Cysa+ Domain 3

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Event

Any observable occurrence in a system or network. (A user accessing a file stored on a server)

2
New cards

Security Event

Any observable occurrence that relates to a security function. (An administrator changing permissions on a shared folder)

3
New cards

Adverse Event

Any event that has negative consequences. (A server crash)

4
New cards

Security Incident

A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices. (The launch of a denial-of-service attack against a website)

5
New cards

Preparation Phase

The phase where the organization builds policy, procedures, training, and resources for the response team before an incident occurs. (Assembling the hardware and software required to conduct an incident investigation)

6
New cards

Detection and Analysis Phase

The phase focused on initial identification and investigation to determine if a security incident is occurring. (Interpreting log entries using a security information and event management (SIEM) system to identify a potential incident)

7
New cards

Containment, Eradication, and Recovery Phase (Incident Response)

The phase involving active measures to limit the damage, remove the effects of the incident, and restore normal business operations. (Isolating systems to contain the damage caused by an incident)

8
New cards

Post-Incident Activity Phase

The final phase where the team conducts forensic procedures, determines the root cause, and reviews the response to improve future efforts. (Conducting a lessons learned review session)

9
New cards

Playbook

A document describing specific, step-by-step procedures to follow in the event of a particular type of cybersecurity incident. (Procedures for responding to a web server defacement)

10
New cards

Root Cause Analysis

Developing a clear understanding of what led to the incident to correct deficiencies and prevent future attacks. (Determining how an attacker breached security controls in the first place)

11
New cards

External/Removable Media

An attack executed from removable media or a peripheral device. (Malicious code spreading onto a system from an infected USB flash drive)

12
New cards

Attrition

An attack that employs brute-force methods to compromise, degrade, or destroy systems. (A brute-force attack against an authentication mechanism)

13
New cards

Low Functional Impact

Minimal effect caused by an incident, where the organization can still provide all critical services but has lost efficiency. (A system experiences impairment but the organization maintains all critical services)

14
New cards

High Functional Impact

The organization is no longer able to provide some critical services to any users. (An incident causes a server crash resulting in the loss of critical services)

15
New cards

Extended Recoverability Effort

The time to recovery is unpredictable, requiring additional resources and outside help. (An attack requires unpredictable time to restore service and external partners are needed)

16
New cards

Privacy Breach

Sensitive personally identifiable information (PII) of taxpayers, employees, beneficiaries, and so on was accessed or exfiltrated. (Unencrypted PII about company employees is contained on a stolen laptop)

17
New cards

Indicators of Attack (IoAs)

Evidence that can be identified while an attacker is currently conducting an attack.

18
New cards

Increases in Resource Usage

A spike in the consumption of computing resources like CPU, memory, disk space, or network bandwidth.

19
New cards

Suspicious File Modifications

Unauthorized or unexpected changes made to files, configuration files, or system registries. (Attackers gathering data from across the organization and collecting it in an unexpected location before transferring it out).

20
New cards

Unusual User/Account Behaviors

Actions that users, services, or systems perform that do not fit typical established patterns or profiles. (A user account connecting to 10 machines via SSH within a few seconds, indicating bot-like behavior).

21
New cards

Containment

The critical first activity in incident response designed to limit the scope and impact of a security incident.

22
New cards

Scope of the Incident

The measure of the number of systems or individuals involved in a security incident.

23
New cards

Network Segmentation

A strategy that divides the network into separate segments to prevent the spread of security incidents.

24
New cards

Isolation

A strong containment technique where compromised systems are completely disconnected from the rest of the internal network.

25
New cards

Airgapped System

A system that is physically and logically isolated from all other networks.

26
New cards

Removal

The strongest containment technique, which involves completely disconnecting affected systems from all other networks

27
New cards

Eradication

The phase of incident response that follows containment, focused on removing all remaining artifacts of the incident from the network.

28
New cards

Recovery

The phase of incident response focused on restoring normal operations and services while correcting security control deficiencies.

29
New cards

Root Cause

The underlying deficiency or mechanism that allowed the initial security attack to succeed

30
New cards

Reimaging

The process of rebuilding a compromised system from scratch or restoring it from an image or backup taken from a known secure state.

31
New cards

Clear

Applying logical techniques, such as standard Read and Write commands, to sanitize data against simple noninvasive data recovery techniques.

32
New cards

Purge

Applying physical or logical techniques to make data recovery infeasible using state-of-the-art laboratory methods.

33
New cards

Destroy

Techniques that render data recovery infeasible using laboratory methods and result in the subsequent inability to use the media for storage.

34
New cards