1.7 - Security Assessments Flashcards
Define Threat Hunting.
The practice of proactively searching for cyber threats that are lurking undetected in a network.
Define Vulnerability Scans.
The process of identifying security weaknesses and flaws in systems and software running on them. They are usually minimally invasive. This is not the same as a penetration test.
Define Port Scan.
A vulnerability scans that focuses on ports. It can discover vulnerable ports that are open.
Define a Non-Intrusive scan.
A type of vulnerability scan that gathers information but does not try to exploit vulnerabilities.
Define an Intrusive Scan.
A type of vulnerability scan that focuses on exploiting vulnerabilities.
Define a Non-Credentialed scan.
A type of vulnerability scan that attempts to gain access from the perspective of someone who does not have access to the network.
Define a Credentialed scan.
A type of vulnerability scan that attempts to emulate an insider attack (an attack from someone who does have access to the network).
List some of the places that a Vulnerability Scan could find vulnerabilities.
1) Applications
2) Web Applications
3) Network (devices, firmware, ports, etc.)
Where can you go to do Vulnerability Research?
1) National Vulnerability Database
2) Common Vulnerabilities and Exposures (CVE)
3) Microsoft Security Bulletins
What might a Vulnerability Scan find?
1) Lack of Security Controls
2) Misconfigurations
3) Real Vulnerabilities
Define Security Information and Event Management (SIEM).
A database that logs security events and information. It can line diverse data types. Allows for forensic analysis.
Define Syslog (System logging protocol).
A protocol that facilitates the transfer of information from network devices to a central server, known as syslog server, in a particular message format.
Define Security Monitoring.
Involves collecting and analyzing information to detect suspicious behavior or unauthorized system changes on your network, defining which types of behavior should trigger alerts, and taking action on alerts as needed.