Chapter 14 - Monitoring and Incident Response Flashcards

1
Q

Incident

A

An Incident is a violation of the organization’s policies and procedures or security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Event

A

An Event is an observable occurrence, meaning that there are many events, few of which are likely to be incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the six steps of the incident response cycle?

A
  1. Preparation
  2. Detection
  3. Containment
  4. Eradication
  5. Recovery
  6. Lessons Learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tabletop Exercise

A

Tabletop Exercises are used to talk through processes. Team members are given a scenario and are asked questions about how they would respond, what issues might arise, and what they would need to do to accomplish the tasks they are assigned in the (Incident Response) IR plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Simulation

A

Simulation exercises will simulate incidents and test responders on individual functions or elements of the incident response plan. They can also be done at full scale, involving the entire organization in the exercise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Account Lockout (IoC)

A

Account Lockout is often due to brute-force login attempts or incorrect passwords used by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Concurrent Session Usage (IoC)

A

Concurrent Session Usage is when a user is connected from more than one system or device at once, specifically when the second device is in an unexpected or uncommon location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Resource Consumption (IoC)

A

Resource Consumption, like filling up a disk or using more bandwidth than usual for uploads or downloads, can be an indicator of compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Out-of-Cycle Logging (IoC)

A

Out-of-Cycle Logging occurs when an event that happens at the same time or on a set cycle occurs at an unusual time. This might be a worker logging in at 2AM or a cleanup process being activated at an unusual time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Missing Logs (IoC)

A

Missing Logs may indicate that an attacker has wiped the logs to attempt to hide their actions. This is one reason that many organizations centralize their log collection on a protected system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MITRE’s ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)

A

The ATT&CK knowledgebase matrices include detailed descriptions, definitions, and examples for the complete threat life cycle from reconnaissance through execution, persistence, privilege escalation, and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System Monitoring

A

System Monitoring is typically done via system logs as well as through central management tools, including those found in cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Monitoring

A

Application Monitoring may involve application logs, application management interfaces, and performance monitoring tools. This can vary significantly based on what the application provides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Infrastructure Monitoring

A

Infrastructure Monitoring includes monitoring SNMP and syslog entries created by infrastructure devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Information and Event Management (SIEM)

A

SIEM devices and software have broad security capabilities, which are typically based on the ability to collect and aggregate log data from a variety of sources and then to perform correlation and analysis activities with that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Alert Tuning

A

Alert Tuning is the process of modifying alerts to only alarm on important events. Alert Tuning often involves setting thresholds, removing noise by identifying false alarms and normal behaviors, and ensuring that tuning is not overly broad so that it ignores actual issues and malicious activity.

17
Q

Firewall Logs

A

Firewall Logs, which can provide information about blocked and allowed traffic, and with more advanced firewalls like NGFW or UTM, devices can also provide application-layer details or IDS/IPS functionality along with other security service-related log information.

18
Q

Application Logs

A

Application Logs for Windows include information like installer information for applications, errors generated by applications, license checks, and any other logs that applications generate and send to the application log. Web servers and other devices also generate logs like those from Apache and Internet Information Services (IIS), which track requests to the web server and related events.

19
Q

OS-Specific Security Logs

A

OS-Specific Security Logs for Windows systems store information about failed and successful logins, as well as other authentication log information.

20
Q

IDS/IPS Logs

A

IDS/IPS Logs provide insight into attack traffic that was detected or, in the case of IPS, blocked.

21
Q

Network Logs

A

Network Logs can include logs for routers and switches with configuration changes, traffic information, network flows, and data captured by packet analyzers like Wireshark.

22
Q

Syslog

A

Syslog, the Linux logging service, works with clients sending messages to servers that collect and store the logs.

23
Q

Metadata

A

Metadata is data about other data – in the case of systems and services, Metadata is created as part of files, embedded in documents, used to define structured data, and included in transactions and network communications.

24
Q

Reporting

A

Reporting on log information is part of the overall log management process, including identifying trends and providing visibility into changes in the logs that may indicate issues or require management oversight.

25
Q

Archiving

A

Archiving involves moving logs to a long term storage area when they must be retained but are not in active use. Organizations often pick a time frame like 30, 60, 90, or 180 days for log retention before archiving or deletion.

26
Q

Security Orchestration, Automation, and Response (SOAR)

A

SOAR platforms allow you to quickly assess the attack surface of an organization, the state of systems, and where issues may exist. They also allow automation of remediation and restoration workflows.

27
Q

Root Cause Analysis (RCA)

A

Root Cause Analysis can be performed once issues have been mitigated and the organization is on the path to recovery. This process focuses on identifying the underlying cause for an issue or compromise, identifying how to fix the problems that allowed the event or incident to occur, and ensuring that any systemic issues that led to the problem are also addressed.