What staff is included in the incident response team? -Answer * Security
* Systems Admin
* Network Management
* Legal
* HR
* Public Affairs
* Disaster Recovery
* Union Rep
What form does the incident response team take? -Answer Onsite personnel
Establish a baseline to respond to
How can an organization get ready to address issues? -Answer * System build
checklists per system type
Provide comp time to team members -
What should be included in an emergency communications plan? * Create a call list and
determine the methods of informing people quickly
* Secure a conference bridge number - would be able to set up
* Print credit-card sized incident response team contact info
* Testing - for verification of people answer the phone
What should a war room contain? * Locking door
* Locking file cabinet
,* No windows
What are some of the major training issues when training an incident response team? *
Creating forensics images under fire
* keyboard skills under fire
What should go into a jump bag? * Binary image creation software: dd, windd, netcat
* forensic software
* Diagnosis software
* Bootable media
* USB Token RAM Device
* External Hard drive
* Ethernet Tap
* Patch Cables
* Laptop with Multiple OS
* Call list
* anti-static plastic bags
* Desiccants for moisture
* Notebooks
* Jumpers
* Flashlight
* Screwdrivers
* female to female RJ-45
What does the identification phase seek to? - Answer* Gather events, enable analyses,
and determine if an incident indeed exists or not.
What are the new trends in the underground community? - Answer * Attack tools
becoming increasingly easy to use
, * High-quality, very functional tools
* Growth of the anti-disclosure movement
* Growth of hacktivism
What are software distro site attacks? - Answer * Software on a repository is hacked
into and software is altered to include a back door.
* ISR-Evilgrade listens to software to request update
* sends response with malware
* Currently supports Java, Winzip, WinAmp, OSX, OpenOffice, itunes, etc
Software distro site defenses - Answer * Check hashes across multiple mirrors
- check both MD5 and SHA-1
* Check PGP signatures if available
- make sure the key is trusted
* test software before in production
What are some General Trends in Attacking? -Answer * Worms carrying bots,
backdoors, password crackers, and scanners
* Botnets consisting of self replicating code
* Distributed co-op attackers are popular
What is Reconnaissance? -Answer * Casing the joint, basically
généraly script kiddies or those after a particular site
gather as much information as possible from openly available sources
What can be gaathered about the registration of a domain name? -Answer * Contact
Address
* Telephone numbers
* Contact names
* Registered DNS name servers
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Stetson. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.