👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • Incident Terminology
  • Components of incident response
  • Incident Response Team
  • Business Continuity Planning (BCP)
  • Disaster Recovery (DR)

Was this helpful?

  1. Exam Prep Notes
  2. Certified in Cybersecurity - (ISC)2 - Notes

Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes

Incident Terminology

  • Breach

    • The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where:

    • a person other than an authorized user accesses or potentially accesses personally identifiable information;

    • or an authorized user accesses personally identifiable information for other than an authorized purpose.

  • Event - Any observable occurrence in a network or system.

  • Exploit - A particular attack. It is named this way because these attacks exploit system vulnerabilities.

  • Incident - An event that actually or potentially jeopardizes the CIA of an information system or the information the system processes, stores or transmits.

  • Intrusion - A security event, or combination of events, that constitutes a deliberate security incident in which an intruder gains, or attempts to gain, access to a system or system resource without authorization.

  • Threat

    • Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image or reputation),

    • organizational assets, individuals, other organizations or the nation through an information system

    • via unauthorized access, destruction, disclosure, modification of information and/or denial of service.

  • Vulnerability - Weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a threat source.

  • Zero Day - A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods.


Components of incident response

  • Preparation

    • Develop a policy approved by management.

    • Identify critical data and systems, single points of failure.

    • Train staff on incident response.

    • Implement an incident response team.

    • Practice Incident Identification. (First Response)

    • Identify Roles and Responsibilities.

    • Plan the coordination of communication between stakeholders.

    • Consider the possibility that a primary method of communication may not be available.

  • Detection and Analysis

    • Monitor all possible attack vectors.

    • Analyze incident using known data and threat intelligence.

    • Prioritize incident response.

    • Standardize incident documentation.

  • Containment

    • Gather evidence.

    • Choose an appropriate containment strategy.

    • Identify the attacker.

    • Isolate the attack.

  • Post-Incident Activity

    • Identify evidence that may need to be retained.

    • Document lessons learned.

    • Retrospective

      • Preparation.

      • Detection and Analysis.

      • Containment, Eradication and Recovery.

      • Post-incident Activity.


Incident Response Team

  • Organizations have a dedicated team responsible for investigating any computer security incidents that take place.

  • CIRTs - Computer Incident Response Teams.

  • CSIRTs - Computer Security Incident Response Teams.

  • They have the responsibility to

    • Determine the amount and scope of damage caused by the incident.

    • Determine whether any confidential information was compromised during the incident.

    • Implement any necessary recovery procedures to restore security and recover from incident-related damage.

    • Supervise the implementation of any additional security measures necessary to improve security and prevent recurrence of the incident.

Business Continuity Planning (BCP)

  • Proactive development of procedures to restore business operations after a disaster or other significant disruption to the organization.

  • Some common components of a comprehensive business continuity plan includes:

    • List of the BCP team members, including multiple contact methods and backup members.

    • Immediate response procedures and checklists.

    • Notification systems and call trees for alerting personnel that the BCP is being enacted.

    • Guidance for management, including designation of authority for specific managers.

    • How/when to enact the plan.

    • Contact numbers for critical members of the supply chain (vendors, customers, possible external emergency providers, third-party partners)

Disaster Recovery (DR)

  • Disaster recovery refers specifically to restoring the information technology and communications services and systems needed by an organization, both during the period of disruption caused by any event and during restoration of normal services.

  • The recovery of a business function may be done independently of the recovery of IT and communications services; however, the recovery of IT is often crucial to the recovery and sustainment of business operations.

  • Whereas business continuity planning is about maintaining critical business functions, disaster recovery planning is about restoring IT and communications back to full operations after a disruption.




Hacker's Mantra:Phishing is a major problem because there really is no patch for human stupidity. - Mike Danseglio

PreviousChapter-1 Security Controls - NotesNextChapter 3: Access Control Concepts - Notes

Last updated 10 months ago

Was this helpful?

📚
📓
📝
Components of Incident Response
Components of Incident Response