1.7 Summarize the techniques used in security assessments Flashcards

1
Q

Threat hunting

A

A dynamic process of seeking out cybersecurity threats inside your network from attackers and malware threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intelligence fusion

A

Fusion Centers are state-owned and operated centers that serve as focal points in states and major urban areas for the receipt, analysis, gathering and sharing of threat-related information between State, Local, Tribal and Territorial (SLTT), federal and private sector partners.

Involves Industry and government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advisories and bulletins

A

Advisories and bulletins provide good advice on how to keep you company safe.

The advisories tend to be released government-funded agencies

Bulletins tend to be released by vendors or private companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Maneuver

A

A cybersecurity maneuver, then, refers to a company’s efforts to defend itself by disguising its systems, thereby making it difficult to successfully infiltrate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability scans

A

A vulnerability scanner is a program specifically designed to scan a system via the network to determine which services the system is running and whether any unnecessary open network ports, unpatched operating systems and applications, or backdoors can be exploited.

Network administrators can use the same vulnerability scanner software to take preventive measures to close vulnerabilities that exist on their systems.

Vulnerability scanner typically include a few scanning and security assessment capabilities, such as configuration scanning, port scanning, network scanning and mapping, and OS and application server scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

False positives (Vulnerability scans)

A

A false positive occurs when a vulnerability scan reports a vulnerability that does not actually exist.

It’s worth looking at each result to be sure it is legitimate, especially if you plan to use the results to make enterprise wide changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False negatives (Vulnerability scans)

A

A false negative occurs when a vulnerability indeed exists but it is not detected by the scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Log reviews (Vulnerability scans)

A

Log reviews from servers, applications, network devices and other sources that might contain information about possible attempts to exploit detected vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Credentialed vs. non-credentialed (Vulnerability scans)

A

A credentialed scan is a much more powerful version of the vulnerability scanner. It has higher privileges than a non-credentialed.

Credentialed scans may access operating systems, databases, and applications, among other sources.

A non-credentialed scan has lower privileges than a credentialed scan. It will identify vulnerabilities that an attacker would easily find.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusive vs. non-intrusive (Vulnerability scans)

A

Non-intrusive scans are passive and merely report vulnerabilities. They do not cause damage to your system.

Intrusive scans can cause damage as they try to exploit the vulnerability and should be used in a sandbox and not on your live production system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application (Vulnerability scans)

A

Before applications are released, coding experts perform regression testing that will check code for deficiencies

There are three techniques to this scan:

*Static testing = analyzes code without executing it. This approach points developers directly at vulnerabilities and often provides specific remediation suggestions.

*Dynamic testing = executes code as part of the test, running all the interfaces that the code exposes to the user with a variety of inputs, searching for vulnerabilities.

*Interactive testing = combines static and dynamic testing, analyzing the source code while testers interact with the application through exposed interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web Application (Vulnerability scans)

A

Web application scanners are specialized tools used to examine the security of web applications. These tools test for web-specific vulnerabilities, such as SQL injection, xss, and xsrf or csrf vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network (Vulnerability scans)

A

These scans look at computers and devices on your network and help identify weaknesses in their security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Common Vulnerabilities and Exposures or CVE/ Common Vulnerability Scoring System or CVSS (Vulnerability scans)

A

The Common Vulnerability Scoring System CVSS is an industry standard for assessing the severity of security vulnerabilities. It provides a technique for scoring each vulnerability on a variety of measures

Common Vulnerabilities and Exposures CVE is simply a list of all publicly disclosed vulnerabilities that includes the CVE ID, a description, dates, and comments.

CVSS score:

  • 0.0 = none
  • 0.1 - 3.9 = low
  • 4.0 - 6.9 = medium
  • 7.0 - 8.9 = high
    *9.0 - 10.0 = critical

The CVSS sore is not reported in the CVE listing - you must use the National Vulnerability Database NVD to find assigned CVSS scores.

The National Vulnerability Database NVD is a database, maintained by NIST, that is synchronized with the MITRE CVE list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Configuration review (Vulnerability scans)

A

Configuration compliance scanners and desired state configuration in PowerShell ensure that no deviations are made to the security configuration of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog/Security information and event management (SIEM)

A

SIEM system that collects data from many other sources within the network

Provides real-time monitoring, analysis, correlation and notification of potential attacks

17
Q

Review reports (Syslog/Security information and event management or SIEM)

A

A SIEM typically includes dashboard and collects reports that can be reviewed regularly to ensure that the policies have been enforced and that the environment is complaint.

Also highlight whether the SIEM system is effective and working properly.

18
Q

Packet capture (Syslog/Security information and event management or SIEM)

A

Can capture packets and analyze them to identify threats as soon as they reach your network, providing immediate alert to security team if desired.

19
Q

Data inputs (Syslog/Security information and event management or SIEM)

A

The SIEM system collects a massive amount of data from various sources

May include network devices, IDM, MDM, CASB, XDR, and more.

20
Q

User behavior analysis (Syslog/Security information and event management or SIEM)

A

This is based on the interaction of a user that focuses on their identity and the data they would normally access on a normal day.

It tracks the devices that the user normally uses and the servers that they normally visit.

21
Q

Sentiment analysis (Syslog/Security information and event management or SIEM)

A

Artificial intelligence AI and Machine Learning ML to identify attacks.

Cybersecurity sentiment analysis can monitor articles on social media, look at the text and analyze the sentiment behind the articles.

Over time, can identify a users’ attitudes to different aspects of cybersecurity.

22
Q

Security monitoring (Syslog/Security information and event management or SIEM)

A

Real-time protection and event monitoring system that correlates the security events from multiple resources, identifies a breach, and helps the security team to prevent the breach.

23
Q

Log aggregation (Syslog/Security information and event management or SIEM)

A

Can correlate and aggregate events so that duplicates are filtered and a better understanding network events is achieved to help identify

24
Q

Log collectors (Syslog/Security information and event management or SIEM)

A

SIEM has built-in log collector tooling that can collect information from both the syslog server and multiple other servers. An agent is placed on the device that can collect log information, parse and restructure data, and pass to SIEM for aggregation.

25
Q

Security orchestration, automation, and response (SOAR)

A

Security Orchestration, automation, and response system is a centralized alert and response automation with threat- specific playbooks.

Response may be fully automated or single-click

25
Q
A