Chapter 17 Flashcards

1
Q

Incident Management

A
  1. Detection - IDS, anti-malware, audit logs, etc.
  2. Response
  3. Mitigation - contain incident
  4. Reporting
  5. Recovery
  6. Remediation
  7. Lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DoS attacks

A
  • SYN flood attack
  • Smurf attack - reflective DoS; broadcast ICMP echo req with spoofed victim IP
  • Fraggle - reflective DoS; broadcast UDP echo req with spoofed victim IP
  • Ping flood

Legacy attacks:
- Ping of Death - oversized ping packet
- Teardrop - fragmented IP packet
- LAND - LAN denial attack - SYN with same src and dst IP’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS

A
  1. Knowledge-based or signature based
    - low false positives
    - cannot detect unknown or new attacks
  2. Behavior-based (or statistical or heuristics-based) - first creates baseline of normal activity
    - can be considered expert system or pseudo-AI system
    - high false positives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host-based IDS
- can examine events in more detail
- costlier and harder to manage
- consumes system resources
- intruder may discover and disable

Network-based IDS
- can monitor large network using remote sensors and send to SIEM

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIPS (network intrusion prevention system)

A

Must be placed in-line with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Additional Preventive Measures

A
  • Honeypot - attract attackers; includes pseudo-flaws
  • Honeynet - network of honeypots
  • Warning banners
  • Anti-malware
  • Whitelisting or blacklisting apps
  • Firewalls - block directed broadcasts (unicast until reach dest network then becomes broadcast); block private IP’s at the border; block pings
  • Sandboxing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protection of logs

A

Send one copy to SIEM
Set permissions to logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Monitoring - process of reviewing logs, looking for something specific

Tuning - adjusting security controls to better match needs of org or env

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIEM (Security Info and Event Management) system

A

Central SIEM server
SIEM agents on hosts, network devices, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Clipping level

A

Non-statistical sampling normally used to audit events; only notify when number reaches clipping level
- not as accurate as statistical sampling but easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Other monitoring types

A

Traffic and trend analysis - looks at network flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SOAR (Security Orchestration, Automation and Response) system

A

Playbook - doc or checklist on how to verify incident

Runbook - implements the playbook into automated tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ML (machine learning) - starts with rules; part of AI

AI (artificial intelligence) - starts with nothing, and learns the rules based on feedback and applying ML

A

When applied to behavior-based detection system:
- ML: baseline provided; false positive is fed back; ML refines baseline
- AI: monitors traffic and develops baseline; also uses feedback from admin for false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber Kill Chain Framework

  • Defense by thwarting each of these stages
  • use in conjunction with MITRE ATT&CK, which lists attack TTP’s (tactics, techniques, procedures)
A

7 stages of attack:
1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploitation
5. Installation
6. Command and Control
7. Actions on objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly