1.7 - Techniques Used in Security Assessments Flashcards
1
Q
Threat Hunting
A
- Attackers are always looking for the next threat
- Strategies of today won’t likely be the strategies of tomorrow
- Attackers are constantly modifying strategy
- One big problem, you can’t react until you’re getting attacked
- One goal: speed up reaction time or prevent attack
- Ex: Firewalls get stronger, so phishing gets better
2
Q
Intelligence Fusion
A
- Overwhelming amount of security data
- Too much data to properly detect, analyze, and react
- Data sources are different (server data is different from firewall different from IPS, etc)
- Also there are different personnel teams (security teams, security intelligence, threat response)
- Add external sources (threat feeds, governemental alerts, social media bulletins)
- All these internal / external sources goes into DB
- Goal: Fuse the security data together and use big data analytics to analyze and pick out correlations
3
Q
Cybersecurity maneuvers
A
- Start deploying security technology (ex: additional firewalls, intrusion prevention, deleting malicious software)
- These maneuvers are often automated, when the big data analytics spots potential threats the computer can react instantly
- Combined with Fused Intelligence
- This is an on going process
4
Q
Vulnerability Scans
A
- Designed to look at systems and see if potential vulnerabilities exist (ex: in the OS, network device, or application)
- Usually minimally invasive (unlike a penetration test)
- Common to run this on all systems that are connected to the network (ex: servers, workstations, laptops)
- Don’t dismiss insider threats, pretend you have insider access too
5
Q
Penetration Test
A
- Invasive
- Tries to gain access to your system
- Unlike a vulnerability scan
- another intrusive test is to take a known exploit and see if it can get into your system
6
Q
Port Scan
A
- Looks at what ports are responding on a particular IP address
- A type of vulnerability scan
- poke around, see what’s open
- May be able to gather information about things that are less than secure
- Ex: you might see port 23 is running a telnet service and you know that telnet service inherently sends info that is not secure (not encrypted), this is a potential vulnerability
7
Q
Scan Types
A
- Scanners are very powerful
- use many different techniques to identify vulnerabilities
- “non-invasive” but a little invasive. It’s gathering information, not trying to exploit a vulnerability. (as opposed to a penetration test)
- Never run a scan on your network where you do not have explicit permission to do so
- You must understand exactly what scan will do (there have been cases where a scan trips a bug that causes system to become unavailable)
8
Q
Non-Credentials Scan
A
- User doesn’t have login access
- Run from their perspective
9
Q
Credentialed Scan
A
- Run scan as a user who has rights, how much vulnerability exists?
10
Q
Scan Vulnerability Examples
A
- Vulnerability scanner DB needs to be constantly updated
- Can have application scans ( desktop, mobile apps)
- Can have web application scans (software on a webserver)
- Can have Network scans ( misconfigured firewalls, open ports, vulnerable devices)
11
Q
Vulnerability Research
A
- Will do a lot of reserach before and after scan
- Resources: CVE - Common Vulnerabilities and Exposures
- Resources: National Vulnerability Database - NVD
- Microsoft Security Bulletins
- Some vulnerabilities cannot be definitively tied identified by a CVE, need to do more research, but the scanner will alert you to the fact there’s an issue
12
Q
NVD
A
- National Vulnerability Database
- This is the consolidated CVE DB
- summary of all CVEs you can also find at mitre’s CVE website
- Synchronized with the CVE list from Mitre
- It also includes a CVSS (Common Vulnerability Scoring System)
- http://nvd/nist.gov
- very common resource for vulnerability scans
- Industry collaboration, if you’re building a project you’ll want to involve this DB
13
Q
CVE
A
- Common Vulnerabilities and Exposures
- https://cve.mitre.org/cve
14
Q
CVSS
A
- Common Vulnerability Scoring System
- a feature in the NVD (National Vulnerability Database)
- tells you severity threat
- Quantitative scoring of vulnerability 0 to 10
- Scoring standards change over time
- 2 Different scoring methods, one for CVSS2.0 and one for CVSS3.x (use different criteria, need the picks the one that works for you)
15
Q
Things Vulnerability Scans can expose
A
- Lack of security controls (ex: if no firewall, anti-virus, anti-spyware. Things that should be in place)
- Misconfigurations (Ex: open shares, guest access)
16
Q
False positivies
A
- A vulnerability is identified by a scan that doesn’t really exist
- Different from a low-severity vulnerability (which is real but may not be a high priority)
- To combat this: Update to the latest signatures (if you don’t know it you can’t see it)
17
Q
False negative
A
- A vulnerability exists, but scanner didn’t pick it up
- worse than a false positive
- To combat this: Update to the latest signatures (if you don’t know it you can’t see it)
18
Q
What if you find a false positive/negative?
A
- Work with the vulnerability detection manufacturer
- They may need to update their signatures for your environment
19
Q
Configuration Review
A
- Validate the security of device configurations of OS (ex: may want to validate security settings, like firewall, anti virus)
- Could look at account configurations to make sure no one is sharing that shouldn’t be
- Could look at servers ( access controls, permissions settings)
- Security devices (firewall rules, authentication options)
- If you don’t want to do a full blown scan
20
Q
SIEM
A
- Security Information and Event Management device
- Designed to collect information of security events and information
- core of SIEM is the log information
- Log collection of security alerts
- Real-time information
- SIEM is often used a central repository - Log aggregation and long-term storage (usually includes advanced reporting features)
- Data correlation - link diverse data types
- Good place to go for forensics after a data event has occurred
- often includes reporting features
21
Q
Syslog
A
- Standard for message logging into a SIEM (b/c SIEM aggregates very different log information, need a way to have a standard way to feed in the data)
- Diverse systems, consolidated log
- Usually a syslog compatible collector in the SysLog itself
- Looks for messages to be sent from diverse sources
- You’re going to need a lot of disk space to store all these log datas (terabytes on terabytes)
22
Q
SIEM Data (what do you store?)
A
- Data inputs (Ex: server authorization attempts, VPN connections, Firewall session logs, Denied outbound traffic flows, network utilizations)
- Raw packet captures (especially if an event occurs, can add more information to these captures) (ex: network packets, often associated with a critical alert, some organizations capture everything)
23
Q
SOC
A
- Security Operations Center
- Common in large organizations
- Someone can monitor all the SIEMs and react to the SIEM dashboard
- Constant monitoring needed, track important statistic
- automated emails can be set up to inform people
24
Q
Security Reports
A
- Most SIEMs ( Security Information and Event Management) include a reporting feature
- More readable view of log data
25
Q
Big Data Analytics
A
- Ability to look through large amounts of very diverse data and identify patterns that would normally remain invisible
26
Q
UEBA
A
- User and Entity Behavior Analytics
- Looks at how ppl are acting (look at how ppl are using the network)
- Detect insider threats, identify targeted attacks
- Catches what the SIEM and DLP systems might miss
27
Q
Sentiment Analysis
A
- Examines how public views a particular organizations
- Tends to attract hackers if it’s widely hated, could impact what type of security you need on your network
- Public discourse correlates to real-world behavior
- Social media can be a barometer
28
Q
SOAR
A
- Security Orchestration, Automation and Response
- Goal is to - Automate routine, tedious, and time-intensive activities
- Orchestration - connecting many tools and devices together (ex: firewalls, account management, email filters) this can be done dynamically
- Automation - handle security tasks automatically (ex: configuration firewalls. computer is much faster and can mitigate things faster.)
- Response - make changes immediately, any time of day