1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
incident response 7-phase model
preparation
detection
analysis
containment
eradicaton
recovery
post-incident activity/lessons learned
root cause analysis
identifies the incident’s source and how to prevent it in the future
after-action report
collects formalized info about what occurred
advisories and bulletins
published by vendors and security researchers when new TTPs and vulnerabilities are discovered
intelligence fusion and threat data
use SIEM and analysis platforms to spot concerns in the logs and real-world security threats
digital forensic
investigating and analyzing digital devices and data to uncover evidence for legal purposes
4 phases of digital forensics
identification—document the scene and preserve evidence
collection—gathering, preserve, document evidence. order of volatility
chain of custody—documented and verifiable record that tracks handling/transfer/preservation of evidence
evidence collecting—disk imaging and file carving
order of volatility
dictates the sequence in which data sources should be collected and preserved bassed on their susceptibility to modificaiton or loss
disk imaging
creating a bit-by-bit or logical copy of a storage device, preserving its entire content, including deleted files and unallocated space
file carving
extracting files and data fragments from storage media without relying on the file system
legal hold
formal notification that instructs employees to preserve all potentially relevant electronic data, documents, and records
electronic discovery (e-discovery)
identifying, collecting, and presenting electronically stored information for potential legal proceedings
data acquisition
the method and tools used to create a forensically sound copy of data from a source device, such as system memory or a hard disk