11.3 Enterprise Security Management Flashcards
An intrusion detection system (IDS) both ______ and looks for ______.
An intrusion detection system (IDS) both analyzes traffic and looks for malicious signatures.
Enterprise security monitoring (ESM) includes ______.
Enterprise security monitoring (ESM) includes endpoint telemetry.
True or False:
Firewalls and NSMs can see inside encrypted traffic.
False
Firewalls and NSMs CANNOT see inside encrypted traffic.
In most cases, malware will be transmitted from attacker to victim in an encrypted state to hide its presence and intent. This also serves as a method of obfuscation to bypass IDS detection engines.
ESMs use OSSEC to provide visibility at the _____, where malware infection takes place after it’s decrypted.
ESMs use OSSEC to provide visibility at the host-level, where malware infection takes place after it’s decrypted.
______ is essentially host-based monitoring of system data.
Endpoint telemetry is essentially host-based monitoring of system data.
What tools are in the Elastic (ELK) Stack, the engine that operates within the security onion
Elasticsearch + logstash + kibana
________ is important at every level of government and public sector organizations, which use it to determine acceptable risk and develop security controls that in forms budgets
Threat intelligence is important at every level of government and public sector organizations, which use it to determine acceptable risk and develop security controls that in forms budgets
__________ , are responsible for establishing threat intelligence cards, which document the TTPs used by adversaries to infiltrate a network.
Computer and Incident and Response Teams (CIRT), are responsible for establishing threat intelligence cards, which document the TTPs used by adversaries to infiltrate a network.
__________ are shared among the cyber defense community, allowing organizations to benefit from the lessons learned by others.
Threat intelligence cards are shared among the cyber defense community, allowing organizations to benefit from the lessons learned by others.