CC Domain2
CC Domain2
CC Domain2
3
Breach
The loss of control, compromise,
unauthorized disclosure,
unauthorized acquisition, or any
similar occurrence
4
Event
Any observable occurrence in a
network or system.
5
Incident
An event that potentially affect the
Confidentiality, Integrity or
Availability of an information
system or the information the
system processes, stores or
transmits.
6
Exploit
A particular attack. It is named
this way because these attacks
exploit system vulnerabilities.
7
Intrusion
A security event, or combination
of events, that constitutes a
deliberate security incident in
which an intruder gains, or
attempts to gain, access to a
system or system resource
without authorization.
8
Threat
Any circumstance or event with
the potential to adversely impact
organizational operations
9
Vulnerability
Weakness in an information
system, system security
procedures, internal controls or
implementation that could be
exploited by a threat source.
10
Zero Day
A previously unknown system
vulnerability with the potential of
exploitation without risk of
detection or prevention because it
does not, in general, fit
recognized patterns, signatures
or methods.
11
The Goal of Incident Response
• Every organization must be prepared for incidents
• The priority of any incident response is to protect life, health
and safety. When any decision related to priorities is to be
made, always choose safety first
• The incident response process is aimed at reducing the impact
of an incident so the organization can resume the interrupted
operations as soon as possible.
Incident Response Plan Components
13
Preparation
• Develop a policy approved by management.
• Identify critical data and systems, single points of failure (one layer of
protection).
• Implement an incident response team.
• Train staff on incident response.
• Identify Roles and Responsibilities.
• Practice Incident Identification. (First Response)
• Plan the coordination of communication between stakeholders.
14
Detection and Analysis
• Monitor all possible attack vectors (a path that a hacker takes to
exploit cybersecurity vulnerabilities). How the attack was made??
• Analyze incident using known data and threat intelligence.
• Prioritize incident response.
• Standardize incident documentation (everyone knows what need
to be done).
15
Containment
• Gather evidence (Integrity).
• Choose an appropriate containment strategy.
• Identify the attacker.
• Isolate the attack.
16
Post-Incident Activity
• Identify evidence that may need to be retained (e.g., legal purposes).
• Document lessons learned.
• Repeat >>
17
Incident
Response
Team
18
A typical incident response team is a cross-functional group of
individuals who represent the management, technical and
functional areas of responsibility most directly impacted by a
security incident. Potential team members include the following:
20
These teams are commonly known as computer incident
response teams (CIRTs) or computer security incident response
teams (CSIRTs). When an incident occurs, the response team
has four primary responsibilities:
• Determine the amount and scope of damage caused by the incident.
• Determine whether any confidential information was compromised during the
incident.
• Implement any necessary recovery procedures to restore security and recover from
incident-related damage.
• Supervise the implementation of any additional security measures necessary to
improve security and prevent recurrence of the incident.
21
Domain 2 Domain 2 Agenda
Incident Response, Module 1: Incident Response
Business Continuity and Module 2: Business Continuity
Module 3: Disaster Recovery
Disaster Recovery Module 4: Summary
Concepts
The Importance of Business
Continuity
Sustain business operations while recovering from
a significant disruption.
Natural Disaster 3
Business Continuity Plan (BCP)
Business continuity planning (BCP) is the
proactive development of procedures to
restore business operations after a
disaster or other significant disruption to
the organization.
Members from across the organization
should participate in creating the BCP
to ensure all systems, processes and
operations are accounted for in the
plan.
4
Key parts of Business Continuity:
1. Communication – multiple contact methodologies and backup
numbers (Phone Tree)
2. Procedures and checklists - know exactly who is responsible for
which action (“RED BOOK” – with multiple copies)
3. Management must be included to activate the business
continuity plan (How/when to enact the plan)
4. Critical contact numbers for the supply chain, as well as law
enforcement and other sites outside of the facility.
5
Business Impact Analysis (BIA)
An analysis of an information system’s
requirements, functions, and interdependencies
used to characterize system contingency
requirements and priorities in the event of a
significant disruption.
6
Domain 2 Domain 2 Agenda
Incident Response, Module 1: Incident Response
Business Continuity and Module 2: Business Continuity
Module 3: Disaster Recovery
Disaster Recovery Module 4: Summary
Concepts
Disaster Recovery
The activities necessary to restore IT and
communications services to an organization during
and after an outage, disruption or disturbance of
any kind or scale.
3
Disaster Recovery Plan (DRP)
Policies, procedures and processes related to
recovering critical business functions, technologies,
systems and applications after the organization
experiences a disaster.
** To see the business restored to full last-known
reliable operations.
4
Disaster Recovery vs Business Continuity
5
Q2. The goal of an Incident Response Plan is to:
6
Q3. All the below are parts of the Incident Response preparation
phase, except:
7
Q4. Which of the below is the best team to speak with
government about a breach the affected citizens’ personal
information:
A. CISO office
B. Senior Management
C. Security Manager
D. Legal office
8
Q5. One of the below concerns about restoring IT and
communications back to full operations after a disruption:
9
Q6. A Business Continuity Plan must be tested (select 2):
❑ Annually
❑ Every 6 months
❑ After any significant change
❑ On a predefined intervals
10
Q7. Which of the following defines the amount of data a company
is willing to lose (can afford to lose) during disasters?
11
Q7. ________ must be able to detect incidents, but ________
only can activate the business continuity plan.
12
Q8. Members from across the organization should participate in
creating the Business Continuity Plan (BCP).
A. True
B. False
13
Q9. Senior Management will have technical guides helping them
get the alternate sites up and running.
A. True
B. False
14
Q10. Critical business processes and information systems can be
best prioritized using:
15