(4) Indicators Of Compromise And Tools And Techniques Of Threat Hunting Flashcards

1
Q

What are Indicators of Compromise (IOCs)? What are IOCs used for?

A

IOCs are data that normally identifies compromised systems and software. They are used to detect breaches, compromises, and malware as well as activities associated with specific attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three points that are involved with Indicators Of Compromise (IOCs)?

A

-Collection

-Analysis

-Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In terms of Indicators Of Compromise (IOC), describe Collection

A

Collection involves how to acquire data that can indicate an issue. This involves data sources, tools, and logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in term of Indicators Of Compromise (IOC), describe Analysis

A

Once data has been collected, it has to be analyzed to make sure that it indicates that an intrusion has happened. Analysis demands that you understand what the data means and the context of if it means a compromised has happened or been attempted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In terms of Indicators of Compromise (IOC), describe Application

A

Application of IOCs happens in two ways.

Analysis to understand if a compromise has happened, which would result in incident response systems activating.

This can happen as part of the analysis process too. Threat intelligence sources and groups document IOCs and make them readable for monitoring and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the common IOCs that one should familiarize with when it comes to IOC types

A

-Questionable login activity
-Modifications to files
-Unexpected use of privileged accounts
-Unusual network traffic
-Large data transfers
-Unexpected services, ports, software and others working on systems and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is active defense?

A

Active defense is about deception that delays or confuses attackers. This could include tar pits that give attackers fake targets and data to slow down scans and attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What specific setups are involved with honeypots?

A

Honeypots are set up to have logging enabled to give threat analysts a chance to analyze attacker tools and behaviors and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly