1.7: Security Assessments Flashcards

1
Q

Threat Hunting

A

Find the attacker before they find you
strategies are constantly changing (firewalls get better, so phishing gets better)
Intelligence data is reactive, not proactive.
Speed up the reaction time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intelligence Fusion

A

Lots of overwhelming data that is received, be able to parse and then make a decision based on that data.
Many data types.
Many different teams.
Take all of this data, put into a giant DB and use data analytics to pick out data points that make sense and can be used to help find an attack vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fusing the Data

A

Collect the data
Logs and sensors, network data, intrusion detection systems data.
External sources from threat feeds, gov’t feeds, social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity Manuevers

A

Move firewalls, set rules, block addresses and delete software.
Automated manuevers, computer responds to data at the speed of light.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability Scans

A

minimally invasive, unlike a pen test.
Port scan: See whats open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

National Vulnerability Database

A

nvd.nist.gov.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CVSS

A

Common Vulnerability Scoring System
Quantitative scoring 0-10
scoring standards change over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

False Positive

A

Vulnerability is identified that doesn’t exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

False Negative

A

vulnerability exists, wasn’t detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Configuration Review

A

Validate the security of device configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SIEM

A

Security Information and Event Management
Logging of security events and info.

SIEM Data:
Server auth attempts
VPN connections
Firewall session logs
Denied outbound traffic flows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Syslog

A

Standard for message logging.
sent from other devices into a central repository
Integrated into the SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Monitoring

A

Constant information flow
Track important stats
send alerts when problems are found
Create triggers to automate responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Big Data

A

Analytics to analyze large stores and identify patterns that would normally remain invisible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UEBA

A

User and entity behavior analytics
Detect insider threats
Identify targeted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SOAR

A

S: Security orchestration, automation, and response
O: Orchestration, connect many different tools together. Firewalls, account management.
A: Automation, handle security tasks automatically.
R: Response, make changes immediately.