Chapter 1.7 - Security Assessments Flashcards
Summarize techniques used in security assessments
Threat Hunting
The practice of proactively searching for cyber threats that are lurking undetected in a network
Intelligence Fusion
Combining pieces of information to produce higher-quality information, knowledge, and understanding
Maneuver
Application of force to capture, disrupt, deny, degrade, destroy or manipulate computing and information resources in order to achieve a position of advantage in respect to competitors
Vulnerability Scans
Scanning used to discover the weaknesses of a given system
False Positive Scans
A vulnerability that was identified but doesn’t really exist
False Negatives Scans
A vulnerability exists, but wasn’t detected
Vulnerability Scan Log Review
The process of discovering, analyzing, and reporting on security flaws and vulnerabilities of what the scanner picked up
Credentialed Scans vs. Non-credentialed Scans
Credentialed scans - normal user, emulating an insider attack
Non-credentialed scans - The scanner can’t login to the remote device
Intrusive Scans vs. Non-intrusive Scans
Intrusive scans - You’ll try out the vulnerability to see if it works
Non-intrusive scans - Gather information, don’t try to exploit a vulnerability
Application Scans
Desktop, mobile apps
Web Application Scans
Software on a web server
Network Scans
Misconfigured firewalls, open ports, vulnerable devices
Common Vulnerabilities and Exposures (CVE)/ Common Vulnerability Scoring System (CVSS)
Provides a reference method for publicly known information-security vulnerabilities and exposures
Configuration Review
Validating the security of device configurations
Security Information and Event Management (SIEM)
Logging of security events and information
Syslog
Standard for message logging (integrated in SIEM)
SIEM - Packet Capture
Can intercept and log traffic that passes over a computer network or part of a network
SIEM - Data Inputs
Server authentication attempts
VPN connections
Firewall log sessions
Denied outbound traffic flows
Network utilizations
SIEM - User and Entity Behavior Analysis (UBEA)
Cybersecurity solution that uses algorithms and machine learning to detect anomalies in the behavior of not only the users in a corporate network but also the routers, servers, and endpoints in that network
SIEM - Sentiment Analysis
The process of analyzing digital text to determine if the emotional tone of the message is positive, negative, or neutral
SIEM - Security Monitoring
Automated process of collecting and analyzing indicators of potential security threats, then triaging these threats with appropriate action
SIEM - Log Aggregation
Mechanism for capturing, normalizing, and consolidating logs from different sources to a centralized platform for correlating and analyzing the data
SIEM - Log Collectors
Collecting real-time log data within an organization’s network and bringing them together in a central location for better analysis
Security Orchestration, Automation, and Response (SOAR)
Software solution that enables security teams to integrate and coordinate separate tools into streamlined threat response workflows
SOAR - Orchestration
Connect many different tools together
Examples: firewalls, account management, email filters, etc.
SOAR - Automation
Handle security tasks automatically
SOAR - Response
Make changes immediately