4.4 - 4.5 Flashcards
End point security
Our devices are our endpoints ,
Allows/denied app list through approved list
Block list
Configuration changes
Firewall rules
Mobile device manager
Data loss prevention
Url filter to block sites
Certificates
Isolation
Process isolation, network isolation administrative isolation
Containment
Putting malware in sandbox
Segmentation
Prevent unauthorized movement
Soar
Security orchestration automation response,
Using mutilpe third party tools and running them together with run books playbook is more advanced with combined run books inside
Digital forensics
Rfc-3237 evidence id collection and archiving
Acquisition analysis and archiving
Legal hold what type of data is needed for us and requires admissibility and chains of custody with documentation of different timezones of device event logs and interviews
Forensic data acquisition
Order of volatility from most to least,
cpu registers, cpu cache;
router table, arp cache, orocess table, kernel stats, memory;
Temp internet files;
Disk;
Remote logging and monitoring data;
Physical config, network topology;
Archival media
On premises vs cloud
For forensics in cloud , right to audit clause for the provider to disseminate data
Look up regulatory and jurisdiction of that data
Data breach notification laws id its consumer data
Manageing evidence
Integrity checks with hashing, provenance and checksums
Preservation while handling evidence by copying everything sometimes via live collection
E-discovery gathering the data, not analyzing just gathering details of electronic discovery
Data recovery for deleted or inaccessible data
Non repudiation of knowing who sent the data with mac or digital sig
Strategic intel