1. Incident Response Lifecycle
Main Keywords:
-
Preparation
- Incident response plan development
- Tool and resource readiness
- Training and awareness programs
-
Detection & Analysis
- Log monitoring and correlation
- Alert validation and prioritization
- Threat intelligence integration
-
Containment, Eradication, Recovery
- Isolation strategies and network segmentation
- Malware removal and vulnerability patching
- System restoration and validation testing
-
Post-Incident Activity
- Lessons learned documentation
- Process improvement recommendations
- Metrics and reporting analysis
2. Organizational Structure & Roles
Main Keywords:
-
CSIRT (Computer Security Incident Response Team)
- Team composition and skill requirements
- 24/7 on-call rotation schedules
- Authority and decision-making scope
-
SOC (Security Operation Center)
- Tier-based analyst structure
- Tool stack and SIEM platforms
- Shift handoff procedures
-
Incident Responder/Handler
- Technical investigation capabilities
- Communication and coordination skills
- Documentation and reporting duties
-
Escalation Framework
- Severity level criteria
- Escalation paths and timelines
- Executive notification thresholds
-
Chain of Command
- Decision authority matrix
- Cross-functional coordination protocols
- External stakeholder communication
3. Incident Classification
Main Incident Types:
-
Malware Infection
- Virus, worm, and trojan variants
- Propagation methods and vectors
- Behavioral indicators and signatures
-
Unauthorized Access
- Credential compromise scenarios
- Privilege escalation techniques
- Lateral movement patterns
-
DDoS Attack
- Volumetric, protocol, and application-layer attacks
- Botnet and amplification methods
- Traffic pattern analysis
-
Data Breach/Information Leakage
- Exfiltration techniques and channels
- PII/PHI exposure assessment
- Regulatory notification requirements
-
Insider Threats
- Malicious vs. negligent actors
- Data access anomaly detection
- User behavior analytics (UBA)
-
Phishing/Targeted Attacks
- Spear phishing and whaling campaigns
- Social engineering tactics
- Payload delivery mechanisms
-
Ransomware
- Encryption algorithms and variants
- Payment and negotiation considerations
- Decryption and recovery options
-
Website Defacement
- Attack surface and entry points
- Content integrity monitoring
- Restoration and hardening procedures
-
Service Disruption
- Availability impact assessment
- Root cause identification
- Service restoration priorities
4. Detection & Analysis
Main Keywords:
-
Log Analysis
- Centralized log aggregation
- Retention policies and compliance
- Correlation rules and patterns
-
SIEM (Security Information and Event Management)
- Real-time event correlation
- Use case development
- Dashboard and alerting configuration
-
IDS/IPS (Intrusion Detection/Prevention System)
- Signature-based vs. anomaly-based detection
- False positive tuning
- Inline vs. passive deployment
-
Alert Triage
- Priority scoring algorithms
- Context enrichment processes
- Queue management workflows
-
Anomaly Detection
- Baseline establishment methods
- Statistical deviation analysis
- Machine learning models
-
Impact & Urgency Assessment
- Business criticality mapping
- Data classification levels
- SLA/RTO considerations
-
IoC (Indicator of Compromise)
- Hash values and file signatures
- IP addresses and domains
- Threat feed integration
-
Forensic Investigation
- Evidence collection procedures
- Timeline reconstruction techniques
- Expert witness preparation
5. Initial Response
Main Keywords:
-
First Report
- Incident ticket creation
- Initial notification workflows
- Situation assessment documentation
-
Initial Containment
- Network isolation and segmentation
- Account suspension procedures
- Emergency change management
-
Evidence Preservation
- Chain of custody documentation
- Forensic imaging standards
- Legal hold procedures
-
Scope Determination
- Affected system inventory
- Data impact assessment
- Geographic and business unit mapping
-
Timeline Creation
- Event chronology construction
- Time synchronization verification
- Gap analysis and reconstruction
-
Stakeholder Communication
- Internal notification templates
- Status update cadence
- Confidentiality and need-to-know
6. Containment, Eradication & Recovery
Containment:
-
Short-term Containment
- Emergency system isolation
- Access control list (ACL) modifications
- Traffic filtering and blocking
-
Long-term Containment
- Temporary system rebuilding
- Compensating control implementation
- Monitoring enhancement deployment
Eradication:
-
Malware Removal
- Anti-malware scanning and cleaning
- Registry and file system cleanup
- Persistence mechanism elimination
-
Vulnerability Remediation
- Emergency patch deployment
- Configuration hardening
- Security baseline enforcement
-
Malicious Account Deletion
- Privileged access review
- Password reset campaigns
- Authentication mechanism strengthening
-
Backdoor Removal
- Hidden service identification
- Network connection auditing
- Code review and integrity checking
Recovery:
-
System Recovery Planning
- Restoration priority matrix
- Resource allocation strategy
- Dependency mapping
-
Backup Restoration
- Clean backup verification
- Point-in-time recovery selection
- Incremental vs. full restore
-
Validation & Enhanced Monitoring
- Functionality testing procedures
- Performance baseline comparison
- Heightened surveillance period
7. Reporting & Notification
Main Keywords:
-
Incident Report Documentation
- Executive summary format
- Technical details and evidence
- Timeline and impact analysis
-
Management Reporting
- Business impact quantification
- Risk assessment communication
- Remediation status updates
-
Regulatory Notifications
- Mandatory disclosure requirements
- Timeframe compliance (72-hour rules)
- Regulatory body submission formats
-
IPA (Information-technology Promotion Agency)
- Vulnerability reporting portal
- Incident statistics contribution
- Advisory subscription services
-
JPCERT/CC (Japan Computer Emergency Response Team)
- Incident coordination services
- Threat intelligence sharing
- International liaison functions
-
Law Enforcement
- Cybercrime reporting procedures
- Evidence handover protocols
- Investigation cooperation requirements
-
Data Protection Authority
- GDPR/PIPL breach notification
- Personal data impact assessment
- Documentation requirements
-
Customer/Victim Notification
- Transparent communication strategy
- Credit monitoring offerings
- FAQ and support resources
8. Post-Incident Activities
Main Keywords:
-
Post-Mortem Analysis
- Blameless retrospective approach
- What went well/wrong framework
- Action item tracking
-
Root Cause Analysis (RCA)
- 5 Whys methodology
- Fishbone diagram analysis
- Contributing factor identification
-
Prevention Strategy Development
- Technical control improvements
- Process enhancement recommendations
- People and training initiatives
-
Lessons Learned Documentation
- Knowledge base updates
- Playbook refinement
- Best practice sharing
-
Procedure Improvement
- Gap analysis findings
- Workflow optimization
- Tool enhancement requests
-
Training & Exercises
- Scenario-based drill planning
- Skills gap assessment
- Tabletop exercise scheduling
9. Important Related Concepts
Technical Aspects:
-
Digital Forensics
- Disk, memory, network forensics
- Mobile and cloud forensics
- Forensic tool validation
-
Hash Values
- MD5, SHA-1, SHA-256 algorithms
- File integrity verification
- Rainbow table considerations
-
Chain of Custody
- Evidence handling documentation
- Transfer and storage records
- Audit trail maintenance
-
Timestamp
- NTP synchronization importance
- Time zone considerations
- Clock skew analysis
-
Log Integrity Protection
- Write-once storage solutions
- Digital signature implementation
- Tamper-evident mechanisms
-
Baseline
- Normal behavior profiling
- Configuration management database
- Performance metrics benchmarking
-
Attack Methodologies
- Cyber Kill Chain model
- MITRE ATT&CK framework
- Diamond Model of intrusion
Management Aspects:
-
Incident Response Plan (IRP)
- Roles and responsibilities matrix
- Contact list maintenance
- Playbook development
-
BCP/DRP (Business Continuity/Disaster Recovery Plan)
- RTO/RPO objectives
- Failover procedures
- Crisis management integration
-
Escalation Rules
- Severity classification criteria
- Time-based escalation triggers
- Authority delegation model
-
SLA (Service Level Agreement)
- Response time commitments
- Resolution targets
- Penalty clauses
-
Information Sharing Framework
- ISAC participation
- TLP (Traffic Light Protocol)
- NDAs and trusted communities
10. Legal & Regulatory Requirements
Main Keywords:
-
Computer Fraud and Abuse Act / Unauthorized Access Laws
- Criminal penalties and liabilities
- Authorized access definitions
- Cross-border jurisdiction issues
-
Data Protection Laws (GDPR, CCPA, PIPL, etc.)
- Breach notification timelines
- Individual rights and obligations
- Fines and enforcement actions
-
Criminal Procedure Law
- Search and seizure procedures
- Evidence admissibility standards
- Expert testimony requirements
-
Cybersecurity Legislation
- Critical infrastructure protection
- Security baseline mandates
- Incident reporting obligations
-
Electronic Signature Laws
- Digital evidence authentication
- Non-repudiation requirements
- Certificate authority roles
11. Exercises & Training
Main Keywords:
-
Tabletop Exercise (TTX)
- Scenario-based discussion format
- Decision-making practice
- Process validation objectives
-
Cyber Range Exercises
- Realistic attack simulation
- Hands-on technical training
- Performance metrics collection
-
Red Team / Blue Team Exercises
- Adversarial simulation approach
- Detection capability testing
- Purple team integration benefits
-
Playbook Development
- Step-by-step response procedures
- Decision trees and flowcharts
- Regular review and updates
Exam Preparation Tips:
- Understand phase-specific actions - Know what to do in each incident response phase
- Master CSIRT structure - Understand roles, responsibilities, and coordination
- Know legal obligations - Be clear on mandatory reporting requirements and timelines
- Evidence preservation techniques - Understand forensic best practices and chain of custody
- Practice scenario analysis - Work through incident response scenarios end-to-end