Domain 7: Security Operations Flashcards
Alternate Site
A general term for a contingency or continuity of operations (COOP) site used to assume system or organizational operations if the primary site is not usable for period.
Backup
A copy of files and programs made to facilitate recovery, if necessary.
Baseline
The total inventory of all of a system’s components, including hardware, software, data, administrative controls, documentation, or user instructions.
Baselining
Creating a total inventory of a system, component by component, part by part.
Blocked Listing and Allowed Listing (software, identities, addresses)
Use of lists of blocked or allowed identities, whether as users, URLs, URIs, web addresses, IP addresses, geographic regions, hardware addresses, files, or programs, as a means of controlling (prohibiting or permitting) their access, use, or attempt to load and execute.
Change Management
The formal process an organization uses to transition from the current state to a future state. This typically includes mechanisms to request, evaluate, approve, implement, verify, and learn from the change.
Configuration Item
1.- An aggregation of information system components designated for configuration management (CM) and treated as a single entity in the CM process. 2.- Item or aggregation of hardware, software, or both, which is designated for configuration management and treated as a single entity in the CM process.
Configuration Management (CM)
A collection of activities focused on establishing and maintaining the integrity of information technology products and information systems, through control of processes for initializing, changing, and monitoring the configurations of those products and systems throughout the system development life cycle.
Cyber Forensics
The practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.
Disaster Recovery (DR)
The ability to provide IT services following an interruption, often at an alternate location.
Disruption
An unplanned event that causes an information system to be inoperable for a length of time (e.g., minor or extended power outage, extended unavailable network or equipment, or facility damage or destruction).
Egress Monitoring
Monitoring the flow of information out of an organization’s control boundaries.
Entity
Any form of user, such as a hardware device, software daemon, task, processing thread, or human, that is attempting to use or access systems resources. Endpoint devices, for example, are entities that human (or nonhuman) users make use of in accessing a system. Should be subject to access control and accounting. See also User and Entity Behavior Analysis.
Eradication
In incident response, the activities that remove the cause of the incident from the environment. This often requires the use of a formal root cause analysis process.
Event
Any observable occurrence in a network or system.
False Positive
Incorrectly classifying a benign activity, system state, or configuration as malicious or vulnerable.
Forensics, Cyber Forensics
The examination of evidence related to suspected criminal activity. Cyber forensics refers to investigations of such activities involving information systems.
Full Backup
Copies the entire system to backup media.
Hackback
Actions taken by a victim of hacking to compromise the systems of the alleged attacker.
Hardening
A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems, and software, including operating system, web server, application server, application. Hardening is normally performed based on industryguidelines and benchmarks such as those provided by the Center for Internet Security (CIS).
Honeypots/ Honeynets
Machines that exist on the network, but do not contain sensitive or valuable data; they are meant to distract and occupy malicious attackers or unauthorized intruders, as a means of delaying their attempts to access production data/assets. Several machines of this kind, linked together as a network or subnet, are referred to as a honeynet.
Hot Site
A fully operational offsite data processing facility equipped with hardware and software, to be used in the event of an information system disruption.
Incident
An event that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits.
Incident Response
The mitigation of violations of security policies and recommended practices.
Incident
The event that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits.
Indicator
A technical artifact or observable occurrence that suggests an attack is imminent or is currently underway, or that a compromise may have already occurred.
Indicators of Compromise (IoC)
A signal that an intrusion, malware, or other predefined hostile or hazardous set of events is occurring or has occurred.
Information Security Continuous Monitoring (ISCM)
Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. [Note: The terms “continuous” and “ongoing” in this context mean that security controls and organizational risks are assessed and analyzed at a frequency sufficient to support risk-based security decisions to adequately protect organization information.] Ongoing monitoring sufficient to ensure and assureeffectiveness of security controls related to systems, networks, and cyberspace, by assessing security control implementation and organizational security status in accordance with organizational risk tolerance, and within a reporting structure designed to make real-time, data-driven risk-management decisions.
Information Sharing and Analysis Center (ISAC)
Any entity or collaboration created or employed by public- or private-sector organizations, for purposes of gathering and analyzing critical cyber and related information to better understand security problems and interdependencies related to cyber systems, to ensure their availability, integrity, and reliability.
Intrusion
A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without having authorization to do so.
Intrusion Detection System (IDS)
A security service that monitors and analyzes network or system events for the purpose of finding and providing real-time or near-real-time warning of attempts to access system resources in an unauthorized manner.