1.0 Flashcards
Agentless protection
Has a central security server or application that monitors all devices on the network to enforce security.
SOAR
Automates tasks related to detecting and remediating exploits. IE: It can delete or quarantine a malicious file.
Run Book automation
Compiled procedures or task that can guide you or complete tasks for you via scripts.
Sliding window anomaly detection
Detects anomalies in real time and denies the associated packets.
Discretionary access control
(DAC) The owner decides permissions of the files.
Threat intelligence platform (TIP)
Platform that allows you to generate and collect data from many different places to assist in defending and remediating against malicious software.
Risk scoring vs Risk assessment
Risk assessment is to weigh the likelihood and the impact of a potential attack, risk scoring is giving that a score (usually red, yellow, or green) to compare it to others.
Defense-in-Depth
Implement security on all different layers.
1. physical with Multi-Factor Authentication(MFA).
2. technical controls such as VLANs or port control.
3. Administrative with policies such as limiting junior personals privilege.
Application security systems
Protects layer 5-7, found on device.
Mandatory access control
The system automatically denies permission depending on the user and the sensitivity of the file.
Nondiscretionary access control
Access based on different types of rules, such as IT, Security, and user groups and gives access to said groups.
Rule-based access control
Sets a rule for a file, such as you can only view the file or that you cannot delete it.
Role-based access control
Sales team can access sales files and IT can access IT files.
CVSS terms:
Attack Vector
Attack complexity
Privileges required
User interaction
scope
Common Vulnerability Scoring System higher scores are more dangerous (10 is the highest)
Attack Vector: what it targets such as the network, physical or the system.
Attack complexity: how hard/how much information the need before executing
Privileges required: What level of privilege does the require in need to execute the exploitation.
User interaction: Does the attacker need any user interaction?
Scope: What other systems are affected if a system gets compromised?