1.7 - Summarize the techniques used in security assessments. Flashcards

Summarize the techniques used in security assessments.

1
Q

Threat hunting

A

-proactive approach to finding perp b4 alerts r triggered
-find perp b4 they find u
-not reactive or detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intelligence fusion

A

-too much data to properly detect, analyze, and react
-separate teams (sec.ops, sec. intel, threat response
-fuse sec. data with big data analytics
->analyze large + diverse data sets
->pick out interesting data pts + correlations

Breakdown
-gathering + merging various sources of threat intel data
->open source intel, internal logs, internal feeds
-combine diverse data pts to identify emerging threats + patterns that might go unnoticed when examining individual sources

Fusing data
-collect data = logs, sensors, net. info, internet events, intrusion detection
-add external sources = threat feeds, govt alerts, advisories/bulletins, social media
-correlate wth big data analytics = focuses on predictive analytics + usr behavior analytics, mathematical analysis of unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat feeds

A

-regularly updated streams of info about known threats + vulns. + emerging threats + IOCs
-provides sec. teams wth realtime/near realtime info about mal. IPs, malware signatures, other IOCs
-integrating TFs into sec. sys. orgs can proactively block + detect threats based on latest intel.
-provides orgs wth timely + actionable info to defend
-enables proactive threat detection + response
->helps mitigate risks + protect assets effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advisories and bulletins

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maneuver

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability scans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False positives

A

False positive (106)
-scanner reports vuln. that doesn’t exist

Positive report
-when vuln scanner reports vuln

True positive
-report is accurate

False positive report
-inaccurate report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

False negatives

A

Negative report
-scanner reports that a vuln isn’t present

True negative report
-negative report is accurate

False negative report
-negative report is inaccurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Log reviews

A

-might contain info about possible attempts to exploit detected vuln.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Credentialed vs. non-credentialed

A
  • Credentialed scan
    – You’re a normal user,
    emulates an insider attack

Non-credentialed scans
– The scanner can’t login to the remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusive vs. non-intrusive

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application scanning

A

-commonly used as part of software dev.
-tools analyze custom developed software to identify common sec. vulns.
-occurs using 3 techniques;
-> static testing = analyzes code wthout executing it
->dynamic testing = executes code as part of test.
->interactive testing = combine static/dynamic. analyzes source code while testers interact with app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web application scanners

A

-tools used to examine sec. of web apps
-test 4 web specific vulns.
->SQL injection, XSS (cross site scripting), CSRF (cross site request forgery) vulns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network scanners

A

-prob wide range of net. connected devices 4 known vulns.
-try to determine type of device + its config and then launch targeted tests designed to detect presence of known vulns.
-EX: tenables Nessus, Qualys, Rapid7, OpenVAS

Prevention
-every org. should have at least one scanner
-many orgs choose to deploy two diff. vuln scanning products in same environ as a Defense in depth ctrl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Vulnerabilities and
Exposures (CVE)/Common
Vulnerability Scoring System (CVSS)

A

CVSS
-industry standard 4 assessing severity of sec. vuln.
-provides technique 4 scoring each vuln.
-use CVSS ratings to prioritize response actions
-rate vuln on 8 measures
-each measure given:
->descriptive rating + numeric score
-1st four = evaluate exploitability of vuln.
->metrics = attack vector, attack complexity, privileges required, user interaction
-last three = evaluate impact of vuln.
->metrics = confidentiality, integrity, availability
-8th = discusses scope of vuln.
->metric = scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Configuration review

A

Chapple
Weiss
Gibson

17
Q

Syslog/Security information and event management (SIEM)

A

-sys that correlate log entries from multiple sources + provide actionable intel

18
Q

Review reports

A

Chapple
Weiss
Gibson

19
Q

Packet capture

A

Chapple
Weiss
Gibson

20
Q

Data inputs

A

Chapple
Weiss
Gibson

21
Q

User behavior analysis

A

Chapple
Weiss
Gibson

22
Q

Sentiment analysis

A

Chapple
Weiss
Gibson

23
Q

Security monitoring

A

Chapple
Weiss
Gibson

24
Q

Log aggregation

A

Chapple
Weiss
Gibson

25
Q

Log collectors

A

Chapple
Weiss
Gibson

26
Q

SOAR

A

Security orchestration, automation, and response

-automate routine/tedious/time intensive activities
->connect many diff tools together (firewalls, acct mgmt, email filters, etc)

-mitigation/recovery tool + incident response

-use playbooks + runbooks (4.4)

-automation
->handle sec tasks automatically
->allow automation of remediation + restoration workflows

-response
->make changes immediately

-Pros
->improve efficiency of threat mitigation + detection
->allow u to quickly assess;
~attck surface of org
~state of systems
~where issues may exist
->frees up admins to focus on other admin tasks
-reduce ammt of time needed to investigate
-can be forwarded to other tools to investigate further
-verify if threat is real or not

Chapple 474
Gibson 408-409
Weiss 108-109, 546-548