Chapter 2 - ISC2
Chapter 2 - ISC2
❖ Canons
➢ Protect society, the common good, necessary public trust and confidence,
and the infrastructure.
➢ Act honorably, honestly, justly, responsibly and legally.
➢ Provide diligent and competent service to principals.
➢ Advance and protect the profession.
Official Notes:
https://learn.isc2.org/content/enforced/9541-CC-SPT-GLOBAL-1ED-1M/build/chapter
_01/assets/EDU-CC-70175-ch01_Takeaway.pdf?ou=9541
Chapter 2:
Incident Response
❖ Incident Terminology
➢ Breach: Loss of control compromise or unauthorized use
➢ Event: Any occurance
➢ Exploit: Attack that exploits vulnerability
➢ Incident: Event that jeopardizes information or system
➢ Intrusion: Security event where system has been breached
➢ Threat: Anything that could impact the operations of the system and its
use
➢ Vulnerability: Weakness in the system or security
➢ Zero Day: A vulnerability that that does ot get detected due to
unrecognized pattern or methods
❖ Goal of Incident Response:
➢ Protect life, health and safety
➢ Adverse Event: Events with negative consequences for the system and its
use
➢ Incident Response Plan: Predetermined procedures to assess and combat
adverse events
➢ Business Continuity Management (BCM)
❖ Components of Incident Response Plan:
➢ Preparation
➢ Detection and Analysis
➢ Containment, Eradication and Recovery
➢ Post Incident Activity
❖ Incident Response Team
➢ Security Operations Center (SOC): Tema that monitors system for
disruptions or intrusions
➢ Computer Incident Response Teams (CIRT)
■ Determine scope of damage
■ Determine confidential information compromised
■ Implement recovery measures
■ Supervise implementation of added security measures to improve
security
❖ Importance of BC:
➢ sustain business operations while recovering from a significant disruption
➢ A key part of the plan is communication, including multiple contact
methodologies and backup numbers in case of a disruption of power or
communications.
❖ Components of BC Plan:
➢ Proactive development of procedures to restore business operations after a
disaster or other significant disruption to the organization
■ List of the BCP team members, including multiple contact methods
and backup members
■ Immediate response procedures and checklists (security and safety
procedures, fire suppression procedures, notification of appropriate
emergency-response agencies, etc.)
■ Notification systems and call trees for alerting personnel that the
BCP is being enacted
■ Guidance for management, including designation of authority for
specific managers
■ How/when to enact the plan
■ Contact numbers for critical members of the supply chain
(vendors, customers, possible external emergency providers,
third-party partners)
Disaster Recovery