Deck2 Flashcards
The process through which data generated in the ongoing use of information systems is collected, processed, analyzed, and disseminated to provide insights into the security status of those systems
Security Intelligence
Structured Threat Information eXpression (STIX)
A standard terminology for IoCs and ways of indicating relationships between them that is included as part of the OASIS Cyber Threat Intelligence (CTI) framework STIX is expressed in JavaScript Object Notation (JSON) format that consists of
attribute: value pairs
Trusted Automated eXchange of Indicator Information (TAXII)
A protocol for supplying codified information to automate incident detection and
analysis
OpenIOC
A framework by Mandiant that uses XML-formatted files for supplying codified information to automate incident detection and analysis
Malware Information Sharing Project (MISP)
MISP provides a server platform for cyber threat intelligence sharing, a
proprietary format, supports OpenIOC definitions, and can import and export STIX over TAXII
whois
A public listing of all registered domains and their registered administrators
Switched Port Analyzer (SPAN)
Allows for the copying of ingress and/or egress communications from one or more switch ports to another
Domain Generation Algorithm (DGA)
A method used by malware to evade blacklists by generating domain names for
C&C networks dynamically
The principle method used with HTTP and is used to retrieve a resource
GET
Used to send data to the server for processing by the requested resource
POST
Creates or replaces the requested resource
PUT
Used to remove the requested resource
DELET
Retrieves the headers for a resource only and ignores the body
HEAD
200
Indicates a successful GET or POST request (OK)
3xx
Any code in this range indicates that a redirect has occurred by the server
4xx
Any code in this range indicates an error in the client request
403
Indicates that a request did not have sufficient permissions
404
Indicates that a request did not have sufficient permissions
5xx
Any code in this range indicates a server-side issue
Percent Encoding
A mechanism to encode 8-bit characters that have specific meaning in the context of URLs, also known as URL encoding
Firewall logs can provide you with four types of useful security data
Connections that are permitted or denied
Port and protocol usage in the network
Bandwidth utilization with the duration and volume of usage
An audit log of the address translations (NAT/PAT) that occurred
Reverse Proxy
A type of proxy server that protects servers from direct contact
with client requests