Chapter 8 - Monitoring and Analysis Flashcards
What are the two different types of Intrusion Detection Systems?
Network Based IDS
- Monitors network traffic
Host Based IDS
- Monitors a single host or server for malicious traffic
What is the difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
IDS are NOT placed in line with network traffic, they simply monitor traffic using IDS agents.
IPS are place IN LINE with network traffic as they have functionality to detect and block traffic should they deem traffic to be malicious.
IPS can make network modifications to block/quarantine malicious traffic/host.
What are signature based detection methods?
Signature Based Detection methods are based on known signatures for malicious activity/behavior.
AV signatures are databases used to compare and identify indicators of maliciousness.
What are Anomaly based detection methods?
Anomaly based detection or Behavior based detection utilizes Baseline Behavior patterns to detect signs of maliciousness.
Any behavior that significantly differs from baseline levels set by administrators are then raised with SOC teams for analysis.
Baseline Behavior is constantly updated to ensure proper detection are in place.
What are some of the techniques organizations use to detect unauthorized file changes?
- File Identity Checkers
- Hashes are compared to previous hashes periodically to determine if a file has been altered. - Unauthorized Connections
- IDS monitor network traffic to determine if any new connections are not deemed to be authorized.
What are honeypots?
Honeypots are essentially network traps to entice threat actors to try and gain access to them.
They are well monitored and are sandboxed to try and observe and new TTPs.
A honeynet is a network between two honeypot servers to try and mimic network traffic.
What are vulnerability assessments?
Vulnerability Assessments tests an organization’s security countermeasures and controls against known vulnerabilities.
The aim if VA are to validate if controls are functions as intended along with trying to identify any gaps in countermeasures.
What are the 3 different test Pentest/VA test types?
White Box
- Conducted by internal testers with knowledge of systems and controls they are testing.
Black Box
- Conducted by external testers with no knowledge of controls and countermeasures put in place by the organization.
Grey Box
- Somewhere in the middle of both White and Black Box testing
- For example purple testing or security consultants testing a new application they have not seen before.
What are Infrastructure Security Configurations Reviews?
Infrastructure Security Configuration Reviews aims to review whether appropriate system hardening are in place along with ensuring that assets are configured based on agreed upon security policies.
Typical things reviewed are:
- Network Vulnerabilities
- System Hardening
- Security Border Controls
What are the steps involved with Vulnerability Assessments?
- Organization Permission
- Discovery and Reconnaissance
- Result Analysis
- Result Documentation
- Recommend methods to reduce vulnerabilities
- Present Recommendations
- Remediate Vulnerabilities
- Validate Remediation
- Audit Remediation periodically
How does penetration tests differ to vulnerability assessments?
Pen Tests goes further than VA as they actively try to exploit the identified vulnerability.