18.1 Introduction to SIEM Flashcards

1
Q

Organizations detect attacks against their information security assets with a concept called _________, or more specifically, ______________.

A

Organizations detect attacks against their information security assets with a concept called **continuous monitoring**, or more specifically, **information security continuous monitoring (ISCM)**.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain ISCM. ISCM provides real-time insight into:

A

ISCM is the processes and technologies used to detect information security risks associated with an organization’s operational environment in real time.

  • The current state of an organization’s networked assets.
  • Vulnerabilities and threats that attack an organization’s networked assets.
  • How well security controls are protecting an organization’s networked assets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

While log entries were originally designed to assist with troubleshooting system issues, they later proved useful to security professionals as a source of insight into:

A
  • The state of a device or a network.
  • Who has access to a device or a network.
  • User activities on a device or a network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_________ are created on devices such as Linux and Windows systems.

A

**Operating system logs** are created on devices such as Linux and Windows systems.

  • Security access events: For example, an unauthorized user attempts to view privileged data, such as a company payroll file.
  • Security permissions events: For example, a user attempts to give themselves permissions to view and edit a privileged file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_________ are created by devices such as Apache and IIS (Internet Information Services) servers. Security events that can be identified by these logs include:

A

**Application logs** are created by devices such as Apache and IIS (Internet Information Services) servers.

  • Application access events: For example, a brute force attempt to log into an administrative account on a web application.
  • Fraud events: For example, a user on a financial application attempts to transfer a large sum of funds to a suspicious external account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____________ are created on devices such as routers, switches, and DHCP/DNS servers.

Security events that can be identified by these logs include:

A

**Networking device logs** are created on devices such as routers, switches, and DHCP/DNS servers.

  • Administrative events: For example, a network administrator accidentally opens a port allowing unauthorized traffic into a network.
  • Network security events: For example, a DHCP starvation attack occurs in which the DHCP server receives thousands of requests in a short period of time, consuming all available IP addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________ are created on devices such as IDS/IPS, firewalls, endpoint devices, and honeypots.Security events that can be identified by these logs include:

A

**Security device logs** are created on devices such as IDS/IPS, firewalls, endpoint devices, and honeypots.

  • Endpoint events: For example, a user accidentally downloads malware onto their laptop from a phishing email.
  • IDS signature events: For example, a packet with an illegal TCP flag combination is identified by an IDS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 most common types of logs used by secuirty professoinals?

A
  1. Operating system logs
  2. Application logs
  3. Networking device logs
  4. Secuirty device logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__________ is the identification and collection of logs from multiple computing sources.

A

Log aggregation is the identification and collection of logs from multiple computing sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______ is the process of converting the single string of data into fields of structured data.

A

**Log parsing** is the process of converting the single string of data into fields of structured data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If we separate the values, we can categorize each field and rearrange them to match a uniform structure, a process known as _______.

A

If we separate the values, we can categorize each field and rearrange them to match a uniform structure, a process known as **log normalization**.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is log correlation?

A

Log correlation monitors incoming logs for logical sequences, patterns and values to identify events that are invisible to individual systems. They can perform analysis that would otherwise be done by repetitive human analysis. They can identify things happening that are unusual for your business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHat does SIEM stand for and what is it?

A

Security professionals use a technology called **security information and event management (SIEM)** (pronounced “sim”) to simplify and manage monitoring security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two parts of SIEM?

A

IEM is made up of two types of software:

  • Security information management (SIM), which is primarily focused on log management and involves collecting logs in a central location for later analysis.
  • Security event management (SEM), which is primarily focused on event monitoring and involves identifying, evaluating, and correlating logs to determine security events and create alerts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly