Domain 7: Security Operations Flashcards

1
Q

Alternate Site

A

A general term for a contingency or continuity of operations (COOP) site used to assume system or organizational operations if the primary site is not usable for period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backup

A

A copy of files and programs made to facilitate recovery, if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline

A

The total inventory of all of a system’s components, including hardware, software, data, administrative controls, documentation, or user instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baselining

A

Creating a total inventory of a system, component by component, part by part.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blocked Listing and Allowed Listing (software, identities, addresses)

A

Use of lists of blocked or allowed identities, whether as users, URLs, URIs, web addresses, IP addresses, geographic regions, hardware addresses, files, or programs, as a means of controlling (prohibiting or permitting) their access, use, or attempt to load and execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change Management

A

The formal process an organization uses to transition from the current state to a future state. This typically includes mechanisms to request, evaluate, approve, implement, verify, and learn from the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configuration Item

A

1.- An aggregation of information system components designated for configuration management (CM) and treated as a single entity in the CM process. 2.- Item or aggregation of hardware, software, or both, which is designated for configuration management and treated as a single entity in the CM process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Configuration Management (CM)

A

A collection of activities focused on establishing and maintaining the integrity of information technology products and information systems, through control of processes for initializing, changing, and monitoring the configurations of those products and systems throughout the system development life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber Forensics

A

The practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disaster Recovery (DR)

A

The ability to provide IT services following an interruption, often at an alternate location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disruption

A

An unplanned event that causes an information system to be inoperable for a length of time (e.g., minor or extended power outage, extended unavailable network or equipment, or facility damage or destruction).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Egress Monitoring

A

Monitoring the flow of information out of an organization’s control boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Entity

A

Any form of user, such as a hardware device, software daemon, task, processing thread, or human, that is attempting to use or access systems resources. Endpoint devices, for example, are entities that human (or nonhuman) users make use of in accessing a system. Should be subject to access control and accounting. See also User and Entity Behavior Analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Eradication

A

In incident response, the activities that remove the cause of the incident from the environment. This often requires the use of a formal root cause analysis process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Event

A

Any observable occurrence in a network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

False Positive

A

Incorrectly classifying a benign activity, system state, or configuration as malicious or vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Forensics, Cyber Forensics

A

The examination of evidence related to suspected criminal activity. Cyber forensics refers to investigations of such activities involving information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Full Backup

A

Copies the entire system to backup media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hackback

A

Actions taken by a victim of hacking to compromise the systems of the alleged attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hardening

A

A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems, and software, including operating system, web server, application server, application. Hardening is normally performed based on industryguidelines and benchmarks such as those provided by the Center for Internet Security (CIS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Honeypots/ Honeynets

A

Machines that exist on the network, but do not contain sensitive or valuable data; they are meant to distract and occupy malicious attackers or unauthorized intruders, as a means of delaying their attempts to access production data/assets. Several machines of this kind, linked together as a network or subnet, are referred to as a honeynet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hot Site

A

A fully operational offsite data processing facility equipped with hardware and software, to be used in the event of an information system disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Incident

A

An event that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Incident Response

A

The mitigation of violations of security policies and recommended practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Incident

A

The event that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Indicator

A

A technical artifact or observable occurrence that suggests an attack is imminent or is currently underway, or that a compromise may have already occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Indicators of Compromise (IoC)

A

A signal that an intrusion, malware, or other predefined hostile or hazardous set of events is occurring or has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Information Security Continuous Monitoring (ISCM)

A

Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. [Note: The terms “continuous” and “ongoing” in this context mean that security controls and organizational risks are assessed and analyzed at a frequency sufficient to support risk-based security decisions to adequately protect organization information.] Ongoing monitoring sufficient to ensure and assureeffectiveness of security controls related to systems, networks, and cyberspace, by assessing security control implementation and organizational security status in accordance with organizational risk tolerance, and within a reporting structure designed to make real-time, data-driven risk-management decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Information Sharing and Analysis Center (ISAC)

A

Any entity or collaboration created or employed by public- or private-sector organizations, for purposes of gathering and analyzing critical cyber and related information to better understand security problems and interdependencies related to cyber systems, to ensure their availability, integrity, and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Intrusion

A

A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without having authorization to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Intrusion Detection System (IDS)

A

A security service that monitors and analyzes network or system events for the purpose of finding and providing real-time or near-real-time warning of attempts to access system resources in an unauthorized manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Intrusion Prevention Systems (IPS)

A

A security service that uses available information to determine if an attack is underway; it then sends alerts but also blocks the attack from reaching its intended target.

33
Q

Log

A

A record of actions and events that have taken place on a computer system.

34
Q

Precursor(s)

A

Signals from events that suggest a possible change of conditions (internal orexternal to the organization) may alter the current threat landscape. An increase in tensions in local political or social environments, or complaints or grievances by employees or customers going viral in social media, are examples of precursors.

35
Q

Provisioning

A

Taking a particular configuration baseline, making additional or modified copies of it, then taking steps as necessary to properly place those copies into the environments they should belong in.

36
Q

Ransom Attack

A

Any form of attack that threatens the destruction, denial, or unauthorized public release or remarketing of private information assets. Usually involves encrypting these assets and withholding the decryption key until the ransom is paid by the victim.

37
Q

Ransomware

A

Malware used for the purpose of facilitating a ransom attack.

38
Q

Recovery

A

The process of jointly addressing business resiliency and restoration of critical infrastructure and functionality after a disruption.

39
Q

Regression Testing

A

Testing of a system to ascertain whether recently approved modifications have changed its performance of other approved functions or has introduced other unauthorized behaviors.

40
Q

Remediation

A

Changes to a system’s configuration to immediately limit or reduce the chance of recurrence of an incident. This might include updating the sensitivities, thresholds, or alarm settings on any number of security controls, or instituting a rapid reset of access controls information such as passwords and security challenge responses.

41
Q

Request for Change (RFC)

A

The documentation of a proposed change in support of change management activities.

42
Q

Root Cause Analysis

A

A principle-based, systems approach for the identification of underlying causes associated with a particular set of risks or incidents.

43
Q

Sandbox

A

A testing environment that is logically, physically, or virtually isolated fromother environments, and in which applications or systems can be evaluated. Sandboxes can be used as part of development, integration, or acceptance testing (so as to not interact with the production environments), as part of malware screening, or as part of a honeynet.

44
Q

Threat Intelligence

A

Threat information that has been aggregated, transformed, analyzed, interpreted, or enriched to provide the necessary context for decision-making processes.

45
Q

User and Entity Behavior Analytics (UEBA)

A

Analysis of behaviors and activities of human and nonhuman users, and of the software and hardware entities associated with those users and activities, as a way of detecting inappropriate or unauthorized activity, including fraud detection, malware, and insider attacks.

46
Q

Vulnerability Management

A

The activities necessary to identify, assess, prioritize, and remediate information system weaknesses.

47
Q

secure facility plan

A

A guide that outlines the security needs of your organization and
emphasizes methods or mechanisms to employ to provide security. Such a plan is developed
through risk assessment and critical path analysis.

48
Q

critical path analysis

A

A systematic effort to identify relationships between mission-critical
applications, processes, and operations and all the necessary supporting elements.

49
Q

technology convergence

A

The tendency for various technologies, solutions, utilities, and
systems to evolve and merge over time. Often this results in multiple systems performing
similar or redundant tasks or one system taking over the features and abilities of another.
Though in some instances this can result in improved efficiency and cost savings, it can also
represent a single point of failure and become a more valuable target for malicious hackers
and intruders.

50
Q

industrial camouflage

A

The attempt to mask or hide the actual function, purpose, or operations of a facility by providing a façade presenting a believable or convincing alternative.

51
Q

crime prevention through environmental design (CPTED)

A

Guidelines that encourage
architects and build-out designers to improve security through building elements. The concept of designing the structure of the physical environment and surroundings to influence
individual decisions that potential offenders make before committing any criminal acts.
This includes taking advantage of natural surveillance, access control, and territorial reinforcements.

52
Q

natural access control

A

A crime prevention through environmental design (CPTED) concept of the subtle guidance of those entering and leaving a building through placement of
entranceways, use of fences and bollards, and placement of lights.

53
Q

natural surveillance

A

The crime prevention through environmental design (CPTED)
concept that involves any means to make criminals feel uneasy through the increase of
opportunities for them to be observed. This can be accomplished by an open and obstaclefree outside area, especially around entrances, with clear lines of sight.

54
Q

natural territorial reinforcement

A

The crime prevention through environmental design
(CPTED) concept where there is an attempt to make the area feel like an inclusive, caring
community. The area should be designed so that it looks cared for and respected and that it is actively being defended.

55
Q

administrative physical security controls

A

Security controls that include facility
construction and selection, site management, personnel controls, awareness training, and
emergency response and procedures.

56
Q

cable plant management policy

A

The policy governing the collection of interconnected
cables and intermediary devices (such as cross-connects, patch panels, and switches) that
establish the physical network.

57
Q

transponder proximity device

A

A mechanism that is self-powered and transmits a signal received by the reader. This can occur consistently or only at the press of a button (like a garage door opener or car alarm key fob). Such devices may have batteries or capacitors, or may even be solar powered.

58
Q

proximity reader

A

A passive device, field-powered device, or transponder that detects the
presence of authorized personnel and grants them physical entry into a facility. The proximity
device is worn or held by the authorized bearer. When they pass a proximity reader, the
reader is able to determine who the bearer is and whether they have authorized access.

59
Q

proximity device, proximity card

A

A security device used to manage or control physical
access. It can be a passive device, a field-powered device, or a transponder.

60
Q

passive proximity device

A

A mechanism that has no active electronics; it is just a small
magnet with specific properties (like antitheft devices commonly found in or on retail product packaging). A passive device reflects or otherwise alters the electromagnetic (EM) field
generated by the reader device. This alteration is detected by the reader device, which triggers
the alarm, records a log event, or sends a notification.

61
Q

sensitive compartmented information facility (SCIF)

A

A secure or restricted work area
often used by government and military agencies, divisions, and contractors to provide a secure environment for highly sensitive data storage and computation. The purpose of an
SCIF is to store, view, and update sensitive compartmented information (SCI), which is a type of classified information

62
Q

transient noise

A

A short duration of line noise disturbance.

63
Q

radio frequency interference (RFI), radio-frequency interference

A

The by-product of
electrical processes, similar to electromagnetic interference (EMI). The major difference is
that RFI is usually projected across a radio spectrum.

64
Q

electromagnetic interference (EMI)

A

The interference that can occur during transmissions over copper cable due to electromagnetic energy outside the cable. The result is degradation or loss of the signal. A type of electrical noise that can do more than just cause problems with how equipment functions; it can also interfere with the quality of communications, transmissions, and playback.

65
Q

rate-of-rise detection

A

A fire detection system that detects the fire and triggers the release
of the suppression medium when the speed at which the temperature changes reaches a
specific level or rate. These are often digital temperature measuring devices, which can be
fooled by HVAC heating during winter months and thus are not widely deployed.

66
Q

flame-actuated detection

A

A fire detection system that detects a fire and triggers the
release of the suppression medium based on the detection of the infrared energy of flames.
This mechanism is fast and reliable but often fairly expensive. Thus, it is often only used in
high-risk environments.

67
Q

fixed-temperature detection

A

A fire detection system that detects a fire and triggers the release of the suppression medium when a specific temperature is reached. This is the most common type of detector and present in most office buildings. The potentially visible sprinkler head serves as both the detection and release mechanism. The trigger is usually a metal or plastic component that is in the sprinkler head and melts at a specific temperature.

68
Q

smoke-actuated detection

A

A fire detection system that detects the fire and triggers the release of the suppression medium when smoke is detected using either photoelectric or radioactive ionization sensors as triggers. Either method monitors for light or radiation obstruction or reduction across an air gap caused by particles in the air. It is intended to be triggered by smoke, but dust and steam can sometimes trigger the alarm.

69
Q

wet pipe system

A

A fire suppression system that is always full of water. Water discharges
immediately when triggered by a fire or smoke. Aka a closed head system.

70
Q

deluge system

A

Another form of dry pipe (fire suppression) system that uses larger pipes
and therefore a significantly larger volume of water. Deluge systems are inappropriate for
environments that contain electronics and computers.

71
Q

preaction system

A

A combination dry pipe/wet pipe system. The system exists as a dry pipe until the initial stages of a fire (smoke, heat, and so on) are detected, and then the pipes are filled with water.

72
Q

dry pipe system

A

A fire suppression system that contains compressed air. Once suppression
is triggered, the air escapes, which opens a water valve that in turn causes the pipes to fill and discharge water into the environment.

73
Q

gas discharge system

A

A fire suppression system that releases a gas to extinguish the fire.

74
Q

nuisance alarm rate (NAR)

A

False positives from animals or foliage on Area Perimeter Intrusion Detection Assessment System (PIDAS) fences

75
Q

perimeter intrusion detection and assessment system (PIDAS)

A

A fence system that has two or three fences used in concert to optimize security. PIDAS fencing is often present around military locations and prisons. Typically, a PIDAS fence has one tall main fence, which may be 8 to 20 feet tall. The main fence may be electrified, may have barbed wire/razor wire elements, and/or can include touch detection technologies. This main fence is then
surrounded by an outside fence, which may only be 4 to 6 feet tall. The purpose of this outerfence is to keep animals and casual trespassers from accessing the main fence.

76
Q

access control vestibule

A

A double set of doors that is often protected by a guard. The
purpose is to contain a subject until their identity and authentication are verified. Previously
known as a mantrap.

77
Q

bollard

A

A physical security mechanism designed to prevent vehicles from driving into buildings or other secured areas. See barricades. Aka security bollard.

78
Q

occupant emergency plans (OEP)

A

A guide that assists with sustaining personnel safety in the wake of a disaster. The OEP provides guidance on how to minimize threats to life, prevent injury, manage duress, handle travel, provide for safety monitoring, and protect property from damage due to a destructive physical event.

79
Q
A