How is an incident identified?
Intrusion detection tools (IDS) can warn the network administrator or staff about most security breaches must faster than manually identifying intrusions.
An administrator needs to watch for the following signs of security incidents:
What are the procedures for handling an incident?
Describe 5 different types of incidents:
Repudiation- When a person or program, acting on behalf of another person, performs and invalid action
Reconnaissance Attack- Collecting or discovering information about any individual or organization that might be useful in attacking that individual or organization. DSL and cable modem connections are more expored than others to reconnaissance attacks because the connections are usually open, which allows more time for attackers to attack the system. Port scanning, or running a program that remotely finds which ports are open or closed on remote systems, is one of the ost common types of reconnaissance attacks.
Harassment- an individual using that Internet is a cyber crime in which the attacker sends a harassing message to a ictim using e-mail, IM, or any other form of online communication.
Extortion- Forces the victim to pay $ to the attacker by threatenin to reveal informtaion that could lead to a severe loss for the victim. This loss could be data/informtaion related, or it could be a simple financial threat.
Pornography Trafficking
Organized Crime Activity
Subversion- an incident in which a system does not behave in the expected manner. This leads the users to believe that this behavior is due to an attack on the integrity of the system, network, or application. In reality, it is something else entirely. In a surbersive incident, the perpetrator modifies the Web Links so that whenever onyone uses one of the links, they are redirected to an unrelated Web address.
What is the difference between a mid-level incident and a high-level incident?
Mid-level incidents are more serious kinds (than low-level). They should be handled the same day the event occurs, and normally within 2-4 hours after the event has occured. Types of mid-level attacks:
High-level incidents are severe and should be handled as soon as possible. Incident response teams handle these and are reported to the CSO: Includes the following:
Describe the reasons that some organizations don’t report computer-related incidents:
What is a change control?
A procedure that handles or controls all authorized changes to assets such as software and hardware. It also keeps track of access privileges and processes. It involves change requests, result recording, documenting, testing the results after the changes, and gaining approval for the requests.
Involves performing analysis of the problem, updating the results, and sending a request of the change to the concerned personnel or representative. This change is reviewed by the management, and if it is deemed necessary, authorization for the change is given.
Social engineering
A technique used to make a person reveal confidential information such as passwords through manipulation.
Describe the steps involved in creating a (CSIRT) Computer Security Incident Response Team:
Describe three examples of CSIRT’s: