1.7 Security Assessment Techniques Flashcards
Threat hunting is a game of cat and mouse. Why is it important to fight back against the adversaries?
Intelligence data is reactive. You can’t stop an attack off of info alone.
This is the process of combining multiple sources of intelligence in order to analyze massive amounts of data and find correlations.
Intelligence fusion
What are the 3 main steps of intelligence fusion?
Collect the data
Add external sources
Correlate with big data analytics
This process involves moving firewalls, operating systems, setting firewall rules, and more to combat the constant change from multiple enemy fronts in the cyber realm.
Cybersecurity maneuvers
Less invasive than penetration testing. Involves scanning things like port security in order to detect possible vulnerabilities in your systems.
Vulnerability scanning
Name the 4 main vulnerability scan types and their purposes.
Non-intrusive - gather info
intrusive - exploit a vulnerability
non-credentialed - emulates external
credentialed - internal threat
This is what happens when a vulnerability scan indicates a problem when there really wasn’t one.
False positive
This is when a vulnerability does exist but your scanner does not detect it.
False Negative
Whats the best way to mitigate vulnerabilities without having to use a vulnerability scanner?
Configuration reviews
The process for logging security events and information.
Security information and event management (SIEM)
This is the standard used for security message logging, often integrated into a SIEM server. Requires lots of disk space to store logs.
Syslog
Name a few data inputs that are logged thorugh SIEM.
– Server authentication attempts
– VPN connections
– Firewall session logs
– Denied outbound traffic flows
– Network utilizations
-Packet caputures
This method has the goal of taking manual tasks in security management and automating them.
Security orchestration, automation, and response (SOAR)
What is oen of the biggest advantages of implementing SOAR for security management?
It is much faster and changes take place immediately