Podcast
Questions and Answers
Give one example of IR process.
Give one example of IR process.
System is working properly. Then, a user opens a suspicious email. Sensors do not detect anything. User tries to authenticate from their phone but says system is unable to authenticate. Help desk starts troubleshooting the problem. Since these are indications of compromise, security incident is created. Incident response continues from there.
What is needed for the success of IR process?
What is needed for the success of IR process?
All IT employees should be trained to know how to handle a security incident. All users should be trained to know the core fundamentals of security. An integration between the help desk and the security response team. Good sensors (intrusion detection system) in places. For example, network and host sensors for quick and comprehensive detection. IR process must be in line with the laws and the company's regulations.
What are the foundational areas of the IR process?
What are the foundational areas of the IR process?
Objective: what's the purpose of the process? Scope: to whom does this process apply? Definition/terminology: Each company may have different understanding of the security incident. Define what constitutes a security incident and give examples. Create their own definition using a clearly defined terminology Roles and Responsibilities: Who has the authority to take a computer in order to perform further investigation? define who has this type of authority and let the whole company know about this. Priorities/severity levels: Type of information affected by the incident and recoverability.
What is the role of an end user?
What is the role of an end user?
Signup and view all the answers
What should end users do if the issue occurred but the scenario could not be recreated as evidence?
What should end users do if the issue occurred but the scenario could not be recreated as evidence?
Signup and view all the answers
What are the four phases of the NIST IR process?
What are the four phases of the NIST IR process?
Signup and view all the answers
Explain preparation phase of NIST IR process.
Explain preparation phase of NIST IR process.
Signup and view all the answers
Explain detection/analysis phase of NIST IR process.
Explain detection/analysis phase of NIST IR process.
Signup and view all the answers
What kind of tools are required to identify IOC?
What kind of tools are required to identify IOC?
Signup and view all the answers
Explain containment/eradication/recovery phase of the NIST IR process.
Explain containment/eradication/recovery phase of the NIST IR process.
Signup and view all the answers
Explain post-incident phase of NIST IR process.
Explain post-incident phase of NIST IR process.
Signup and view all the answers
Who is responsible for IR in the cloud for Paas?
Who is responsible for IR in the cloud for Paas?
Signup and view all the answers
Who is responsible for IR in the cloud for Iaas?
Who is responsible for IR in the cloud for Iaas?
Signup and view all the answers
Who is responsible for IR in cloud for Saas?
Who is responsible for IR in cloud for Saas?
Signup and view all the answers
What would you do in order to include cloud in your IR process?
What would you do in order to include cloud in your IR process?
Signup and view all the answers
What are the six phases of the threat life cycle management?
What are the six phases of the threat life cycle management?
Signup and view all the answers
Explain the forensic data collection phase of threat life cycle management.
Explain the forensic data collection phase of threat life cycle management.
Signup and view all the answers
Explain the discovery phase of threat life cycle management.
Explain the discovery phase of threat life cycle management.
Signup and view all the answers
Explain the qualification phase of threat life cycle management.
Explain the qualification phase of threat life cycle management.
Signup and view all the answers
Explain the investigation phase and neutralization phase of threat life cycle management.
Explain the investigation phase and neutralization phase of threat life cycle management.
Signup and view all the answers
Explain the steps of cyber attack.
Explain the steps of cyber attack.
Signup and view all the answers