CISSP ch 17 Flashcards
Incident
any event that has a negative effect on the confidentiality, integrity or availability of an organization’s assets
security incident
an incident that is the result of an attack or the result of malicious or intentional actions on the part of users
Incident management steps (7)
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons learned
CIRT or CSIRT
Computer incident response team
Computer security incident response team
the designated incident response team
Preventive control
attempts to thwart or stop unwanted or unauthorized activity from occurring
E.g., fences, locks, biometrics, separation of duties policies, job rotation policies, data classification, access control methods, encryption, smart cards, callback procedures, security policies, security awareness training, antivirus software, firewalls and intrusion preventions systems
Detective control
attempts to discover or detect unwanted or unauthorized activity; operate after the fact
E.g., security guards, motion detectors, recording and reviewing events captured by security cameras or closed circuit television (CCTV), job rotation policies, mandatory vacation policies, audit trails, honeypots or honeynets, intrusion detection systems, violation reports, supervision and reviews of users and incident investigations
C2 server / C&C
command and control server (botnet)
DRDoS
distributed reflective denial-of-service = uses a reflected approach to an attack; doesn’t attack the victim directly but instead manipulates traffic or a network service so that the attacks are reflected back to the victim from other sources
E.g., DNS poisoning attacks, smurf attacks and fraggle attacks
SYN flood attack
a common DoS attack = disrupts the standard three-way handshake used by the Transmission Control Protocol (TCP) to initiate the communication sessions = attackers send multiple SYN packets but never complete the connection with an ACK
TCP reset attack
spoofing the source IP address in a RST packet (reset) to disconnect active sessions
Smurf attack
another type of flood attack, but it floods the victim with Internet Control Message Protocol (ICMP) each packets instead of with TCP SYN packets = a spoofed broadcast ping request using the IP address of the victim as the source IP address
fraggle attack
similar to smurf attacks, but instead of using ICMP, uses UDP packets over UDP ports 7 and 19 = will broadcast a UDP packet using the spoofed IP address of the victim, all systems on the network will then send traffic to the victim
Ping flood attack
floods a victim with ping requests (e.g., sent from a botnet)
MiTM attack
man-in-the-middle attack = on-path attack
IDS
Intrusion detection system = automates the inspection of logs and real-time system events to detect intrusion attempts and system failures
IDPS
Intrusion detection and prevention system
IPS
Intrusion prevention system = placed inline with traffic
Knowledge/signature based detection
pattern-matching detection = uses signatures similar to the signature definitions used by antimalware software
Low false positive rate
Only effective against known attack methods
Behavior based detection
statistical intrusion detection = anomaly detection = heuristics-based detection = doesn’t use signatures, instead compares activity against baseline of normal performance to detect abnormal behavior
NOCs
network operations centers
a centralized location where computer, telecommunications, or satellite networks systems are monitored and managed 24x7
HIDS
host-based IDS = monitors a single computer or host