CySa+ Jason Dion Notes

studied byStudied by 19 people
4.0(1)
Get a hint
Hint

Considerations for conducting triage on an incident

1 / 968

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

969 Terms

1

Considerations for conducting triage on an incident

- Damage to data integrity
- Unauthorized changes
- Theft of data or resources
- Disclosure of confidential data
- Interruption of services
- System downtime

New cards
2

Impact-based Approach

Categorization approach that focuses on the severity of an incident, such as emergency, significant, moderate, or low.

New cards
3

Taxonomy-based Approach

Approach that defines incident categories at the top level, such as worm outbreak, phishing attempt, DDoS, external host/account compromise, or internal privilege abuse.

New cards
4

Organizational Impact

Incident that affects mission essential functions so the organization cannot operate as intended.

New cards
5

Localized impact

Incident that is limited in scope to a single department, small user group or a few systems.

New cards
6

Immediate Impact

Incident measurment based on direct costs incurred because of an incident, such as downtime, asset damage, penalties and fees

New cards
7

Total Impact

Incident measurement based on the costs that arise during and following the incident, including damage to the company's reputation.

New cards
8

Incident Classification - ways to classify

- Data Integrity
- System Process Criticality
- Downtime
- Economic
- Data Correlation
- Reverse Engineering
- Recovery Time
- Detection Time

New cards
9

Data Integrity

Any incident where data is modified or loses integrity

New cards
10

System Process Criticality

Incidents that disrupt or threaten a mission essential business function

New cards
11

Downtime

An incident that degrades or interrupts the availability of an asset, system or business process

New cards
12

Economic

incident that creates short-term or long-term costs

New cards
13

Data Correlation

Incident that is linked to the TTP of known adversary groups with extensive capabilities

New cards
14

Reverse Engineering

Incident in which the capabilities of the malware are discovered to be linked to an adversary group

New cards
15

Recovery Time

Incident which requires extensive recovery time due to its scope or severity.

New cards
16

Detection time

- incident which was not discovered quickly
- Only 10% of data breaches discovered within first hour
- Nearly 40% of adversaries had successfully exfiltrated data within minutes of starting an attack.

New cards
17

Containment

Rapid containment important to IR
- Limit the scope and magnitude of the incident by securing data and lmiting impact to business operations and your customers.

New cards
18

Five Steps for Conducting Containment

1. Ensure the safety and security of all personnel
2. Prevent an ongoing intrusion or data breach
3. Identify if the intrusion is the primary or secondary attack
4. Avoid alerting the attacker that the attack has been discovered
5. Preserve any forensic evidence of the intrusion and attack.

New cards
19

Isolation

Mitigation strategy that involves removing an affected component from larger environment

New cards
20

Segmentation

mitigation strategy that achieves the isolation of a host or group of hosts using network technologies and architecture
- Uses VLANs, routing/subnets, and firewall ACLs to prevent communication outside the protected segment.
- Can be used to reroute adversary traffic as part of a deceiption defensive capability.

New cards
21

Sandboxing

Security mechanism that separates a system from other critical system resources and programs.

New cards
22

Eradication and Recovery

Remove the cause of the incident and bring the system back to a secure state

New cards
23

Eradication

Complete removal and destruction of the cause of the incident.
- Simplest option for eradicating contaminated system is to replace it with a clean image from a trusted store.

New cards
24

Sanitization

Procedures that an organization uses to govern the disposal of obsolete information and equipment, including storage devices, devices with internal data storage capabilities, and paper records.

New cards
25

Cryptographic Erase (CE)

Method of sanitizing a self-encrypting drive by erasing the media encryption key

New cards
26

Zero-fill

Sanitizing a drive by overwriting all bits on a drive to zero
- not reliable method with SSDs and hybrid drives

New cards
27

Secure Erase (SE)

Sanitizing a sold-state device using manufacturer provided software.

New cards
28

Secure Disposal

Sanitizing by physical destruction of the media by mechanical shredding, incineration, or degaussing.

New cards
29

Eradication Actions

- Reconstruction
- Reimaging
- Reconstitution

New cards
30

Reconstruction

Restoring a system that has been sanitized using scripted installation routines and templates.

New cards
31

Reimaging

Restoring a system that has been sanitized using an image-based backup.

New cards
32

Reconstitution

Method of restoring a system that cannot be sanitized using manual removal, reinstallation and monitoring processes.

New cards
33

7 steps for reconstitution

1. Analyze the processes and network activity for signs of malware
2. Terminate suspicious processes and securely delete them from the system
3. Identify and disable autostart locations to prevent processes from executing
4. Replace contaminated processes with clean versions from trusted media.
5. Reboot the system and analyze for signs of continued malware infection
6. If continued malware infection, analyze firmware and USB devices for infection
7. If tests are negative reintroduce the system to the production environment.

New cards
34

Recovery

Actions taken to ensure that hosts are fully reconfigured to operate the business workflow they were performing before the incident ocurred.

New cards
35

Recovery Actions

- Patching
- Permissions
- Logging
- System Hardening

New cards
36

Patching

Installing a set of changes to a computer program or its supporting data designed to update, to fix, or to improve it

New cards
37

Logging

Ensure that scanning and monitoring/log retrieval systems are functioning properly following the incident.

New cards
38

System Hardening

Securing a system's configuration and settings to reduce IT vulnerability and the possibility of being compromised

New cards
39

Actions performed when conducting system hardening

- Deactivate unnecessary components
- Disable unused user accounts
- Implement patch management
- Restrict host access to peripherals
- Restrict shell commands

New cards
40

Three mottos for system hardening

- Uninstall anything you aren't using
- If you need it, patch it frequently
- Always restrict users to least privilege

New cards
41

Post-Incident Activity

Analyze the incident and responses to identify whether procedures or systems could be improved.

New cards
42

Main areas of post-incident activity

- Report Writing
- Incident Summary Report
- Evidence Retention

New cards
43

Report Writing

An essential analyst skill that is used to communicate information about the incident to a wide variety of stakeholders
- Reports should be clearly marked for the intended audience

New cards
44

Incident Summary Report

Report written for specific audience with key information about the incident and their use
- Contain information about how the incident ocurred, how it could be prevented in the future, the impact and damage on the systems, and any lessons learned.

New cards
45

Evidence Retention

preservation of evidence based upon the required time period defined by regulations if there is a legal or regulatory impact caused by an incident.

New cards
46

Lessons Learned

An analysis of events that can provide insight into how to improve response processes in the future

New cards
47

Six Questions to Structure Lessons Learned Meeting

1. Who was the adversary?
2. Why was the incident conducted?
3. When did the incident occur?
4. Where did the incident occur?
5. How did the incident occur?
6. What controls could have mitigated it?

New cards
48

After-Action Report / Lessons Learned Report

Report providing isnight into the specific incident and how to improve response processes in the future

New cards
49

Benefits of using lessons learned and after-action reports

- Incident Response Plan Update
- IoC Generation and Monitoring
- Change Control Process

New cards
50

Root Cause Analysis

Systematic process to identify the initial source of the incident and how to prevent it from occurring again.
- Need to figure out what caused the incident and then see how many other things across your network are going to have the same type of feature sets to prevent future attacks.

New cards
51

4 Steps of Root Cause Analysis

- Define and scope the incident
- Determine the casual relationships
- Identify an effective solution
- Implement and track the solution.

New cards
52

Enterprise Risk Management (ERM)

Comprehensive process of evaluating, measuring and mitigating the many risks that pervade an organization.

New cards
53

Why is risk management adopted by organizations

- Keep data confidential
- Avoid financial loss
- Avoid legal issues
- Maintain positive brand image
- Ensuring COOP
- Establishing trust and mitigating liability
- Meeting stakeholder's objectives

New cards
54

NIST Managing Information Security Risk Framework

- Frame
- Assess
- Respond
- Monitor

New cards
55

Frame

Establish a strategic risk management framework that is supported by decision makers at the top tier of the organization

New cards
56

Assess

Identify and prioritize business processes/workflow

New cards
57

Respond

Mitigate each risk factor through the deployment of managerial, operational, and technical security controls.

New cards
58

Monitor

Evaluate the effectiveness of risk response measures and identify changes that could affect risk management processes

New cards
59

Risk identification takes place by:

evaluating threats, identifying vulnerabilities, and assessing the probability (or likelihood) of an event affecting an asset or process.

New cards
60

Business Continuity Loss

A loss associated with no longer being able to fulfill contracts and orders due to the breakdown of critical systems.

New cards
61

Legal Costs

A loss created by organizational liability due to prosecution (criminal law) or damages (civil law).

New cards
62

Reputational Harm

A loss created by negative publicity and the consequential loss of market position or consumer trust.

New cards
63

System assessments are conducted to:

better posture an organization to reduce risk and prevent losses

New cards
64

System Assessments

systematic identification of critical systems by compiling an inventory f te business processes and the tangible assets and resources that support those processes.

New cards
65

System Assessments include:

- People
- Tangible assets
- Intangible assets
- Procedures.

New cards
66

Mission Essential Function (MEF)

a business or organizational activity that is too critical to be deferred for anything more than a few hours (if at all)

New cards
67

Asset/Inventory Tracking

- Use of a software or hardware solution to track and manage any assets within an organization

New cards
68

Asset Management Database

Contains data such as the type, model, serial number, asset ID, location, user, value, and service information

New cards
69

Threat and Vulnerability Assessment

An ongoing process of assessing assets against a set of known threats and vulnerabilities.

New cards
70

Risk =

Probability x impact

New cards
71

Quantitative Risk Calculation

Uses mathematical and statistical techniques to assign numerical values to the likelihood and impact of potential threats.

New cards
72

Probability

The chance or likelihood of a threat being realized

New cards
73

Impact

measured in terms of the financial loss or damage that would result if the threat was materialized.

New cards
74

Single Loss Expectancy (SLE)

A metric to determine the expected financial loss from a single event.
- allows orbanizations to determine the expected loss from a single event
- only provides the value for a single occurence or loss

New cards
75

SLE =

AV (Asset Value) x EF (Exposure Factor)

New cards
76

Annual Rate of Occurrence (ARO)

Number of times per year that a specific threat is expected to occur.

New cards
77

ARO =

# of threat occurrence / # of years in the period

New cards
78

Annual Loss Expectancy (ALE)

Expected financial loss for multiple events during a year.

New cards
79

ALE =

SLE x ARO

New cards
80

Qualitative Risk Calculation

Uses subjective judgement and expert opinions to evaluate thel ikelihood and impact of threats.

New cards
81

Reasons why qualitative risk calculations sometimes preferred over quantitative risk calculations

- Complexity
- Unknowns
- Limited Data
- Resource Constraints
- Communication

New cards
82

Semi-Quantitative Method

Uses a mixture of concrete values with opinions and reasoning to measure the likelihood and impact of risk
- attempts to find middle ground to create a hybrid risk analysis method.

New cards
83

Business Impact Analysis (BIA)

a systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations.
- governed by metrics that express system availability

New cards
84

Maximum Tolerable Downtime (MTD)

Longest period of time a business can be inoperable without causing irrevoable business failure
- each process can have own MTD
- MTD sets upper limit on recovery time that system and assset owners need to resume operations.

New cards
85

Recovery Time Objective (RTO)

lenght of time it takes after an event to resume normal business operations and activities.

New cards
86

Work Recovery Time (WRT)

length of time in addition to the RTO of idividual systems to perform reintegration and testing of a restored or upgraded system following an event.

New cards
87

Recovery Point Objective (RPO)

longest period of time that an organization can tolerate lost data being unrecoverable
- focused on how long you can be without your data

New cards
88

MTD and RPO help determine:

which business functions are critical and to specify appropriate risk countermeasures

New cards
89

Mitigation

add controls

New cards
90

Avoidance

changing plans

New cards
91

Transference

Insurance

New cards
92

Acceptance

Low Risk

New cards
93

Security Control Prioritization Considerations

- Control is required by framework, best practice, or regulation
- cost of control
- amount of risk a control mitigates

New cards
94

Return on Security Investment (RSOI)

metric to calculate whehter a security control is worth the cost of deploying and maintaining it.
- Risk is not always in opposition to an organization's goals
((ALE - ALEm) - C /C = ROSI

New cards
95

Engineering Tradeoff

assessment of the benefit of risk reduction against the increased compelxity or cost in a system design or specification

New cards
96

DoS Attack

type of cyber-attack which is used to overwhelm a computer, service, or resource by providing an extraneous number of requests in a limited duration.

New cards
97

Risk Register

Document highlighting the results of risk assessments in an easily comprehensible format
- impact/likelihood ratings
- Date of identification
- Description
- Countermeasures/controls
- Risk Owner
- Status
Should be shared between stakeholders so they understand the risks associated with the workflows they manage

New cards
98

Compensating Controls

A type of security control that acts as a substitute for a principal control
- provides the same (or better) level of potetion but uses a different methodology or technology

New cards
99

Exception Management

formal process that is used to document each case where a funciton or asset is noncompliant with written policy and procedureal controls

New cards
100

Tabletop Exercies (TTX)

Exercise that uses an incident scenario against a framework of controls or a red team
- discussion of simulated emergency situations and security incidents

New cards

Explore top notes

note Note
studied byStudied by 57 people
... ago
5.0(2)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 1848 people
... ago
4.7(6)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 20 people
... ago
5.0(1)
note Note
studied byStudied by 609 people
... ago
5.0(2)
note Note
studied byStudied by 75 people
... ago
5.0(1)
note Note
studied byStudied by 155 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (93)
studied byStudied by 61 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (62)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (62)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (54)
studied byStudied by 31 people
... ago
5.0(1)
flashcards Flashcard (100)
studied byStudied by 19 people
... ago
5.0(1)
flashcards Flashcard (240)
studied byStudied by 284 people
... ago
5.0(1)
flashcards Flashcard (79)
studied byStudied by 117 people
... ago
5.0(3)
robot