Lesson Security 11 Managing Security Incidents

16 cards   |   Total Attempts: 192
  

Cards In This Set

Front Back
is a form of crime where the Internet or computers are used as a medium to commit crime
Computer crime
is the security policy that determines the actions that an organization will take following a confirmed or potential security breach
IRP Incident Response Policy
is the first experienced person to arrive on an incident scene
First Responders
The restoration of backup files, reprocessing transactions, and auditing the system to return the system to operating condition
Recovery
Response to a computer crime-related situation based on criticality Informing management of the incident and suggesting the next best
Triage
Course of action to reduce the possibility of future events from occurring
Debriefing and feedback
Determination of events and assessment by an
incident response team
Identification, examination, and inspection of a problem by either an internal response team or local law enforcement
Incident response and handling
Securing the scene of the incident as to not damage evidence
Investigative
refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic
Chain of custody
Evidence that is gathered from multiple sources that can support other types of evidence in a court of law
Corroborative
Evidence that is required to be admissible in a court of law
Best
Evidence that is permanent and cannot be disputed
Conclusive
Evidence that is gathered from multiple sources to infer a conclusion in a court of law
Circumstantial
Evidence that is a copy of an original document
Secondary