3.0 Detect Flashcards
Analyze security system logs, security tools, and data
IP networking/Ip resolving
Dos attacks/DDos attacks
Security vulnerability databases
Intrusion detection systems
Network encryption
SSL decryption
SIEM
Firewalls
DLP
IPS
IDS
Evaluate and interpret metada
Malware
Network topology
Anomalies
False positives
Superhuman logins/geo-velocity
APT activity
Botnets
Unauthorized programs in the startup menu
Presence of attack tools
Registry entries
Unusual network traffic
Bandwidth usage
Malicious network communication
Off hour usage
New administrator/user accounts
Guest account usage
Unknown open ports
Unknown use of protocols
Service disruption
Website defacement
Unauthorized changes/modifications
Suspicious files
Patches
Recipient of suspicious emails
Unauthorized sessions
Failed logins
Rogue hardware
Agent-based log collection
Agentless log collection
Syslog log collection
Source validation