Incident Response (IR)

0.0(0)
studied byStudied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:40 PM on 1/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

What is the role of Incident Response (IR) in the overall ISM framework?

IR is a core activity in the Management phase of ISM. It's a systematic process for dealing with a computer security incident and is a vital part of "good management".

2
New cards

What is the fundamental relationship between IR and Risk Management?

The entire IR process is designed to manage the risk of an incident and minimize its impact. Critically, the post-incident process of Lessons Learned must feed directly back into the Risk Management process to improve security measures.

3
New cards

What are the 5 phases of NIST CSF

Identify: Establish an organizational understanding of cybersecurity risks to systems, assets, data, and capabilities, including governance, risk assessment, and supply chain risk.

Protect: Develop and implement safeguards to ensure delivery of critical services and protect systems and assets from cyber threats.

Detect: Implement processes to identify the occurrence of a cybersecurity event in a timely manner.

Respond: Take action to contain the impact of a detected cybersecurity incident, including communication, analysis, and mitigation.

Recover: Develop and implement plans to restore capabilities or services impaired due to a cybersecurity incident

4
New cards

List and describe the four stages of the NIST Incident Handling Lifecycle.

1. Preparation: Planning, policy, team setup, and defining what constitutes an incident.

2. Detection and Analysis: Monitoring systems, identifying potential incidents (security events), and analyzing them to confirm if an attack is occurring.

3. Containment, Eradication, and Recovery: Stopping the spread (containment), removing the threat (eradication), and restoring systems to normal operation (recovery).

4. Post-Incident Activity: Documenting lessons learned and feeding information back into the preparation phase to improve future respons

5
New cards

Define Digital Forensics in the context of Incident Response.

To apply science to law to produce evidence for court or to provide information in an investigation

6
New cards

List and briefly explain the four main stages of the forensics process (Collection, Examination, Analysis, Reporting).

1. Collection (media): Identifying, recording, and labelling data while maintaining the integrity of data.

2. Examination (data): Processing data (manually/automatically) to extract interesting data, also maintaining integrity.

3. Analysis (information): Establishing the chain of events and identifying attackers/victims.

4. Reporting (evidence): Documenting results and the analysis process thoroughly, often for presentation in court

7
New cards

Beyond criminal investigation, what is another key use of forensics in "good management"?

Forensics is used for operational troubleshooting, data recovery following accidents, data acquisition (e.g., from retired staff), and due diligence for regulatory compliance

8
New cards

What is the primary Legal/Ethical constraint on investigations regarding data subjects?

The Privacy of personal data. Investigations must consider the DPA and Investigatory Powers legislation

9
New cards

What two ethical requirements must investigators follow when using forensics?

The investigation must state the reasonable and appropriate use of forensics and must ensure adherence to the ACPO Principles for Digital Evidence

10
New cards

What are the Personnel issues that create ethical/operational constraints during an investigation?

Security Management must consider:

1. Training and Skills

2. Willing to engage in the potentially stressful activities involved in high-stakes investigations