Chapter 1.7 - Security Assessments Flashcards

Summarize techniques used in security assessments

1
Q

Threat Hunting

A

The practice of proactively searching for cyber threats that are lurking undetected in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intelligence Fusion

A

Combining pieces of information to produce higher-quality information, knowledge, and understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maneuver

A

Application of force to capture, disrupt, deny, degrade, destroy or manipulate computing and information resources in order to achieve a position of advantage in respect to competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability Scans

A

Scanning used to discover the weaknesses of a given system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

False Positive Scans

A

A vulnerability that was identified but doesn’t really exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

False Negatives Scans

A

A vulnerability exists, but wasn’t detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability Scan Log Review

A

The process of discovering, analyzing, and reporting on security flaws and vulnerabilities of what the scanner picked up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Credentialed Scans vs. Non-credentialed Scans

A

Credentialed scans - normal user, emulating an insider attack
Non-credentialed scans - The scanner can’t login to the remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusive Scans vs. Non-intrusive Scans

A

Intrusive scans - You’ll try out the vulnerability to see if it works
Non-intrusive scans - Gather information, don’t try to exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application Scans

A

Desktop, mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web Application Scans

A

Software on a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Scans

A

Misconfigured firewalls, open ports, vulnerable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common Vulnerabilities and Exposures (CVE)/ Common Vulnerability Scoring System (CVSS)

A

Provides a reference method for publicly known information-security vulnerabilities and exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Configuration Review

A

Validating the security of device configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Information and Event Management (SIEM)

A

Logging of security events and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog

A

Standard for message logging (integrated in SIEM)

17
Q

SIEM - Packet Capture

A

Can intercept and log traffic that passes over a computer network or part of a network

18
Q

SIEM - Data Inputs

A

Server authentication attempts
VPN connections
Firewall log sessions
Denied outbound traffic flows
Network utilizations

19
Q

SIEM - User and Entity Behavior Analysis (UBEA)

A

Cybersecurity solution that uses algorithms and machine learning to detect anomalies in the behavior of not only the users in a corporate network but also the routers, servers, and endpoints in that network

20
Q

SIEM - Sentiment Analysis

A

The process of analyzing digital text to determine if the emotional tone of the message is positive, negative, or neutral

21
Q

SIEM - Security Monitoring

A

Automated process of collecting and analyzing indicators of potential security threats, then triaging these threats with appropriate action

22
Q

SIEM - Log Aggregation

A

Mechanism for capturing, normalizing, and consolidating logs from different sources to a centralized platform for correlating and analyzing the data

23
Q

SIEM - Log Collectors

A

Collecting real-time log data within an organization’s network and bringing them together in a central location for better analysis

24
Q

Security Orchestration, Automation, and Response (SOAR)

A

Software solution that enables security teams to integrate and coordinate separate tools into streamlined threat response workflows

25
Q

SOAR - Orchestration

A

Connect many different tools together
Examples: firewalls, account management, email filters, etc.

26
Q

SOAR - Automation

A

Handle security tasks automatically

27
Q

SOAR - Response

A

Make changes immediately