Chapter 8 - Monitoring and Analysis Flashcards

1
Q

What are the two different types of Intrusion Detection Systems?

A

Network Based IDS
- Monitors network traffic

Host Based IDS
- Monitors a single host or server for malicious traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

A

IDS are NOT placed in line with network traffic, they simply monitor traffic using IDS agents.

IPS are place IN LINE with network traffic as they have functionality to detect and block traffic should they deem traffic to be malicious.

IPS can make network modifications to block/quarantine malicious traffic/host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are signature based detection methods?

A

Signature Based Detection methods are based on known signatures for malicious activity/behavior.

AV signatures are databases used to compare and identify indicators of maliciousness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Anomaly based detection methods?

A

Anomaly based detection or Behavior based detection utilizes Baseline Behavior patterns to detect signs of maliciousness.

Any behavior that significantly differs from baseline levels set by administrators are then raised with SOC teams for analysis.

Baseline Behavior is constantly updated to ensure proper detection are in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the techniques organizations use to detect unauthorized file changes?

A
  1. File Identity Checkers
    - Hashes are compared to previous hashes periodically to determine if a file has been altered.
  2. Unauthorized Connections
    - IDS monitor network traffic to determine if any new connections are not deemed to be authorized.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are honeypots?

A

Honeypots are essentially network traps to entice threat actors to try and gain access to them.

They are well monitored and are sandboxed to try and observe and new TTPs.

A honeynet is a network between two honeypot servers to try and mimic network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are vulnerability assessments?

A

Vulnerability Assessments tests an organization’s security countermeasures and controls against known vulnerabilities.

The aim if VA are to validate if controls are functions as intended along with trying to identify any gaps in countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 different test Pentest/VA test types?

A

White Box
- Conducted by internal testers with knowledge of systems and controls they are testing.

Black Box
- Conducted by external testers with no knowledge of controls and countermeasures put in place by the organization.

Grey Box
- Somewhere in the middle of both White and Black Box testing
- For example purple testing or security consultants testing a new application they have not seen before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Infrastructure Security Configurations Reviews?

A

Infrastructure Security Configuration Reviews aims to review whether appropriate system hardening are in place along with ensuring that assets are configured based on agreed upon security policies.

Typical things reviewed are:

  • Network Vulnerabilities
  • System Hardening
  • Security Border Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the steps involved with Vulnerability Assessments?

A
  1. Organization Permission
  2. Discovery and Reconnaissance
  3. Result Analysis
  4. Result Documentation
  5. Recommend methods to reduce vulnerabilities
  6. Present Recommendations
  7. Remediate Vulnerabilities
  8. Validate Remediation
  9. Audit Remediation periodically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does penetration tests differ to vulnerability assessments?

A

Pen Tests goes further than VA as they actively try to exploit the identified vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly