The Process
The Attack!
The Tools
The Data
The Bollards
100

The first step in the Incident Response Cycle.

Preparation

100

A database of attacks and techniques used by threat actors from the perspective of an attacker

MITRE’s ATT&CK

100

Devices and software that can collect and aggregate log data from a variety of sources and then perform correlation and analysis with that data

SIEM

100

Stored information about failed and successful logins, as well as other authentication log information

Security log

100

Used to simplify decision making and build automation for tasks like communication, malware removal, or scanning

Runbooks

200

“What other tools or training might mitigate this vulnerability in the future?”

Lessons learned

200

Has 8 steps and was created to defend against sophisticated cyber attacks

Lockheed Martin’s Cyber Kill Chain

200

Two primary thresholds to consider when configuring sensors

Frequency and severity

200

Files created when a system experiences a critical error

Dump files

200

Isolate the issue and allows for investigation into the incident by preserving the digital artifacts

Quarantining

300

IR exercise in which the team goes through the steps of an incident.

Walk-through

300

Step in the Kill Chain that will allow remote control of a channel to manipulate the victim 

Command and control

300

Events like malware beaconing and infection are automatically categorized, prioritized, marked by source and destination, and matched to an investigation

Alarms and Alerts

300

Includes call logs, SMS and other messages, GPS tracking, and cell tower info.

Mobile Metadata

300

Used to make sure specific sites or content are not able to be browsed or accessed

Content filters

400

Type of IR Plan that focuses on individuals who have invested roles in systems, organizations, or services impacted by an incident

Stakeholder Management Plan

400

Gives analysts a comprehensive view of cyber attacks, uncover insights and gain knowledge of malicious activities. Its ultimate goal is Mitigation.

Diamond Model of Intrusion Analysis

400

An improved logging tool which supports extremely high message rates

rsyslog

400

How you might determine who created a file, if it was modified, and what type of file it is

File metadata

400

Place systems with different functions or data security levels in different zones of a network

Segmentation

500

Federal program that defines requirements that government agencies need to meet to ensure continuity can be ensured after an incident

Continuity of Operations Planning (COOP)

500

The 4 corners of the Diamond Model of Intrusion Analysis

adversaries, capabilities, infrastructures, and victims

500

Open source and commercially supported syslog centralization and aggregation tool

NXLog

500

How your email service knows that a message is spam

Anti-spam tags (email metadata)

500

In the event that a private key is compromised, this will need to be reviewed.

Certificates