Module 1 - Introduction to Incident Handling and Response

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/135

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

136 Terms

1
New cards

Information security

Refers to the protection or safeguarding of information and information systems (i.e., systems that use, store and transmit information) from unauthorized accesses, disclosures, alterations, and destruction.

2
New cards

What are the 5 Elements of Information Security?

Confidentiality, Integrity, Availability, Authenticity, Non-Repudiation

3
New cards

Confidentiality

The assurance that information is accessible only to those who are authorized to have access.

4
New cards

Integrity

Trustworthiness of data or resources in the prevention of improper and unauthorized changes.

5
New cards

Availability

The assurance that the systems responsible for delivering, storing, and processing information area accessible when required by authorized users.

6
New cards

Authenticity

Genuineness or uncorruptedness of any communication, document or data.

7
New cards

Non-repudiation

A way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.

8
New cards

Characteristics of an information asset?

・Recognized to be of value
・Considered an asset to the org
・Difficult to replace with cost, skills, time and resources
・Part of the org's corporate identity
・Data classified as an information asset are confidential and proprietary
・Plays a significant role in the org's business
・Organized documentation that motivates the org to achieve its goals
・Maintained by people working in a consistent and cooperative manner.
・Can be part of a unique enterprise application or part of one.
The loss of information affects the org's investments in different business activities.

9
New cards

Defense-in-depth?

A security strategy in which security professionals use several protection layers throughout an information system.

10
New cards

What are the goals of security policies?

・Reduce or eliminate legal liability of employees and third parties.
・Protect confidential and proprietary information from them, misuse, unauthorized disclosure, or modification.
・They prevent wastage of the company's computing resources.

11
New cards

What's the difference between technical and administrative security policies?

・Technical security policies describe the configuration of the technology for convenient use.
・Administrative security policies address how all persons should behave.

12
New cards

What is a Promiscuous Policy?

No restrictions on usage of system resources.

13
New cards

What is a Permissive Policy?

Policy begins wide open and only know dangerous services, attacks or behaviors are blocked.

Regularly updated to ensure effectiveness.

14
New cards

What is a Prudent Policy?

Policy provides maximum security while allowing known but necessary dangers.

Blocks all services and only safe/necessary services are enabled individually; everything is logged.

15
New cards

Paranoid Policy

Policy forbids everything, no internet connection/severely limited internet usage

16
New cards

Access Control Policy

Defines the resources being protected and the rules that control access to them.

17
New cards

Remote-Access Policy

Defines who can have remote access, defines access medium, and defines remote access security controls.

18
New cards

Firewall Management Policy

Defines access, management, and monitoring of firewalls in organization.

19
New cards

Network Connection Policy

Defines who can install new resources on the network, approve the installation of new devices, document network changes, etc.

20
New cards

Passwords Policy

Provides guidance for using strong password protection on organization's resources.

21
New cards

User-Account Policy

Defines the account creation process and the authority, rights and responsibilities of user accounts.

22
New cards

Information Protection Policy

Defines the sensitivity levels of information, who may have access, how information is stored and transmitted, and how information should be deleted from storage media.

23
New cards

Special Access Policy

Defines the terms and conditions of granting special access to system resources.

24
New cards

Email Security Policy

Created to govern the proper usage of corporate email.

25
New cards

Acceptable Use Policy

Defines the acceptable use of system resources.

26
New cards

Formula for an Attack?

Attacks = Motive (Goal) + Method + Vulnerability

27
New cards

Motive?

A motive originates from the notion that the target system stores or processes something valuable; this signals that the system may be under threat of an attack.

28
New cards

Typical motives behind infosec attacks?

・Disruption business continuity
・Performing information theft
・Manipulating data
・Creating fear and chaos by disrupting critical infrastructure
・Bringing financial loss to the target
・Propagating religious or political beliefs
・Achieving the state's military objectives
・Damaging the reputation of the target
・Taking revenge
・Demanding ransom
・Fun/thrills/exploration

29
New cards

Top infosec Attack Vectors?

・Cloud Computing Threats
・Advanced Persistent Threats (APT)
・Viruses and Worms
・Ransomware
・Mobile Threats
・Botnet
・Insider Attack
・Phishing
・Web Application Threats
・Internet of Things (IoT) Threats

30
New cards

What are the three main categories of information security threats?

Network threats, Host threats and Application Threats

31
New cards

Typical network threats?

・Information gathering
・Sniffing and eavesdropping
・Spoofing
・Session hijacking
・Man-in-the-middle attack
・DNS and ARP poisoning
・Password-based attacks
・Denial-of-service attack
・Compromised-key attack
・Firewall and IDS attacks

32
New cards

Typical Host threats?

・Malware attacks
・Footprinting
・Profiling
・Password attacks
・Denial-of-service attacks
・Arbitrary code execution
・Unauthorized access
・Privilege escalation
・Backdoor attacks
・Physical security threats

33
New cards

Typical Application threats?

・Improper data/input validation
・Authentication and authorization attacks
・Security misconfiguration
・Improper error handling and exception management
・Information disclosure
・Hidden-field manipulation
・Broken session management
・Buffer overflow issues
・Cryptography attacks
・SQL injection
・Phishing

34
New cards

How do you define a "Threat"?

An undesired event that attempts to access, exfiltrate, manipulate, or damage the integrity, confidentiality, security, and availability of an organization's resources.

35
New cards

What is a "threat actor"?

A person or entity responsible for the harmful incidents or with the potential to impact the security of an organization's network.

36
New cards

What are the types of threat actors?

・Script kiddies
・Organized hackers
・Hacktivists
・State-sponsored Attackers
・Insider Threat
・Cyber Terrorists
・Recreational Hackers
・Suicide Hackers
・Industrial Spies

37
New cards

What are some of the impacts of an Information Security Attack?

・Financial Losses
・Loss of Confidentiality and Integrity
・Damaged Customer Relationship
・Loss of Business Reputation
・Legal and Compliance Issues
・Operational Iimpacts

38
New cards

InfoWar

The use of information and communication technologies (ICT) for competitive advantages over an opponent.

39
New cards

Command-and-control Warfare (C2 Warfare)

Refers to the impact an attacker possesses over a compromised system or network that they control.

40
New cards

Intelligence-based Warfare

Sensor-based technology that directly corrupts technological systems.

41
New cards

Electronic Warfare

Uses radio-electronic and cryptographic techniques to degrade communication.

42
New cards

Psychological Warfare

Use of various techniques such as propaganda and terror to demoralize one's adversary in an attempt to succeed in battle.

43
New cards

Hacker warfare

Various purposes including theft of information, false messaging and other infosec attacks.

44
New cards

Economic Warfare

By blocking the flow of information, can affect the economy of a business or nation.

45
New cards

Cyber Warfare

The use of information systems against the virtual personas of individuals or groups.

46
New cards

Defensive Information Warfare

Refers to all the strategies and actions for security professionals and incident responders to defend their organization its ICT assets from cyber attackers.

47
New cards

Offensive Information Warfare

Involves attacks against ICT assets of an opponent to compromise the target's assets.

48
New cards

Types of information security incidents:

・Malicious Code or Insider Threat Attacks
・Unauthorized Access
・Unauthorized Usage of Services
・Email-based Abuse
・Espionage
・Fraud and Theft
・Employee Sabotage and Abuse
・Network and Resources Abuses
・Resource Misconfiguration Abuses

49
New cards

Two categories of incident signs:

Precusor - indicates the possibility of the occurrence of a security incident in the future (i.e., threats from hackers, new exploit, etc.)

Indicators - sign representing that the incident has probably occurred or is currently in progress (i.e., warning from AV or scanner, Firewall/IDS/IPS alerts, web server unavailability).

50
New cards

Common sources of Precusors and Indicators:

IDPS, SIEM, Antivirus/Antispam Software, File Integrity Checking Software, Third-Party Monitoring Services, OS/Service/Network/Application Logs.

51
New cards

Cost of an incident?

The sum of the total amount lost directly and indirectly due to the attack and the amount spent on recovering from the incident, including IH&R functions.

Orgs typically employ financial auditors to estimate the total cost.

52
New cards

Tangible Cost

Direct expenditures related to an incident. Can be quantified and identified (i.e., lost productive hours, loss of business, loss or theft of resources).

53
New cards

Intangible Cost

Expenditures that the org cannot calculate directly or value accurately (i.e., damage to corporate reputation, loss of goodwill, psychological damage, damage to shareholder's value).

54
New cards

Incident Management

It is a set of defined processes used to identify, analyze, prioritize, and resolve security incidents and restore a system to normal service and operations as soon as possible while preventing further recurrence of the incident.

It improves service quality, resolves problems proactively, reduces impacts of incidents, meets service availability requirements, increases staff efficiency and productivity, improves user/customer satisfaction and assists in handling future incidents.

55
New cards

What processes are included under Incident Management?

・Vulnerability analysis
・Artifact analysis
・Security awareness training
・Intrusion Detection
・Technology Monitoring

56
New cards

Incident Handling and Response (IH&R)

A process of taking organized and careful steps when reacting to a security incident or cyberattack.

57
New cards

IH&R Steps

1) Preparation
2)Incident Recording and Assignment
3) Incident Triage
4) Notification
5) Containment
6) Evidence Gathering and Forensic Analysis
7) Eradication
8) Recovery
9) Post-Incident Activities

58
New cards

Vulnerability Management

Proactive approach designed to identify, classify, and mitigate vulnerabilities.

59
New cards

What is a vulnerability?

The existence of a weakness or a design or implementation error that, when exploited, leads to an unexpected an undesirable event that compromises the security of the system.

60
New cards

Common areas of Vulnerability:

・Users
・Operating System
・Applications
・Network Devices
・Network Infrastructure
・Internet of Things (IoT)
・Configuration Files

61
New cards

Common areas of vulnerability in applications:

・Networking software
・Network operations and management
・Firewall and network security applications
・Database software

62
New cards

Network devices susceptible to vulnerabilities:

・Access points
・Routers
・Wireless routers
・Switches
・Firewall

63
New cards

How do Security Experts and vulnerability scanners classic vulnerabilities?

Severity Level: low, medium or high

Exploit Range: Local or remote

64
New cards

Vulnerability Classifications:

・Misconfigurations
・Default Installations
・Buffer Overflows
・Unpatched Servers
・Design Flaws
・Operating System Flaws
・Application Flaws
・Open Services
・Default Passwords

65
New cards

Vulnerability assessment

Examination of the ability of a system or application, including current security procedures and controls, to withstand assault.

Recognizes, measures, and classifies security vulnerabilities in computer systems, networks, and communication channels.

66
New cards

What information does a vulnerability scanner identify?

・OS version running on computers or devices
・IP and Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports that are listening
・Applications installed on computers
・Accounts with weak passwords
・Files and folders with weak permissions
・Default services and applications that might have to be uninstalled
・Mistakes in the security configuration of common applications
・Computers exposed to known or publicly reported vulnerabilities

67
New cards

Active assessment

Uses a network scanner to find hosts, services, and vulnerabilities

68
New cards

Passive assessment

A technique used to sniff the network traffic to uncover active systems, network services, applications, and vulnerabilities

69
New cards

External Assessment

Assesses the network from a hacker's point of view to find out what exploits and vulnerabilities are accessible to the outside world

70
New cards

Internal Assessment

A technique to scan the internal infrastructure to uncover exploits and vulnerabilities.

71
New cards

Host-Based Assessment

Determines the vulnerabilities in a specific workstation or server by performing a configuration-level check through the command line.

72
New cards

Network Assessments

Determines the possible network security attacks that may be waged on the organization's system

73
New cards

Application Assessments

Tests the web infrastructure for any misconfigurations and known vulnerabilities

74
New cards

Wireless Network Assessments

Determines the vulnerabilities in the organization's wireless networks

75
New cards

Steps in the Vulnerability Management Life Cycle

1) Baseline Creation
2) Vulnerability Assessment
3) Risk Assessment
4) Remediation
5) Verification
6) Monitoring

76
New cards

Threat assessment

Process of examining, filtering, transforming, and modeling of acquired threat data to extract threat intelligence.

77
New cards

Threat Targets and Assets

Organizational resources attacked by threat actors in order to gain control or steal information and launch further attacks on the organization.

78
New cards

Commonly Targeted Assets

・Personal Details
・Financial Information
・Intellectual Property
・Sensitive Business Data
・Login Details and IT System Information

79
New cards

Threat intelligence

Collection and analysis of information about threats and adversaries.

Includes drawing of patterns that inform knowledgeable decisions related to cyber attack preparedness, prevention, and response.

Also known as "cyber threat intelligence (CTI)".

80
New cards

Threat Contextualization

Process of assessing threats and their impacts under various (contextual) conditions. Threat context is obtained by detecting and analyzing current vulnerabilities in the IT resources, such as networks and information systems.

81
New cards

Threat Correlation

Helps organization to monitor, detect and escalate various evolving threats from organizational networks.

Main objective is to reduce false positive alert rates and detect and escalate stealthy, complex attacks.

82
New cards

Commonly used correlation techniques:

・Relating multiple incident types and sources across multiple nodes
・Incident sequence
・Incident persistence
・Incident-directed data collection

83
New cards

Threat Attribution

Process of identifying and attributing the actors behind an attack as well as their goals, motives and sponsors.

84
New cards

Group attribution

Deals with attributing based on the common group or association of multiple malicious actors and their attack methodologies.

85
New cards

Campaign attribution

Deals with attributing based on the malware or the campaign strategy of specific malware.

86
New cards

Intrusion-set Attribution

Deals with attributing the attacker based on the intrusion patterns.

87
New cards

True Attribution

Deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target.

88
New cards

Nation state attribution

Deals with attributing attacks sponsored by one nation against another nation.

89
New cards

Risk

Degree of uncertainty or expectation of potential damage that an adverse event may cause to the system or resources under specified conditions.

90
New cards

Risk Management

A set of policies or procedures to identify, assess, prioritize, minimize and control risks.

91
New cards

Risk Mitigation

A strategic approach to preparing to handle risks and reduce their impact on the organization.

92
New cards

Risk Assessment

Identification of risks, estimation of their impact, and determination of sources to recommend proper mitigation measures. Identification of risk is the initial step of the risk management plan.

93
New cards

What are the steps in Risk Assessment?

1) System Characterization
2) Threat Identification
3) Vulnerability Identification
4) Control Analysis
5) Likelihood Analysis
6) Impact Analysis
7) Risk Determination
8) Control Recommendation
9) Risks Assessment Report

94
New cards

What are the most common threat sources?

Human, natural, environmental

95
New cards

Control analysis

The process of analyzing various security controls implemented by the organization to eradicate or minimize the probability that a threat will exploit a system vulnerability.

96
New cards

Likelihood Analysis

The calculation of probability that a threat source exploits an existing system vulnerability

97
New cards

Impact analysis

Involves estimating the adverse impact of exploitation of a vulnerability by a threat source.

98
New cards

Mission Impact Analysis

Based on a qualitative or quantitative assessment of the sensitivity and criticality of the assets, prioritizes the impact levels associated with the compromise of those assets.

99
New cards

Asset criticality assessment

Identifies and prioritize the sensitive and critical information assets that support the critical missions of the organization.

100
New cards

Risk Determination

The probability of occurrence of an anticipated incident.