Domain 7, Security Operations Flashcards
BCP
Business continuity Plan. Long term plan to ensure the continuity of business ops.
Collusion
agreement between 2+ individuals to subvert sec system.
Continuity of Operations Plan - COOP
Plan to maintain ops during a disaster.
Disaster
Disruptive event that interrupts normal system operations
Disaster recovery plan DRP
Short term plan to recover from a disruptive event.
MTBF
Mean time between failures
MTTR
Mean time to repair/recover
Mirroring
RAID - Duplication of data to another disk
RAID
Redundant array of inexpensive disks
Striping
Spread data across multiple disks.
Slack space
Unused space that is leftover when a File of X-1 size was given space of X
Bad Blocks/Clusters
Unusable sectors
Live forensics
Seeing what’s in live memory
Meterpreter
Power metasploit payload
Network forensics
study of data in motion.
Forensic software analysis
deconstruct malware and software. Use a VM to detonate Malware
EMbedded Device Forensics
IoT and Other Handheld devices
Electronic Discovery
Help lawyers with discovery process via Electronic Discovery tools
CSIRT
Computer Security Incident Response Team
800-61r2
NIST Incident Handling Guide
4 step lifecycle
800-61r2 lifecycle Step 1
Prep
800-61r2 lifecycle Step 2
Detection and Analysis
800-61r2 lifecycle Step 3
Containment, Eradication, and recovery
800-61r2 Step 4
Post-incident Activity
IR MGMT Step 1
Prep
Training, policies, procedures, checklist
IR MGMT Step 2
Detection, AKA identification
Events—> Incident
IR MGMT Step 3
Response
IR MGMT Step 4
Mitigation, aka Eradication
Root Cause Analysis
Get rid of the bad things
IR MGMT Step 5
Reporting
Not really a step, this happens throughout the process
IR MGMT Step 6
Recovery
Restore systems and ops
Increase monitoring
IR MGMT Step 7
remediation - long term strategic activity designed to eradicate root cause for identified incidient.
IR MGMT Step 8
Lessons Learned. Shoudl be documented in a formal process, and assigned as action items with accountability
Intrusion Detection System
Detects intrusions
IDS True Positive
alerts on an actual issue
IDS True Negative
doesn’t alarm on something that it doesn’t need to alarm on.
IDS False positive
Trips on something that it shouldn’t on.
IDS False Negative
Doesn’t trip on something it should trip on.
NIDS NIPS
Network intrusion detection,
Network intrusion prevention system
HIDS HIPS
Host Intrusion detection
Host intrusion prevention
Knowledge-based IDS/IPS
AKA Signature based, AKA Pattern-matching
-compares events to static signatures of known attacks.
Behavior-based IDS/IPS
Creates a baseline for what activities/events are considered normal. Once baseline is determined, it can now detect ‘abnormal’ activities
Anomaly detection
Finds a baseline of normal traffic, then anomaly detection IDS ignores normal traffic.
Will alert when it sees odd traffic.
Continuous monitoring
ASsessing and reassessing as an ongoing process
DLP
data loss prevention.
class of solutions used to detect and prevent data from leaving the org
Application Whitelisting
Only run what is permitted
Sandboxing
Separate running programs, in an effort to mitigate system failures from spreading.
Test untested or untrusted programs.
Detonate malware in a VM.
Asset/Configuration management
Hardened baselines and configs.
Establishes the baseline of an information technology environment that includes a secure baseline
Baselining
Capture a snapshot of the current system security config. Establishes an easy means for capturing the current system config.
Vulnerability management
scan in a way to discover poor configs and missing patches in an environment, with an emphasis on managing those vulnerabilities.
Zero day vulnerability
no identified patch or workaround.
Zero day exploit
Exploit methods is/are available for a vulnerability which has yet to be patched.
Change management
Track and audit changes to configuration files. Assess risks of changes.
SLA
Service level agreement
Stipulate all expectations regarding behavior of the department or organizations.
Orgs must negotiate all secure terms of service lvl agreement
Full Backup
Complete copy. Duplicates every file regardless of the archive bit. Once complete, archive bit on every file is reset, turned off, or set to 0.
Incremental backup
archives files that have changes since last full or incremental backup. Only files that have the archive bit turned on (set to 1) are duplicated. Once complete, archive bit on every file is reset, turned off, or set to 0.
Differential Backup
archives files that have changes since last full (but NOT INCREMENTAL) backup. Only files that have the archive bit turned on (set to 1) are duplicated. DOES NOT CHANGE ARCHIVE BIT once done.
RAID 0
Stripes two or more disks to improve performance, but NOT fault tolerance.
RAID 1
Mirrors, uses two disks both with the same exact data. Provides fault tolerance. Lower write speeds, but potentially higher read speeds.
RAID 3
NOT IN CBK. Byte level striping with dedicated parity