1.7 Summarize the techniques used in security assessments Flashcards

1
Q

Intelligence Fusion

A

Taking big data and use data analytics to identify potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Feeds

A

Additional sources that provide information on attack vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maneuvers

A

Automated system that combats threats. (Big data that is analyzed and if a threat is there, the system blocks it.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability Scanning

A

Scans data from a Threat Actor perspective on for weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-Intrusive Scan

A

Gather info on vulnerability but doesn’t act on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intrusive Scan

A

Gather info on vulnerability but DOES act on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-credential Scans

A

Threat Actor that DOES NOT a login to access your network and looks for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Credential Scans

A

Threat Actor that DOES HAVE RIGHTS to the network and will try to find vulnerabilities for a USER perspective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where to Scan for Vulnerabilities

A

Apps, Web App, andNetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CVE Data Base

A

Common Vulnerability and Exposure. Data base that is a summary of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CVSS

A

A data base that scores the vulnerability on how severe it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CVSS Versions

A

2.0 and 3.0 both have different scoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability scan LOG REVIEW

A

A log that displays vulnerabilities with Security Controls, Misconfigurations, and Real vulnerabilities (newer ones)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

False Positives

A

A vulnerability is identified but doesn’t really exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

False Negative

A

A vulnerability exists, but the scan didn’t detect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Config Review

A

Checking the device it self for Obvious vulnerabilities.

17
Q

SIEM

A

Security Information and Event Management.
A system that logs security events from a network in real time.

18
Q

Syslog

A

A standard that allows log files to be sent from many devices.
(Windows, Linux, router, switch)

19
Q

SIEM Data Inputs

A

Types of information that SIEM would look for: Sever, VPN, Firewall, Traffic flows, Network, Packets

20
Q

Security Monitoring on a SEIM

A

A way to track incoming information and annotate security exceptions.

21
Q

SIEM Behavior Analysis

A

How people are using a network. If the user is a risk.

22
Q

Sentiment Analysis

A

How much people HATE your organization. Attracts more Threat Actors to your organization.

23
Q

SOAR

A

Security Orchestration automation and response

-Automated way to handle security task. (24hrs and instantly)