Chs 13, 14, 15

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

IRP, DiD, Categories of Network troubleshooting tools

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

An incident is

violation of security policy, or imminent threat to it

2
New cards

Ch 13 Phases of incident response are

  1. Preparation

  2. Incident Identification

  3. Containment

  4. Investigation

  5. Eradication

  6. Recovery & Repair

  7. Lessons Learned

3
New cards

Preparation phase is

Get ready before anything goes wrong. Create plans, assign roles, and train the team (CSIRT).

4
New cards

Incident Identification phase is

Spot when something unusual happens. Decide if it’s a real security incident.

5
New cards

Containment phase is

Stop the damage from spreading. Disconnect affected systems and preserve evidence.

6
New cards

Investigation phase is

Figure out what happened and collect evidence safely. May involve experts or law enforcement.

7
New cards

Eradication phase is

Remove the threat that caused the incident. Fix vulnerabilities to prevent repeat attacks.

8
New cards

Recovery & Repair phase is

Restore systems and get everything running again safely. Replace anything damaged or affected.

9
New cards

Lessons Learned phase is

Review the incident. Ask: What worked? What didn’t? Use what you learn to improve your response plan.

10
New cards

DiD defined

an approach where a series of defensive security controls are layered to protect sensitive data

  • Each layer of defensive security controls cost money

  • Use network security risk assessment to asses where to put security controls in layered security architecture

  • barriers = more points of failure hackers must go through

11
New cards

Layers of DiD include:

1. Policies & User Awareness

2. Physical Security

3. Perimeter Security

4. Network Security

5. Endpoint Security

6. Application Security

7. Data Security

12
New cards

Ch 15 - What are the five categories of network troubleshooting tools?

1. Physical Layer Tools

2. Network Performance Monitoring Tools

3. Network Connectivity and Testing Tools

4. Network Scanning and Discovery Tools

5. Vulnerability & Protocol Analysis Tools

13
New cards

1. Physical Layer Tools

Test and troubleshoot physical components like cables, connectors, and ports.

14
New cards

2. Network Performance Monitoring Tools

Measure bandwidth, data flow, and help track down slow or overloaded connections.

15
New cards

3. Network Connectivity and Testing Tools

Check if a device is reachable and verify network layer connectivity.

16
New cards

4. Network Scanning and Discovery Tools

Identify devices on a network (e.g., ARP scan, ping sweep, subnet scan).

17
New cards

5. Vulnerability & Protocol Analysis Tools

- Vulnerability tools scan for security weaknesses. - Protocol analyzers (like Wireshark) decode and examine network traffic for detailed troubleshooting.