IR Roles
Containment
Gone Phishing
Forensics
Pot Pourri
400

This member of an incident response team specializes in analyzing and understanding the nature of cyber threats, including the tactics, techniques, and procedures of attackers, to develop defenses against potential security breaches.

Who is a Threat Researcher?

400

This process involves applying updates to software or systems to fix security vulnerabilities that could be exploited by cyber attackers, an essential step in preventing further compromise during a cybersecurity incident.

What is Patching?

400

This term describes a highly targeted attempt to steal sensitive information from a specific individual or organization by masquerading as a trustworthy entity in electronic communication.

What is Spear Phishing?

400

This term refers to the process of documenting the handling of evidence from collection to presentation in court, ensuring its integrity and admissibility by recording every person who had possession of the evidence.

What is Chain of Custody?
400

This is a security technology that monitors network and/or system activities for malicious activities or policy violations, alerting security personnel to detected potential threats.

What is an Intrusion Detection System (IDS)?

800

This incident response team member is responsible for collecting and examining evidence from cyber incidents to understand how an attack happened, the extent of the damage, and to aid in the recovery process, often working closely with law enforcement if necessary.

Who is a Forensic Analyst?

800

This containment strategy involves dividing a computer network into smaller parts to limit the spread of malicious activities and improve security by controlling access to different sections of the network.

What is Network Segmentation?

800

This variation of phishing targets high-profile individuals within an organization, such as executives or senior management, often with the aim of stealing sensitive information or gaining access to their extensive networks.

What is Whale Phishing?

800

This term describes the specific patterns found in the headers or footers of a file's raw binary data, used in digital forensics to uniquely identify and classify files based on their format or type.

What are File Signatures?

800

This educational program is designed to teach employees about the variety of cyber threats, such as phishing and malware, and best practices for preventing them, aiming to reduce the risk of security breaches by fostering a culture of security within an organization.

What is Cyber Security Awareness training?

1200

This individual ensures that an organization's incident response practices adhere to laws and regulations, managing legal issues related to cyber incidents and ensuring compliance with data protection standards.

Who is the Legal Compliance Officer?

1200

This containment measure involves limiting users' or systems' rights to access certain areas of a network or specific data, aiming to minimize the risk of sensitive information exposure or further compromise during a cyber incident.

What is Restricting Access?

1200

This type of phishing attack uses SMS text messages to deceive recipients into providing personal information or downloading malware by pretending to be a trusted source.

What is Smishing?

1200

These are unique digital fingerprints produced by algorithms to verify that imaged data remains identical to the original, ensuring the integrity of evidence by detecting any alterations or tampering.

What are Hash Values?

1200

This designation refers to a sophisticated cyber espionage group believed to be associated with the Russian intelligence services, known for its role in the SolarWinds breach aimed at infiltrating government agencies and other entities.

What is APT29 or Cozy Bear?

1600

This role involves coordinating the response to cybersecurity incidents, ensuring effective communication within the response team and with external stakeholders, and managing the overall process to resolve and mitigate the impact of the incident.

Who is the Incident Response Manager?

1600

This method refers to separating affected systems or networks from the rest of an organization's IT environment to prevent the spread of malware or to halt ongoing cyber attacks during an incident response.

What is Isolation?

1600

This cybersecurity threat involves redirecting users from legitimate websites to fraudulent ones to steal personal information or login credentials, without the user's consent or knowledge.

What is Pharming?

1600

This type of file system, an acronym for File Allocation Table, is often analyzed in digital forensic investigations to recover deleted files and understand the structure and allocation of data on storage devices.

What is the FAT file system?

1600

This security mechanism not only detects malicious activities and policy violations like its counterpart but also actively blocks or prevents those threats from carrying out their intended actions within a network.

What is an Intrusion Prevention System?

2000

This team member monitors an organization's IT environment for malicious activity, analyzes security threats, and implements measures to protect systems and data from cyber attacks, playing a key role in both the prevention and response phases of incident management.

Who is the Security Analyst?

2000

This ongoing activity involves closely observing network and system activities for signs of unauthorized or suspicious behavior, essential for detecting and responding to cyber threats in real-time during and after a security incident.

What is Monitoring?

2000

These components of an email contain vital information including the sender's IP address, the recipient's IP address, the sending time, and the subject line, often analyzed to trace the origin of a message and identify potential phishing attempts.

What are headers?

2000

This meticulous process involves the manual extraction of data from a digital storage medium without relying on the file system's metadata, often used to recover deleted or damaged files by identifying data patterns directly.

What is manual data carving?

2000

This document is the National Institute of Standards and Technology's guideline on Computer Security Incident Handling, providing a framework for establishing an effective incident response program within organizations.

What is NIST SP 800-61 Rev. 2?