Non-volatile - Hard disk, SSD

Network - Firewall logs, Proxy logs

Application - Log files, Database records, Audit trails

15
New cards

Chain of Custody

Documents who handled evidence, when ,and how

Required fields: date/time, handler name, description, hash value

Use write-blockers for disk imaging (prevent modification)

Store evidence in tamper-evident containers/bags

16
New cards

Communication & Escalation during Incidents

knowt flashcard image
17
New cards

Common Incident Scenarios and Response Actions

knowt flashcard image
18
New cards

Key Components of Incident Report

knowt flashcard image