02 Perform a Risk Assessment & Threat Modelling
03 Know the physical and logical assets in scope
04 Scan the assets
05 Validate the findings 06 Prepare a Remediation Plan 07 Reporting to the Senior Management 08 Repeat the Cycle every three months or as per your business requirements or after every major change 09 Keep comparing the data and learn to measure your VA program and Follow CMMI
Incident Response (IR) is a structured approach to managing and mitigating the impact of a security breach or other disruptive event. It involves a series of coordinated actions to identify, contain, eradicate, recover from, and learn from security incidents.
Key phases of incident response:
IANA stands for Internet Assigned Numbers Authority
It's essentially the global manager of the internet's address book.
What does it do?
IP Address Allocation: IANA oversees the distribution of IP addresses (both IPv4 and IPv6) to regional registries.
Domain Name System (DNS) Root Zone Management: It manages the top level of the DNS hierarchy, ensuring that domain names resolve correctly to IP addresses.
Computer Security Incident Response Team (CSIRT)
Word Web Bugs are documents that can be used to track attackers by creating a callback when opened, which reveals the attacker's IP address. They can be used for cyber deception classes and don't require Microsoft Word to be open or macros to be enabled. There are two document templates for Word Web Bugs: web_bug.doc and web_bug.html.
write blocker is a hardware or software device that prevents data from being written to a storage device. When you connect a storage device (like a hard drive or USB stick) to a system through a write blocker, the device can be read, but any attempts to write data back to it are blocked. It ensures that the original data remains intact during the forensic investigation process. This is crucial for maintaining the integrity of digital evidence. So, while write blockers primarily protect data, they also facilitate the creation of accurate and reliable copies for forensic investigations
drive duplicator is a hardware device designed to create exact copies of data from one storage device to another. Unlike write blockers, drive duplicators allow data to be written to the target device.