3.0 Detect Flashcards
Analyze security system logs, security tools, and data
IP networking/Ip resolving
Dos attacks/DDos attacks
Security vulnerability databases
Intrusion detection systems
Network encryption
SSL decryption
SIEM
Firewalls
DLP
IPS
IDS
Evaluate and interpret metada
Malware
Network topology
Anomalies
False positives
Superhuman logins/geo-velocity
APT activity
Botnets
Unauthorized programs in the startup menu
Presence of attack tools
Registry entries
Unusual network traffic
Bandwidth usage
Malicious network communication
Off hour usage
New administrator/user accounts
Guest account usage
Unknown open ports
Unknown use of protocols
Service disruption
Website defacement
Unauthorized changes/modifications
Suspicious files
Patches
Recipient of suspicious emails
Unauthorized sessions
Failed logins
Rogue hardware
Agent-based log collection
Agentless log collection
Syslog log collection
Source validation
Verification of log integrity
Evidence collection
Ip address and hostname resolution
Field name consistency
Time zones
Threat hunting
Long tail analysis
Intrusion detection
Behavioral monitoring
Log retention
Log aggregator and analytics tools
SIEM
Linux tools
grep
cut
diff
grep
cut
diff
Windows tools
find
WMIC
Event viewer
find
WMIC
Event Viewer
Bash
Powershell
Network-based
WAP logs
WIPS logs
Controller logs
Packet capture
Traffic log
Flow data
Device state data
SDN
Host-based
Linux syslog
Application logs
Cloud Audit logs
Threat feeds
Asset discovery methods and tools
Alerting systems
Intrusion prevention or detections systems (IDS/IPS)
Firewalls
Endpoint detection and response (EDR)
Common indicators of potential compromise, anomalies, and patterns
Analysis tools
Document and communicate results
Communication and documentation policies and processes
Security incident reports
Description
Potential impact
Sensitivity of information
Logs
Escalation processes and procedures
Specific technical processes
Techniques
Checklists
Forms
Incident response teams
Levels of authority
Personnel roles and responsibilities
Document and communicate results
Command and control
Data exfiltration
Pivoting
Lateral movement
Persistence/maintaining access
Keylogging
Anti-forensics
Covering tracks
Prioritization or severity ratings of incidents
Communication policies and procedures
Levels of authority
Communicate recommended courses of action and countermeasures