Chapter 1.7 - Security Assessments Flashcards
Summarize techniques used in security assessments
Threat Hunting
The practice of proactively searching for cyber threats that are lurking undetected in a network
Intelligence Fusion
Combining pieces of information to produce higher-quality information, knowledge, and understanding
Maneuver
Application of force to capture, disrupt, deny, degrade, destroy or manipulate computing and information resources in order to achieve a position of advantage in respect to competitors
Vulnerability Scans
Scanning used to discover the weaknesses of a given system
False Positive Scans
A vulnerability that was identified but doesn’t really exist
False Negatives Scans
A vulnerability exists, but wasn’t detected
Vulnerability Scan Log Review
The process of discovering, analyzing, and reporting on security flaws and vulnerabilities of what the scanner picked up
Credentialed Scans vs. Non-credentialed Scans
Credentialed scans - normal user, emulating an insider attack
Non-credentialed scans - The scanner can’t login to the remote device
Intrusive Scans vs. Non-intrusive Scans
Intrusive scans - You’ll try out the vulnerability to see if it works
Non-intrusive scans - Gather information, don’t try to exploit a vulnerability
Application Scans
Desktop, mobile apps
Web Application Scans
Software on a web server
Network Scans
Misconfigured firewalls, open ports, vulnerable devices
Common Vulnerabilities and Exposures (CVE)/ Common Vulnerability Scoring System (CVSS)
Provides a reference method for publicly known information-security vulnerabilities and exposures
Configuration Review
Validating the security of device configurations
Security Information and Event Management (SIEM)
Logging of security events and information