INTRODUCTION – Incident Management Response and Cyberattack Frameworks
It’s nice to have you again on this journey into the practice of Incident Management Response, along with a really profound understanding into cyberattack frameworks. The module exposes you to the common processes that Incident Management Response addresses while building your skills toward efficiently rebutting and mitigating cyber threats.
Also, you will study a specific cyberattack framework that will give you an insight into its architecture, methodologies, and contributions to cybersecurity. This module is designed to deepen your learning on how to protect oneself from digital threats and raise the skills in incident response.
Learning Outcomes:
Examine watering hole attacks.
Identify steps that might have prevented the Target Corporation data breach.
Explain in brief the financial implications of the Target Corporation data breach.
Indicate the vulnerabilities exploited during the Target Corporation data breach.
Summarize the timeline of the Target Corporation data breach.
Explain what are data breaches, including their very common characteristics.
Enumerate tips to prevent cyber-attacks.
Discuss Each phase of a Cyberattack according to the details provided in the IBM X-Force IRIS cyber-attack framework.
Configure automatic processing of inbound email using the IBM Resilient platform.
Identify requirements of every step in the lifecycle of incident response.
List the essential items to consider while forming an incident response team.
Discuss the actions recommended by the National Institute of Standards and Technology for forming an incident response capability.
INCIDENT MANAGEMENT KNOWLEDGE CHECK
1. In creating an incident response capability in your organization, NIST recommends taking 6 actions. Which three (3) actions are included on that list? (Select 3)
Establish a formal incident response capability (CORRECT)
‘Create an incident response policy (CORRECT)
‘Hold incident response drills on a regular basis
‘Develop an incident response plan based on the incident response policy (CORRECT)
Partially correct!
2. Which incident response team model would best fit the needs of a small company that runs its business out of a single office building or campus?
Hybrid incident response team
Distributed incident response team
Coordinating incident response team
Central incident response team (CORRECT)
3. True or False. An incident response team needs a blend of members with strong technical and strong soft skills?
True (CORRECT)
False
4. Assuring systems, networks, and applications are sufficiently secure to resist an attack is part of which phase of the incident response lifecycle?
Detection & Analysis
Post-Incident Activity
Preparation (CORRECT)
Containment, Eradication & Recovery
CYBERATTACK FRAMEWORKS KNOWLEDGE CHECK
1. According to the IRIS Framework, during which stage of an attack would the attacker conduct external reconnaissance, alight tactics, techniques and procedures to target and prepare his attack infrastructure?
Continue the attack, expand network access
Continuous phases occur
Attack beginnings (CORRECT)
Attack objective execution
Launch and execute the attack
2. According to the IRIS Framework, during which stage of an attack would the attacker escalate evasion tactics to evade detection?
Attack beginnings
Launch and execute the attack
Continuous phases occur (CORRECT)
Continue the attack, expand network access
Attack objective execution
3. According to the IRIS framework, during the third phase of an attack when the attackers are attempting to escalate privileges, what should the IR team be doing as a countermeasure?
Build a threat profile of adversarial actors who are likely to target the company
Analyze all network traffic and endpoints, searching for anomalous behavior
Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies (CORRECT)
Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
Implement strong endpoint detection and mitigation strategies
4. According to the IRIS framework, during the fifth phase of an attack, the attackers will attempt execute their final objective. What should the IR team be doing as a countermeasure?
Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies (CORRECT)
Implement strong endpoint detection and mitigation strategies
Analyze all network traffic and endpoints, searching for anomalous behavior
Build a threat profile of adversarial actors who are likely to target the company
5. True or False. A data breach only has to be reported to law enforcement if external customer data was compromised?
True
False (CORRECT)
INCIDENT MANAGEMENT RESPONSE AND CYBERATTACK FRAMEWORKS GRADED ASSESSMENT
1. In creating an incident response capability in your organization, NIST recommends taking 6 actions. Which three (3) actions that are a included on that list? (Select 3)
Establish policies and procedures regarding incident-related information sharing (CORRECT)
Secure executive sponsorship for the incident response plan
Considering the relevant factors when selecting an incident response team model (CORRECT)
Develop incident response procedures (CORRECT)
Partially correct!
2. Which incident response team model would best fit the needs of a the field offices of a large distributed organizations?
Hybrid incident response team
Coordinating incident response team
Central incident response team
Distributed incident response team (CORRECT)
3. Which incident response team staffing model would be appropriate for a small retail store that has just launched an online selling platform and finds it is now under attack? The platform was put together by its very small IT department who has no experience in managing incident response.
Migrate all online operations to a cloud service provider so you will not have to worry about further attacks
Outsource the monitoring of intrusion detection systems and firewalls to an offsite managed security service provider while leaving the response to detected incidents to current IT staff
Use internal IT staff only, forcing them to come up to speed as quickly as possible
Completely outsource the incident response work to an onsite contractor with expertise in monitoring and responding to incidents (CORRECT)
4. Which three (3) technical skills are important to have in an organization’s incident response team? (Select 3)
Programming (CORRECT)
Network administration (CORRECT)
System administration (CORRECT)
Encryption
Partially correct!
5. Identifying incident precursors and indicators is part of which phase of the incident response lifecycle?
Detection & Analysis (CORRECT)
Preparation
Containment, Eradication & Recovery
Post-Incident Activity
6. Automatically isolating a system from the network when malware is detected on that system is part of which phase of the incident response lifecycle?
Containment, Eradication & Recovery (CORRECT)
Post-Incident Activity
Detection & Analysis
Preparation
7. According to the IRIS Framework, during which stage of an attack would the attacker send phishing email, steal credentials and establish a foothold in the target network?
Continue the attack, expand network access
Attack beginnings
Continuous phases occur
Attack objective execution
Launch and execute the attack (CORRECT)
8. According to the IRIS Framework, during which stage of an attack would the attacker execute their final objectives?
Attack beginnings
Launch and execute the attack
Continue the attack, expand network access
Continuous phases occur
Attack objective execution (CORRECT)
9. According to the IRIS framework, during the first stage of an attack, when the bad actors are conducting external reconnaissance and aligning their tactics, techniques and procedures, what should the IR team be doing as a countermeasure?
Implement strong endpoint detection and mitigation strategies
Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies
Build a threat profile of adversarial actors who are likely to target the company (CORRECT)
Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
Analyze all network traffic and endpoints, searching for anomalous behavior
10. According to the IRIS framework, during the fourth phase of an attack, the attackers will attempt to evade detection. What should the IR team be doing as a countermeasure?
Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies
Implement strong endpoint detection and mitigation strategies
Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
Build a threat profile of adversarial actors who are likely to target the company
Analyze all network traffic and endpoints, searching for anomalous behavior (CORRECT)
11. True or False. A data breach always has to be reported to law enforcement agencies.
True
False (CORRECT)
CONCLUSION – Incident Management Response and Cyberattack Frameworks
Well, that was really summing up a module which had the never-ending sprouting of incidents that addressed incident management on how they arise and how to respond. Such understanding becomes a good start for recognizing and probing for particular frameworks that may allow you to better determine, measure, or even counteract cyber threats.
Those under no false illusions concerning the powers of all this knowledge can even buttress their defenses against the potential future cybernetic attacks. As one walks the long road of systems, the knowledge he acquired from this module will serve him well at every turn in his journey towards safeguarding digital assets while minimizing risks.