1.7 Summarize the techniques used in security assessments. Flashcards

1
Q

Threat hunting

A

Activity of seeking to identify new threats
-A proactive search through IoCs, log files, or other observables to locate malware or intruders lurking on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intelligence fusion

A

Combination of local logs w/multi sources of threat intel integrated into a useful analysis or report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat feeds

A

Sources of info about attacks and exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advisories and bulletins

A

Published by vendors, threat intel services, and other security focused orgs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Maneuver

A

Considering the parameters of an attack to gain better understanding through adjusting focus, sensor location, or analysis perspective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability scans

A

Used to discover weaknesses in deployed security systems to improve or repair them before a breach occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common Vulnerabilities and Exposures (CVE) / Common Vulnerability Scoring System (CVSS)

A

Led by NIST

CVE Assigns identifiers to publicly known system vulnerabilities to be used for cross-link and cross-referencing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Syslog/Security information and event management (SIEM)

A

A centralized application to automate monitoring of network systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sentiment analysis

A

Concept of analyzing text info for context and context to identify and extract subjective information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security orchestration, automation, and response (SOAR)

A

Collection of software solutions that can automate process of collecting and analyzing log and real-time data, evaluate it, then trigger response to low and mid-level security issues w/no need for human involvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly