28.4.13 Lab - Incident Handling - ILM
28.4.13 Lab - Incident Handling - ILM
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Objectives
Apply your knowledge of security incident handling procedures to formulate questions about given incident
scenarios.
Background / Scenario
Computer security incident response has become a vital part of any organization. The process for handling a
security incident can be complicated and involve many different groups. An organization must have standards
for responding to incidents in the form of policies, procedures, and checklists. To properly respond to a
security incident, the security analyst must be trained to understand what to do and must also follow all of the
guidelines outlined by the organization. There are many resources available to help organizations create and
maintain a computer incident response handling policy. The NIST Special Publication 800-61r2 is specifically
cited in the Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) exam topics.
Instructions
Answers will vary especially based upon the cybersecurity operation team. Examples:
Would the organization consider this activity to be an incident? If so, which of the organization’s
policies does this activity violate?
What measures are in place to attempt to prevent this type of incident from re-occurring, or to limit its
impact?
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Lab - Incident Handling
Answers will vary especially based upon the cybersecurity operation team. Examples:
What precursors of the incident, if any, might the organization detect? Would any precursors cause
the organization to take action before the incident occurred?
What indicators of the incident might the organization detect? Which indicators would cause
someone to think that an incident might have occurred?
What additional tools might be needed to detect this particular incident?
How would the team prioritize the handling of this incident?
Containment, Eradication, and Recovery:
Type your answers here.
Answers will vary especially based upon the cybersecurity operation team. Examples:
What strategy should the organization take to contain the incident? Why is this strategy preferable to
others?
What additional tools might be needed to respond to this particular incident?
Which personnel would be involved in the containment, eradication, and/or recovery processes?
What sources of evidence, if any, should the organization acquire? How would the evidence be
acquired? Where would it be stored? How long should it be retained?
Post-Incident Activity:
Type your answers here.
Answers will vary based upon the cybersecurity operation team. Examples:
What could be done to prevent similar incidents from occurring in the future?
What could be done to improve detection of similar incidents?
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Lab - Incident Handling
Answers will vary based upon the cybersecurity operation team. Examples:
Would the organization consider this activity to be an incident? If so, which of the organization’s
policies does this activity violate?
What measures are in place to attempt to prevent this type of incident from occurring or to limit its
impact?
Detection and Analysis:
Type your answers here.
Answers will vary based upon the cybersecurity operation team. Examples:
What precursors of the incident, if any, might the organization detect? Would any precursors cause
the organization to take action before the incident occurred?
What indicators of the incident might the organization detect? Which indicators would cause
someone to think that an incident might have occurred?
What additional tools might be needed to detect this particular incident?
How would the team prioritize the handling of this incident?
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Lab - Incident Handling
Answers will vary based upon the cybersecurity operation team. Examples:
What strategy should the organization take to contain the incident? Why is this strategy preferable to
others?
What additional tools might be needed to respond to this particular incident?
Which personnel would be involved in the containment, eradication, and/or recovery processes?
What sources of evidence, if any, should the organization acquire? How would the evidence be
acquired? Where would it be stored? How long should it be retained?
Post-Incident Activity:
Type your answers here.
Answers will vary based upon the cybersecurity operation team. Examples:
What could be done to prevent similar incidents from occurring in the future?
What could be done to improve detection of similar incidents?
End of document6
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com