Ch13-Describing Security Data Collection Flashcards
A key step in implementing a successful SOC
to follow a threat-centric approach in network security monitoring.
What is a threat-centric approach?
A threat-centric approach is all about the threat (not just compliance), and the threat’s life cycle, which includes before, during, and after attack phases.
What is one result of placing an IPS on the untrusted (outside) segment of a firewall?
The IPS can detect new forms of attacks.
Placement of an IPS
Optimal placement of an IPS depends on the needs and topology of the network to be protected.
Data-Type documents all the individual network sessions based on the session’s 5-tuple
Session Data
session’s 5-tuple
transport protocol, source IP address, source port, destination IP address, and destination port
commonly implemented example of session data
NetFlow
Analogous to Wiretap
Full Packet Capture
The actual content of a conversation may be extracted from full packet captures.
Full Packet Capture
Downside of Full Packet Capture
It has tremendous storage requirements, tedious to analyze
Commonly used file format of Full Packet Capture
PCAP(packet capture)
highlights operations that occur as a result of network sessions and system activities
Transaction Data
Objects that are mined from network traffic
Extracted Content
other security monitoring data types that aids in describing network activities at a higher level
Statistical Data
These data formulate baselines. Baselines document the aggregate normal patterns and their trend
Statistical Data
Comparing actual traffic patterns to the baseline patterns can reveal_______
anomalous behavior.
most crystallized of the data types
Alert Data
Potential Issues with Alert data
False positive and false negatives
Advantage of alert data
that the tool can process tremendous amounts of network traffic in real time. It is much faster than a human analyst could ever be
real-time access to the logs of their devices
Syslog
Code 0
Emergency
Code 1
Alert
Code 2
Critical
Code 3
Error
Code 4
Warning
Code 5
Notice
Code 6
Informational
Code 7
Debug
data point that is extracted from security data that can be used as a high fidelity predictor of system compromise
Indicator of Compromise (IOC)
extensible XML schema that enables security professionals to describe the technical characteristics that identify a known threat, an attacker’s methodology, or other evidence of compromise.
OpenIOC