What is an Incident?
Act of violating a security policy
What is the 1st step of Incident Response - Preparation?
Involves hardening systems and networks to resist attacks
What is the 2nd step of Incident Response - Detection?
Identifies a security incident
What is the 3rd step of Indcident Response - Analysis?
Thoroughly examines and evaluates the incident
What is the 4th step of Incident Response - Containment?
Prevents the incident from spreading by securing data and minimizing business impact
What is the 5th step of Incident Response - Eradication?
Focuses on removing malicious activity from systems or networks
What is the 6th step of Incident Response - Recovery?
Restores affected systems and services to their secure state
What is the 7th step of Incident Response - Post-Incident Activity?
Identifies the initial incident source and makes improvements to prevent future incidents
What is the Lessons Learned Process?
Documents experiences during incidents in a formalized way
What does an After-action report do?
Collects formalized information about what occurred