Zusammenfassung der Ressource
Computer Security
- A.2 Operational Categories
- Prevention
- create information security policy
- User Training
- Access Control
- Firewall
- Detection
- Whistle Blower
- Intrusion Detection System
- Integrity Assurance Software
- Respond
- unpluggin Network Cable
- Blocking IP Address
- Recovery
- Disk Mirorring
- Automated Backup
- A.1 Computer Security Incident
- A.1.1 Characteristic
- The Attacker or Origin
- Tools Used
- Vulnerability Exploited
- Action Performed
- Intended Target
- Unauthorized Result
- Attack Objectives
- A.1.3 CSIRT
- Why Need? Benefit?
- Economic
- Public Relation
- Legal
- Goal & Objective
- Activities
- Non Real Time
- Pre Incident
- Charter
- Mission Statement
- types of incidents - A.1.2
- service provided
- constituenty
- Authority & Funding
- Policy
- Incident Reporting Procedures
- PoC
- Various Contact types
- Team members
- Work hours
- Time Zone
- Who report?
- Incident Symptom awareness
- Incident Tracking & Handling Procedure
- Post Incident
- Real Time
- Incident Handling
- Identify Incident
- determine actual incident
- verify, security or non-security?
- Incident Prioritization
- Containtment
- Eradicate
- Incident Recovery
- Identify Damage
- Repair System
- Restore System
- Investigation
- Identify Cause
- Forensic
- Collect Evidence
- Volatile
- Non Volatile
- Assign Blame
- reoccurrence prevvention
- Restitution
- Communication
- A.1.2 Types and Categories of CSI
- Service Interrupts
- System Interferrence
- Unauthorized Access
- Commercial use
- Malicious Communication
- Theft
- Unsolicitated Bulk Mail
- Other