Module 2 - Incident Handling and Response Process

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

Incident Handling and Response (IH&R) Process

Provides a focused and structured approach for restoring normal business operations as quickly as possible with minimal impact after an incident.

2
New cards

Who initiates the IH&R processes?

The IH&R development project team, executive manager, head of the infosec department or any other person designated by management.

3
New cards

Purpose of IH&R process?

・Protect networks and systems
・Ensure timely incidents handling
・Ensure the gathering of appropriate information
・Identify false positives
・Efficiently use resources
・Address legal issues
・Comply with local, national, and international guidelines
・Train and protect personnel
・Develop comprehensive documentation

4
New cards

What is the process flow of IH&R?

1) Preparation
2) Incident Recording and Assignment
3) Incident Triage
4) Notification
5) Containment
6) Evidence Gathering and Forensic Analysis
7) Eradication
8) Recovery
9) Post-Incident Activities

5
New cards

What tasks occur under Post-Incident Activities?

・Incident Documentation
・Incident Impact Assessment
・Policy review and Revision
・Closing the Investigation
・Incident Disclosure

6
New cards

Who authorizes the execution of the IH&R process?

Management, stakeholders, and other authorized personnel.

7
New cards

Components of IH&R that incur cost?

・IH&R team staffing
・IH&R toolkits including software and hardware
・Communication systems
・Space requirements
・Transportation
・Fees for third-party assistance
・Power and environmental controls
・Forensic investigation

8
New cards

IH&R Plan

Refers to a set of instructions the IR team needs to follow to minimize the damage caused by an incident, efficiently use resources, and reduce its response duration.

9
New cards

Considerations for IH&R Policies?

・Statement of management commitment to IH&R plan
・Policy purpose and objectives
・Policy scope
・Definition of security incidents and their consequences within the context of the organization.
・Organizational structure and delineation of roles, responsibilities, and levels of authority.
・・Guidelines for prioritizing incidents or assigned severity levels.
・Performance measures and proper project management and time management details.
・Reporting guidelines.
・Guidelines for communication within and outside of the organization.

10
New cards

IH&R Procedures

Also referred to as standard operating procedures (SOPs), provide detailed step-by-step processes for implementing an IH&R plan and policy. Defines roles and responsibilities of the incident handling team in the event of an attack to avoid confusion, minimize damages, and reduce response time.

11
New cards

CAT 0

Exercise / Network Defense Testing

12
New cards

CAT 1

Unauthorized access.

Reporting Timeframe: Within one (1) hour of disovery/detection

13
New cards

CAT 2

Denial of service (DoS)

Reporting Timeframe: Within two (2) hours of disovery/detection if attack is ongoing.

14
New cards

CAT 3

Malicious code

Reporting Timeframe: Within one (1) hour of discovery/detection.

15
New cards

CAT 4

Inappropriate usage

Reporting Timeframe: Weekly

16
New cards

CAT 5

Scans/Probes/Attempted Access

Reporting Timeframe: If system is classified, report within (1) one hour of discovery.

17
New cards

CAT 6

Investigation

Depends on agency's classification and categorization.

18
New cards

Steps for building an IH&R Team

1) Design IH&R Team Development Plan
2) Set Expectation
3) Define IH&R Team Vision
4) Communicate the IH&R Team Vision
5) Start Building IH&R Team
6) Announce the IH&R Team
7) Evaluate IH&R Team Effectiveness

19
New cards

IH&R Team Models

・Centralized IR Team
・Distributed IR Teams
・Coordination Teams

20
New cards

IH&R Team Staffing

・Employees
・Partially Outsourced
・Fully Outsourced

21
New cards

IH&R Team Selection Factors

・Needed availability
・Resource availability
・Full-time vs. part-time team members
・Employee morale
・Cost/budget
・Staff expertise
・Organizational structure

22
New cards

What should be included in an IH&R toolkit?

・Computers with appropriate software tools
・Up-to-date operating systems and patches
・Basic networking equipment and cables
・Application media
・Blank media to store evidences or extract images from victim devices
・Write-protected backup devices

23
New cards

IH&R Software Requirements

・OS such as Windows 10, Windows Server 2016, Linux/ Unix / Mac OS X
・Installed drivers for all the hardware
・Forensics software such as EnCase
・Imaging tools such as R-drive image
・Programming language applications
・Graphics tools
・Specialized viewers
・Hashing tools
・File Recovery Programs
・Encryption Decoding Software
・Password Cracking Software
・Miscellaneous Software

24
New cards

Considerations for setting up a Computer Forensics Lab (CFL)

・Planning and budgeting
・Physical location and structural design considerations
・Work area considerations
・Human resource considerations
・Physical security recommendations
・Forensics lab licensing

25
New cards

What organizational resources should be audited before implementing IH&R capabilities?

・Security auditing
・Vulnerability assessment
・Threat analysis
・Risk managment
・Cyber trend/analysis/threat intelligence

26
New cards

Security policy

Depicts the basic architecture of the computer's security environment.

27
New cards

Security procedures

SOPs for dealing with various types of attacks. Should be detailed to assist with minimizing error, cost and damage to assets.

28
New cards

Security awareness

Training and awareness for IH&R team.

29
New cards

Access Controls

Ensure that only selected or eligible employees have access to sensitive data, critical devices, and other necessary resources required to accomplish the assigned tasks.

30
New cards

Real-Time Offsite Backup

A real-time offsite back up indicates data stored in a place away from the original site for safekeeping in the event of disaster.

31
New cards

Scheduled Backup

Scheduled backups consistently save data based on a user's requirements.

32
New cards

Unlimited space

The strategy should ensure that unlimited space is available to backup large amounts of data.

33
New cards

Data Availability

The strategy must make data available at any time to ensure the retrieval and recovery of lost data.

34
New cards

Incident handlers should consider what requirements for offsite backup?

・In real time and created far offsite
・Must fit the user's requirements
・Should provide alerts, daily status updates and other ・useful notifications
・Unlimited space for storing large amounts of data
・High availability so data can be retrieved at any time
・Should encrypt data in transit
・Data provider must guarantee data safety

35
New cards

Factors to consider when choosing cyberinsurance:

・Risks faced by the organization
・Policy requirement
・What type of coverage and extent the policy offers
・What does the policy include and exclude

36
New cards

GPMC

Group Policy Management console. In Windows OS, it is a scriptable interface for viewing and editing the settings of all Group Policy Objects (GPOs), domains, and sites related to an organization.

37
New cards

Important considerations for the Incident Escalation Procedures for Employees?

・Allow victims, customers, clients, and other people to easily report an incident.
・Enable the incident handler to assign tasks to team members, verify process followed, obtain reports about progress, and suggest methods.
・Allow the incident responders to discuss the steps, communicate the response results, and provide result data with proper evidence.
・Communicate the result and report it to management and stakeholders.

38
New cards

What are the advantages of using a ticketing system?

・Automatically generates tickets upon discovering suspicious patterns from a firewall, IDS, and/or SIEM
・Systematically collects details about an incident
・Helps in assigning priority to incidents based on the compromised system, type of incident, and so on
・Alerts the responsible persons and automatically distributes tasks
・Stores details of the incidents, solutions, and results
・Helps to create a chain of custody and documents for reports
・Ensures proper and timely IR
・Stores details of costs incurred in the IR process

39
New cards

What are the three main steps of Incident Triage?

1) Incident Analysis and Validation
2) Incident Classification (type of incident)
3) Incident Prioritization (high, medium, or low)

40
New cards

What are some of the steps used in Incident Analysis?

・Log Analysis (IPDS, firewall, application, router logs)
・Event Correlation
・Network and System Profiling (changes in baseline or integrity of files)

41
New cards

What factors are used in Incident Classification?

・Nature of the incident
・Criticality of the systems impacted
・Number of systems impacted
・Legal and regulatory requirements
・Severity
・Affected resources
・Attack methodology

42
New cards

What factors are used in Incident Prioritization?

・Potential technical impact
・Critical nature of the affected resources
・Potential business impact

43
New cards

What are the 3 prioritization levels and their response time frames?

1) Low-level. Least harmful, nominal threat. It is essential to address these incidents as they can escalate to a higher level incident.
2) Middle-level. More severe incidents that pose severe threats to the organization. Incidents should be addressed within a few hours of occurrence.
3) High-level. Most severe incidents that can threaten the business operations. Require immediate attention.

44
New cards

What factors should be considered in prioritizing incidents?

・Impact on business functionality
・Sensitivity of the affected information
・Ability to manage and recover

45
New cards

Best practices for incident classification and prioritization?

・Focus on high-priority security concerns first.
・Prioritize recommendations for mitigating risks to applications.
・Develop strategies to achieve short-term and long-term security postures.
・Decide on the required resources which must be available to maintain a consistent level of information security.

46
New cards

What is the Notification Process?

1) Notify management
2) Notify the required stakeholders.
3) Contact external agencies.
4) Plan for Incident Handling.

47
New cards

What factors affect the resources required to investigate an incident?

・Forensic duplication of related computer systems.
・Criminal referral
・Civil litigation

48
New cards

Who are important contacts to have recorded in the event of notification?

・CEO
・CTO
・CIO
・CISO
・Other IT teams in the org
・Owners of the victim systems and administrators
・Public affairs
・Legal departments

49
New cards

Internal communications methods used during IH&R

・Secure Communication Channels
・Out-of-Band Communication Channels

50
New cards

Common techniques used in the containment phase

・Disabling of Specific System Services
・Changing of Passwords and Disabling of Accounts
・Complete Backups of the Infected System
・Temporary Shutdown of the Compromised System
・System Restoration
・Maintaining a Low Profile

51
New cards

What are the steps of Evidence Gathering and Forensic Analysis?

1) Collect Evidence
2) Create a Chain of Custody Document
3) Analyze the Evidence
4) Create a Forensic Investigation Report
5) Management Receives Investigation Report
6) Law enforcement or 3rd Party Investigators
7) Close the Investigation

52
New cards

What is the process of collecting evidence?

・Identification of target resources, networks, and connected resources.
・Securing and documenting the crime scene.
・Extracting fragile and volatile evidence.
・Secure handling, packaging, and transportation of the evidence devices.
・Extracting static evidence stored as media and other resources.

53
New cards

What are some of the considerations in Evidence Handling?

・Backing up all affected systems for further investigation and recovery
・Store all backups in a physically secure location, protect the collected evidence from physical or logical damage
・Ensure only authorized individuals have access to backup
・Maintain a well-documented Chain of Custody

54
New cards

What are the steps in Eradication?

1) Determine the Cause of the Incident
2) Eliminate the Cause
3) Verify if the Issues exists in similar systems
4) Resolve and Patch the Issue
5) Start Recovery Processes

55
New cards

What are the countermeasures to include in removing the root cause of the incident?

・Update AV software
・Install latest patches
・Policy compliance Checks
・Independent Security Audits
・Disable unnecessary services
・Update security policies and procedures
・Change passwords of compromised systems
・Reinstall compromised systems

56
New cards

What are the steps for the Recovery Process?

・Eliminate the Cause of the Incident
・Is Data Lost? (if yes)
・Recovery Data from Backup
・Restart Services and Processes

57
New cards

What is the process for Post-Incident Activities?

・Incident Documentation
・Incident Impact Assessment
・Review and Revise Policies
・Close the Investigation
・Incident Disclosure

58
New cards

What are some important considerations for Incident Documentation?

・Concise and Clear
・Written in a Standard Format
・Reviewed by Editors
・Should capture a full description of the breach: who handled the incident, when the incident was handled, reasons behind the occurrence, etc.

59
New cards

What items should the impact assessment address?

・Financial losses
・Legal costs
・Costs pertaining to the incident
・Losses and costs related to system downtime
・Implementation costs
・Costs related to repairing and replacing damaged systems
・Costs related to the damage of goodwill, customer trust and reputation

60
New cards

After the incident, what should be reviewed and revised?

Policies, procedures, preparation and protection.

Discussion on the incident, what can be learned, how it can be avoided, etc.

61
New cards

Disclosure should be made to which possible interested parties?

・Law enforcement
・Regional Judiciary
・Regulatory authorities
・Media
・Stakeholders
・Stockholders
・Breach victims
・Vendors
・Customers
・General Public
・Third parties
・Other CERTs/CSIRTs

62
New cards

What sensitive information about an incident should not be disclosed?

・Sensitive information
・Unpatched vulnerabilities
・Nation-state sponsored incident
・Chaos creating information
・Business impact information