tags:
- cybersecurity
- article
- notes
source: https://www.ibm.com/topics/incident-response
created: 2024-11-17
published: 2024-08-20
What is incident response?
Incident response is an organization's process and technologies for detecting and responding to cyberthreats, security breaches, or cyberattacks.
What does a formal incident response plan enable cybersecurity teams to do?
A formal incident response plan enables cybersecurity teams to limit or prevent damage.
What are the two goals of incident response?
The two goals of incident response are to:
What is incident response the technical portion of?
Incident response is the technical portion of incident management.What three things does incident management involve besides incident response?
Besides incident response, three things which incident management also involves include:
- Executive management.
- Human Resources.
- Legal management.
How should an organization define their incident response processes and technologies?
An organization should define their incident response processes and technologies in a formal Incident Response Plan (IRP).
What should an Incident Response Plan (IRP) specify?
An IRP should specify how different cyberattacks should be identified, contained, and resolved.
What three things can an effective Incident Response Plan (IRP) allow for?
Three things an effective IRP can allow for include:
What does IBM's Cost of a Data Breach Report say having an Incident Response Plan (IRP) can enable?
IBM's Cost of a Data Breach Report says that having an IRP can enable organizations to reduce the cost of data breaches by almost half a million US dollars on average.
What is a security incident?
A security incident is any digital or physical breach that threatens the confidentiality, integrity, or availability of an organization's information systems or sensitive data.
What is ransomware?
Ransomware is a type of malware that locks up a victim's data or computing device and threatens to keep it locked unless the victim pays a ransom.
What two things does IBM's X-Force Threat Intelligence Index report about ransomware?
Two things that IBM's X-Force Threat Intelligence Index reports about ransomware are:
- It is used in 20% of network attacks.
- Extortion-based attacks are a driving force in cybercrime.
What are phishing attacks?
Phishing attacks are digital or voice messages that try to manipulate recipients to share sensitive information or do some damaging action.
What do phishing messages look or sound like?
Phishing messages look or sound like they came from a trusted or credible organization or individual.
What are the two most prevalent attack vectors according to the IBM Cost of a Data Breach report?
According to the IBM Cost of a Data Breach report, the two most prevalent attack vectors are:
What is the most common form of social engineering?
The most common form of social engineering is phishing.What is social engineering?
Social engineering is a class of attack that hacks human nature, rather than digital security vulnerabilities, to gain unauthorized access to sensitive personal or enterprise data or assets.
What happens during a Distributed Denial-of-Service (DDoS) attack?
During a DDoS attack, hackers gain control of a large number of computers and use them to overwhelm a target organization's network or servers with bogus traffic in order to make them unavailable to legitimate users.
What are supply chain attacks?
Supply chain attacks are cyberattacks that infiltrate a target organization by attacking its vendors.
What are the two types of insider threats?
The two types of insider threats are:
What happens during a privilege escalation attack?
During a privilege escalation attack, an attacker first gains limited privileges in a system and uses those to move laterally in order to receive higher privileges and gain access to more sensitive data along the way.
What can an attacker use to make their initial entry or boost their privileges?
To make their initial entry or boost their privileges, an attacker can use stolen credentials.
What is the most common way that attackers breach systems according to IBM's X-Force Threat Intelligence Index?
According to IBM's X-Force Threat Intelligence Index, the most common way that attackers breach systems is abuse of valid accounts.
What happens during a Man-In-The-Middle (MITM) attack?
During an MITM attack, a threat actor intercepts communication
What two things can an attacker do with intercepted communication during a Man-In-The-Middle (MITM) attack?
Two things which an attacker can do with intercepted communication during an MITM attack include:
- Use the stolen information directly.
- Inject malware to be forwarded to the intended recipient.
Who creates and executes the Incident Response Plan (IRP)?
The IRP is created and executed by a Computer Security Incident Response Team (CSIRT).
Who makes up a Computer Security Incident Response Team (CSIRT)?
A CSIRT is made up of stakeholders from across the organization.
...