Contact logs are incorrect because they contain vendor contacts, legal and investigative contacts, and other contacts. Incident logs are incorrect because they contain information generated during the course of handling an incident, including all actions taken, all conversations, and all events. Audit logs are incorrect because they contain personal identification and activity information and transaction processing information so that actions can be traced back and forth.
143. Which of the following approaches provides an effective way of reporting computer security-related problems?
a. Help desks
b. Self-help information
c. Site security offices
d. Telephone hotline
An organization can augment existing computer security capabilities, such as help desks, self-help information, or site security offices, with CSIRC capability. A telephone hotline or e-mail address provides a single point of contact for users with centralized reporting. It is then possible to respond to all incidents and to determine whether incidents are related. With centralized reporting, a CSIRC can also develop accurate statistics on the size, nature, and extent of the security problems within the organization.
144. A computer security incident is any adverse event whereby some aspect of computer security is threatened. Which of the following is the
a. Proactive
b. Reactive
c. Proactive and reactive
d. Detective
When not responding to incidents, a CSIRC can take proactive steps to educate its users regarding pertinent risks and threats to computer security. These activities can prevent incidents from occurring. They include informing users about vulnerabilities and heightening awareness of other security threats, procedures, and proper maintenance of their systems. A CSIRC is not solely a reactive capability; it is also a proactive approach to reducing an organization’s computer security risk. Detective is not correct because prevention is better than detection, and detection works only in some circumstances.
145. Automatic tools exist to test computer system vulnerability and to detect computer security incidents. Vulnerability testing tools analyze which of the following events?
a. Recurring events
b. Current state of the system
c. Historical events
d. Nonrecurring events