6. Sound the alarm: detection and response Flashcards
Computer security incident response teams (CSIRT)
specialized group of security professionals that are trained in incident management and response
Documentation
any form of recorded content that is used for a specific purpose
Endpoint detection and response EDR
application that monitors an endpoint for malicious activity
Event
observable occurrence on a network, system, or device
False negative
state where the presence of a threat is not detected
False positive
alert that incorrectly detects the presence of a threat
Incident
occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of info or an info system; or constitutes a violation or imminent threat of violation of law, security policies, a security procedures, or acceptable uses policies
Incident handler’s journal
form of documentation used in incident response
Incident response plan
document that outlines the procedures to take in each step of incident response
Incident detection system IDS
application that monitors system activity and alerts on possible intrusions
Intrusion prevention system IPS
application that monitors system activity for intrusive activity and takes action to stop the activity
National Institute of Standards and Technology NIST Incident Response Lifecycle
framework for incident response consisting of four phases: preparation; detection and analysis; containment, eradication, and recovery; and post-incident activity
Playbook
manual that provides details about any operational action
Security information and event management SIEM
application that collects and analyzes log data to monitor critical activities in an org
Security operations center SOC
org unit dedicated to monitoring networks, systems, and devices for security threats or attacks
Security orchestration, automation, and response SOAR
collection of applications, tools, and workflows that uses automation to respond to security events
True negative
state where there is no detection of malicious activity
True positive
alert that correctly detects the presence of an attack
Command and control C2
techniques used by malicious actors to maintain comms with compromised systems
Command-line interface CLI
text-based user interface that uses commands to interact with the computer
Data exfiltration
unauthorized transmission of data from a system
Data packet
basic unit of info that travels from one device tot another within a network
Indicators of compromise IoC
Observable evidence that suggests signs of a potential security incident
Internet Protocol IP
set of standards used for routing and addressing data packets as they travel between devices on a network
Intrusion detection systems IDS
application that monitors system activity and alerts on possible intrusions
Media Access Control MAC address
unique alphanumeric identifier that is assigned to each physical device on a network
National Institute of Standards and Technology NIST Incident Response Lifecycle
framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, eradication and Recovery; and Post-incident activity
Network data
data that’s transmitted between devices on a network
Network protocol analyzer packet sniffer
tool designed to capture and analyze data traffic within a network
Network traffic
amount of data that moves across a network
Network Interface Card NIC
Hardware that connects computers to a network
Packet capture p-cap
file containing data packets intercepted from an interface or network
Packet sniffing
practice of capturing and inspecting data packets across a network
Playbook
manual that provides details about any operational action
Root user (or superuser)
user with elevated privileges to modify the system