• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Lecture & Notes
    • Lecture 1: Introduction to Incident Response and Intrusion management
    • Lecture 2: CIRT
    • Lecture 3: Wireshark / Packet Captures
    • Lecture 4: IDS/IPS
    • Lecture 5: Detecting Intrusion
    • Lecture 6: Escalation
    • Lecture 7: LOGS / SIEM
    • Lecture 8: LOGS where to get them
    • Lecture 9: SOC : How to build a SOC for Incident Response Center
    • Lecture 10: SPLUNK
    • Lecture 11: Executive Brief
    • Lecture 12: Final
  • Assignments
    • Short Paper 1
    • Short Paper 2
    • Short Paper 3
    • Term Paper
    • Executive Brief: Presentation
  • Blog Post
    • Welcome
    • Week 2 Blog
    • Week 3 Blog
    • Week 4 Blog
    • Week 8 blog
  • LABS
    • LAB 1
    • LAB 2
    • LAB 3
    • LAB 4
    • LAB 5
    • LAB 6
  • Webex
  • Gradebook

Intrusion Detection & Response

Temple University

Week 2 Blog

After a rocky start with Week 1, we are now onto Week 2.

During the week 1, the focus was to understand “what is an incident?” what are the basic steps in an attack.  There are various attack life cycles:  Mandiant Attack Life cycle and Lockheed Martin’s Cyber Kill Chain methodology.  While they are similar , there are some differences.  The two methodologies emphasize different aspects of an attack life cycle.  Kill Chain methodology’s emphasis on weaponization and delivery are very crucial.  Mandiant’s lifecycles focuses on the steps after the initial breach.

During this week, we will assume that a breach has occurred.  The discussion will be to understand the processes that need to exist to deal with a breach.  We will discuss the roles of the Help Desk, SOC, CSIRT, etc.

Reader Interactions

Comments

  1. Vaibhav Shukla says

    May 26, 2017 at 2:11 pm

    Lockheed Martin adapted a military concept of (Find, Fix, Track, Target, Engage and Assess) and applied it to Cyber as(Reconnaissance, weaponization, delivery, exploitation, installation and command & control) and there is no concept of internal reconnaissance and lateral movement in it whereas mandiant attack cycle mentions about cyclic process of maintaining foothold through lateral movement and internal reconnaissance.

    Log in to Reply
  2. Jose Gomez says

    May 29, 2017 at 4:09 pm

    The response time isa critical consideration in assembling, maintaining and deploying an effective CSIRT and dealing with a breach. Fortunately with a rapid, accurately targeted, and effective response many companies can minimize the overall damage to finances, hardware, and software caused by a specific incident.

    Log in to Reply
  3. Ruslan Yakush says

    June 5, 2017 at 2:45 pm

    Regarding processes, in case If a company has been breached, depending on the company type and size, it may be responsible not only for following internally defined processes within CIRT, but also responsible for contacting affected customers about the breach and may have to be prepared for litigation. In this case, company would be worrying about all required processes to be taken for the purpose of restoring company’s reputation. Also, company and CIRT team should be aware of all applicable law enforcement directives to make sure investigation is done right.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Week 01
  • Week 02
  • Week 03
  • Week 04
  • Week 06
  • Week 08
  • Week 09

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in