1.7 Flashcards
Summarize the techniques used in security assessments.
Is the practice of proactively searching for cyber threats that are inside a network yet remain undetected.
Threat hunting
______________ involves integrating multiple sources of threat intelligence to produce actionable insights and enhance situational awareness for cybersecurity operations.
Intelligence fusion
Are streams of curated threat intelligence data
Threat feeds
Are published sets of information from partners, such as security vendors, industry groups, the government, information-sharing groups, and other sources of information.
Advisories and bulletins
Refers to the strategic movement or actions taken by attackers to exploit vulnerabilities, evade detection, or achieve their objectives within a target network or system.
Maneuver
Are automated assessments conducted to assess security vulnerabilities present in systems.
Vulnerability scans
Are instances where a security tool incorrectly identifies benign or legitimate activity as malicious or suspicious.
False positives
Are instances where a security tool fails to detect genuine security threats or malicious activity, thereby allowing them to go undetected.
False negatives
Involve analyzing log files generated by systems, applications, or network devices to identify security incidents, anomalies, or unauthorized activities.
Log reviews
Accessing systems, devices, or applications using valid authentication credentials, to perform authorized actions or operations.
Credentialed
Refers to accessing systems, devices, or applications without using valid authentication credentials.
non-credentialed
Security assessments that involve actively probing, scanning, or interacting with systems, networks, or applications to identify vulnerabilities. May include penetration testing, vulnerability scanning, and other active reconnaissance techniques.
Intrusive
Security assessments that involve passive observation, analysis, or monitoring of systems, networks, or applications without directly interacting with them. Aim to assess security posture without disrupting normal operations or risking system stability.
non-intrusive
Is a standardized list of publicly known cybersecurity vulnerabilities identified by the MITRE Corporation. Each entry includes a unique identifier, description, and references to affected products or systems.
Common Vulnerabilities and
Exposures (CVE)
Is a scoring system used to assess the severity of vulnerabilities based on various factors such as exploitability, impact, and complexity.
Common
Vulnerability Scoring System (CVSS)