Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back the side. There is 2019 Carpinteria Security Plus Certification Preparation course.
00:10
We will be continuing our discussion of marginal of five, which in fact is domain five and the top of discussion would be risk management.
00:20
We have a brand new learning objective which encompasses this particular domain, which is 5.4, which specifically states give it a scenario. Follow incident response procedures.
00:34
Here again are some sub topics which encompasses this particular learn objective. We began by first article looking incident Response plan document instant all way down to the topic off
00:47
exercise
00:49
continuing in terms of exploring our various top of discussing which encompasses 5.4 lin objective, we will take a look at the incident response process
01:00
in other words, realizing that we have preparation, identification, containment, eradication, recovery and then we have lessons learned. All of these particular topics will be discussed in the upcoming video
01:14
since praises to our pre assessment question and it reads as follows
01:19
Was it a following is not a step
01:22
of the instant response process is it ate a snapshot.
01:26
Be preparation,
01:27
see recovery or D containment
01:33
In this case, If you said today. You're absolutely correct because a snapshot is a state of a system at a potential reporting time.
01:41
Is also known as a sister. Image is not a step in the instant response process.
01:47
This brings us to ah incident management overview.
01:51
The purpose of the incident management is to identify and respond to unexpected disrupted events with the objective of controlling impact within acceptable levels.
02:01
This involves technical, physical, natural or anything that perhaps that occur as with any aspect of risk management risk and Venice impact analysis, forms of basis for determining variety of resource protection and response activity,
02:17
incident management, problem management and disaster recovery plan are essential and a complementary parts of the business continuity planning
02:27
as first responders to adverse information security related events. The objective is to prevent instance from becoming problems and revenge problem from becoming disasters. The extent of the instant mansion response capability must be bounced with the baseline security,
02:43
business continuity as well as disaster recovery
02:46
now before the incident response plan. A security incident response plan is a document that defines policies rose responsibly and actions to be taken in the event of a security incident.
03:00
In response plan is the operational component of of what we call our instant member process. They're playing in other words, detail actions, personnel active that take place in case of the first events, resulting in the loss of image systems or processes.
03:15
Seeing man support is required for the success of your incident response plan.
03:21
We must also again document the incident in the different types of category. Proactively planning for every conceivable type of incident is impractical. Still, incidents vary which require different types of response. Scratchy. This is not
03:37
unlike common and said that take place in the real world
03:42
in regards to the various roles of responsibility. The first time in the highlight here is that management commitment is critical to the success of your incident management and response. Effective incident management spots maybe less costly options than attempting to inimical trolls are all possible condition.
03:59
Another thing going to do you want to test your instant management response.
04:01
It may allow your organization at high level acceptable risk levels based upon demonstrated capacity to handle those very security incidents.
04:11
We also need have adequate instant response in combination would effective if my security what it's going to create a practical risk mansion solution
04:19
that may be more cost effective in the long run and more prudent resource management type decision.
04:28
Let's not turn to tour discussion of Rose and responsibility. The bolo lists of those are included in what we call a critical incident response team.
04:35
Now these roles will large the pin on their knees and resource is of the organization. What are teams, perhaps can include outside personnel
04:45
here again on a list of some most common what we call ranging from your security all way down to your financial auditor
04:53
event reported. An escalation procedure should be documented in your instant response plan.
04:59
A cyber incident response team was responsible working through this cyber incident response plan. The ultimate goal of this particular what we call the Spartans team is to eradicate the components from the incident, such as it could be mad worker bee viruses and so forth. And really, the goal is to get the organization running smoothly again.
05:18
In other words, get organization back on track.
05:23
Perhaps the most important thing to do is engage what we call assimilated cyberattacks. This were tested in response plan, ability to manage in respond to a real world cyber attack.
05:34
It's responses a well coordinated effort to rapidly respond to security incidents in the most efficient, cost effective manner. The golden in response plan, in other words, is to quickly identify an attack, minimized the effect, contain the damage
05:49
and large identify. Remediate what we call the root cause of the incident self
05:56
In terms of training
05:58
an organization every
06:00
in response, team members should undergo the following training programs introduction to incident management teams in terms of basic mission by the teams and his operation mentoring on the job training as well as former training.
06:15
Now there are some factors that we need to look at in terms off
06:17
measurement. Other words. We're looking at instant response metrics something metrics that we need to definitely value of the number of incidents
06:27
off east into the severity
06:29
and type the drill time the time required to contain the incident. Time required to resolve and close incident the number of times the instant response in terms of the service level agreement were not met. Perhaps you have some outside contract, maybe with Dale, and perhaps they didn't meet your expectations.
06:46
That could be something that we need to assess.
06:48
We look at the number external person affected and have. In fact, they have been notified.
06:54
And last. The total cost of quieter was off each incidents.
06:59
Interesting enough. A fan tax, a term that we need to be a webs called Gap analysis. Now I gapen eyes what it does. Force provides information on the gap between say, for example, looking at current instant response capabilities. Compare what the desired state. Other word. That's the state where we want to be at
07:16
so, in essence, back a parent of two levels.
07:19
The following may be identified. Other words. Prices that need to be improved and words make it much more effective or efficient.
07:27
Also, resource is need to achieve the objectives for the incident response capabilities.
07:32
Did you know that in response plan should be set up to address a suspected data breach in a serious off phases? Within each phase, there are specific areas of need that should be considered an affected instant response process is handled and several steps or phases.
07:48
So first, when we have to call the preparation, this face will be the workhorse of your instant planning or other words. Response process and in the end, the most critical crucial phase to protect your business.
08:03
Then we have identification.
08:05
This is a process where you determine whether you've been breached. In other words, a breach or incident could originate from many different areas.
08:16
Then we have a term called containment
08:18
one of breaches first discovered. Your initial instinct may be to security. Delete everything so that you can just get rid of it High over
08:26
that would like to hurt you in the long run, says you'll be destroying valuable evidence that you need to determine where the breach started and adviser plan to prevent it from happening again.
08:37
Then we look at eradication.
08:39
Once you contain the issue, you need to find an unlimited, the root cause of it of the breach. This means all male. What should be security removed? System should again be hardened, and patch and update should be applied that point in time.
08:54
Then we come to recovery.
08:56
This is a process was stored, and returning the effective system and advices back into your business environment during this time is important to get your system business operation up and running again without the fear of another breach.
09:11
This brings us to the lessons learned
09:13
once the investigation is complete.
09:16
Hold an after action. We were all in response team members and discuss what you've learned from the data breach. This way you were analysed and document everything about the breach. Determine what worked well, a US promise plan and where there was some holes.
09:31
Lesson learned from both mark and real events will help Sprink in your system against future attacks. It's time not to engage in a post assessment quiz, and it reads as follows.
09:43
You have been instructed to introduce an effective system back into the company's environment
09:50
and be sure that it will not lead to another incident.
09:54
You test monitor invalid that the system is not being compromised by any other means,
10:01
which is which of the instant response processes have you completed is a lesson. Learned
10:07
the preparation,
10:09
See recovery or D containment
10:13
if you should let the sea you're absolutely correct. It's the recovery process that brings the effect this system
10:20
back into the company's production environment. Careful aboard, leading to another incident
10:26
at this time. We have a key takeaways from this particular presentation, and they are as follows we learned that event reporting and escalation procedures should be documented in your incident response plan.
10:39
We know that the response plan is a document to help your i t. Respond to an incident. Includes details about how to detect, how to respond and how to recover it.
10:52
A Cyber Incident Response Team response for working through the Cyber Incident Response plan
10:58
related a similar cyberattack with test in response plan, ability to manage and respond to a real world cyber attack.
11:07
We're gonna gap refers to a space between where we are their present state and where we want to be the target state. A gap in Oz would also be referred to as a needs analysis needs assessment or a needs gap analysis.
11:22
In our upcoming presentation,
11:24
we'll be taking a look at our very next video will be addressing the topic of 5.5, a brand new learning objective in which we have to summarize basic concepts off forensics. And again, I look forward to seeing you in the very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor