2.4 Analyze and interpret output from security technologies Flashcards
HIDS/HIPS
A type of Intrusion Detection System (IDS) that monitors a computer system for unexpected behavior or drastic changes to the system’s state.
HIDS/HIDS produce similar output/logs is similar to anti-malware scanners.
Antivirus scanner
Detects and removes virus infections, worms, trojans, rootkits, adware, spyware, DoS tools.
Output is displayed as an alert, and may be tagged with a CME (Common Malware Enumeration)
File integrity check
When software is installed from a legitimate source, the OS package manager checks the signature or fingerprint of each executable file and notifies the user if there is a problem.
Host-based firewall
Unlike a network firewall, a host-based firewall will usually displays an alert to the user when a program is blocked, allowing the user to override the block rule or add an accept rule.
Application whitelisting
Means nothing can run if it is not on the approved whitelist.
Removable media control
An alert will be displayed to the user if a device is blocked by the security policy.
Advanced malware tools
Ex. Sysinternals.
- Look for unrecognized process names
- Look for processes with no icon, version info, description, or company name
- Examine processes hosted by the service host executable and determine whether they have a valid parent/child relationship with the principal Windows processes.
UTM
(Unified Threat Management) a system that centralizes various security controls - firewalls, anti-malware, network intrusion prevention, spam filtering, content inspection.
DLP
(Data loss/leak prevention) A software that detects and prevents sensitive information in a system or network from being stolen or otherwise falling into the wrong hands.
Data remediation mechanisms:
- Alert only
- Block
- Quarantine
- Tombstone - file is quarantined and replaced with one describing the policy violation
Data execution prevention
Prevent overflow attacks. May prevent applications from running if they don’t support DEP technologies.
Whitelist & Blacklist
Web application firewall
Designed to protect software running on web servers and their backend databases from code injection and DoS attacks.
Output is written to a log, which you can inspect and determine what is a threat.