Domain 7: Security Operations Flashcards
Review operational security terms covering monitoring, response, and recovery processes.
Define:
3-2-1 Backup Strategy
A recommended backup protocol that involves keeping three copies of data on two different storage mediums, with one copy stored off-site for disaster recovery.
A best practice for data protection and disaster recovery, recommending three copies of data stored on two different types of storage media, with one of the copies stored off-site. This strategy offers multiple recovery points and storage diversity to increase the likelihood of data recovery after a disaster, ensuring data safety even when faced with hardware failure, natural disaster, or accidental deletion.
For more information, view this lecture on Backups. Or visit this Wikipedia page.
Define:
Acceptable Interruption Window
The defined duration that a system or service can afford to be offline without causing significant disruption to business operations, crucial in delineating RTO metrics.
This refers to the maximum time period during which a system or service can be down without causing unacceptable harm to the operations or the business. It is a key factor in disaster recovery and business continuity planning, as it helps to set the recovery time objective (RTO). Understanding the acceptable interruption window is crucial for managing downtime risks and ensuring appropriate investment in preventative and recovery measures.
Or visit this Wikipedia page.
Define:
Active Recovery Site (Mirrored)
A real-time replica of the primary site for disaster recovery, ensuring business continuity with minimal downtime.
A disaster recovery site that is a real-time replica of the primary site, continually updated with data and transactions from the primary site. In the event of a system disruption or failure at the primary site, the active recovery site can take over almost instantly, ensuring business continuity with minimal downtime. This high-availability solution is crucial for organizations that cannot tolerate significant data loss or downtime.
For more information, view this lecture on Disaster Recovery sites. Or visit this Wikipedia page.
Define:
Advanced Persistent Threat
(APT)
A sophisticated and stealthy cyberattack campaign aimed at specific entities to steal data or disrupt operations, often conducted by nation-states or their proxies.
A sophisticated, systematic, and long-term cyberattack campaign that targets specific entities with the intent to steal information or disrupt operations. APTs are typically conducted by nation-states or state-sponsored groups and are characterized by their stealth and persistence. These attackers use a variety of techniques to gain access to a network, maintain a foothold, and exfiltrate data without being detected over extended periods. APTs require a high degree of expertise and resources to conduct and are considered a significant threat to national security, large corporations, and critical infrastructure.
Or visit this Wikipedia page.
Define:
Alternate Facilities
Pre-arranged secondary sites that an organization can operate from if primary facilities are unusable, ensuring business continuity during disruptions.
Secondary operational sites pre-arranged to be used if primary facilities become unusable due to disasters, system failures, or other disruptions. These facilities are part of an organization’s business continuity and disaster recovery planning, ensuring that critical business functions can continue with minimal downtime. Alternate facilities can range from cold sites (no equipment) to hot sites (fully equipped and ready to operate), and mirror the technology and capabilities of the primary sites to various extents based on the organization’s recovery requirements.
For more information, view this lecture on Site selection- Part 1. Or visit this Wikipedia page.
Define:
Alternate Process
A backup method for performing tasks when the primary process is unavailable, often part of disaster recovery to maintain operations during security incidents.
A secondary method or procedure that can be used to perform a task or operation when the primary process is unavailable or compromised. In a security context, this could refer to an alternative way of accessing a system, processing data, or communicating information when the usual method is disrupted. An alternate process is often part of a larger contingency or disaster recovery plan, aiming to maintain business operations during and after a security incident.
For more information, view this lecture on Developing our BCP and DRP. Or visit this Wikipedia page.
Define:
Anomaly
An occurrence deviating from the norm, which in security can signal a potential issue like a malware infection, intrusion attempt, or insider threat.
Refers to any event, behavior, or state that deviates from an established baseline or norm. In the context of security, an anomaly could indicate a potential security incident, such as unusual network traffic, abnormal user behavior, or unexpected changes in system configuration. Anomalies aren’t necessarily malicious or negative, but they can be indicative of security issues such as malware infections, intrusion attempts, or insider threats.
Define:
Anomaly Detection
A security technique for identifying unusual patterns or behaviors against a ‘normal’ baseline, signaling potential threats, often used in IDS/IPS and SIEM systems.
A technique used in security to identify unusual patterns or behaviors that may indicate a potential threat. This could involve statistical methods, machine learning algorithms, or other techniques to establish a ‘normal’ baseline and then identify deviations from this baseline. Anomaly detection can be used in many areas of security, from network monitoring to fraud detection to user behavior analytics. It’s an essential component of many intrusion detection or protection systems (IDS/IPS) and security information and event management (SIEM) solutions.
Or visit this Wikipedia page.
Define:
Anonymity
The state of being unidentifiable within a context, allowing individuals to communicate without fear of retribution or scrutiny, important for secure communications.
The state of being unidentified or untraceable within a context or a set of data. Anonymity is highly valued in various scenarios, such as whistleblowing, secure browsing, or privacy-preserving communications, as it allows individuals to interact or share information without fear of retribution or unwarranted scrutiny.
Or visit this Wikipedia page.
Define:
Application Aware Devices
Devices that identify and act on specific applications and their data in a network, providing detailed control and visibility for security and performance management.
These are devices that can identify, analyze, and act on specific applications and their data within a network. They are used in network security and performance management to provide granular visibility and control over applications. Examples include firewalls, load balancers, and intrusion prevention systems.
Define:
Application Containerization
Encapsulating applications in isolated containers with their operating environments to improve security, portability, and resource efficiency.
A lightweight alternative to full machine virtualization that involves encapsulating an application in a container with its own operating environment. This provides a high level of isolation between individual applications, ensuring that each can run without interfering with others, thereby improving security, portability, and efficiency.
For more information, view this lecture on Hardware architecture- Part 2. Or visit this Wikipedia page.
Define:
Application Proxy
A type of software that acts as an intermediary between a client and a server, enhancing security and performance by providing a protective layer for the client.
A type of software that acts as an intermediary between a client and a server in order to provide security, performance, and functionality to the client. It is commonly used in network security to protect against cyber threats and to improve network performance. Examples of application proxies include web proxy, FTP proxy, and SOCKS proxy.
Or visit this Wikipedia page.
Define:
Arbitrary Code Execution
A critical security vulnerability that allows an attacker to execute unauthorized code on a system, potentially leading to system compromise and unauthorized access.
A security vulnerability that allows an attacker to run unauthorized code on a system or network. It can lead to a full system compromise and is a critical threat to cybersecurity. Examples include exploitation through software vulnerabilities such as buffer overflows or injection flaws.
Or visit this Wikipedia page.
Define:
Archive Bit
A file or directory attribute that indicates whether it has been modified since the last backup, used to identify which files need to be included in the next backup operation.
A flag or attribute associated with a file or directory that indicates whether it has been modified since the last time it was backed up. The archive bit is commonly used in backup software to identify which files need to be copied or transferred to a storage device.
For more information, view this lecture on Backups. Or visit this Wikipedia page.
Define:
Artificial Intelligence
(AI)
The simulation of human-like intelligence and cognitive functions by machines, used in IT and Cybersecurity to automate tasks and improve threat detection and response.
A field of computer science focused on creating systems or machines that display human-like intelligence and cognitive functions such as learning, reasoning, problem-solving, perception, and language understanding. AI technologies include machine learning, natural language processing, robotics, and computer vision. In the context of IT and Cybersecurity, AI can be used to automate complex tasks, enhance decision-making, and improve security systems by identifying and responding to threats more efficiently than traditional methods. AI-powered cybersecurity solutions can adapt and evolve to detect new types of attacks, making them a critical component in modern security infrastructures.
For more information, view this lecture on Artificial Intelligence (AI). Or visit this Wikipedia page.
Define:
Attack
An intentional act aiming to exploit system vulnerabilities or disrupt normal operations, resulting in unauthorized access, data theft, or service disruption.
Any action that intends to exploit vulnerabilities or disrupt the normal functioning of systems, networks, or applications. This could be initiated by individuals, groups, or even automated scripts with the aim of compromising system integrity, confidentiality, or availability, often leading to unauthorized access, data theft, or service disruption.
For more information, view this lecture on Risk- Attackers and Types of Attacks Part 1 and Risk- Attackers and Types of Attacks Part 2. Or visit this Wikipedia page.
Define:
Attack Surface
All the potential vulnerabilities in a system or network that could be exploited, encompassing things like open ports, user access, and installed software.
The total area of potential vulnerabilities in a computer system or network. It is used in cybersecurity to assess the potential risks and vulnerabilities in a system or network. Examples include the open ports and services on a server, the number of users with access to a system, and the type of software installed on a system.
For more information, view this lecture on Secure Access Service Edge and Quantum Cryptography and Key Distribution. Or visit this Wikipedia page.
Define:
Attack Vector
A method or pathway used by an attacker to access or compromise a system, including exploiting vulnerabilities and using social engineering tactics.
A path or method used by an attacker to gain access to a computer system or network. It is used in cybersecurity to describe the specific methods and techniques used by attackers to breach the security of a system or network. Examples include exploiting a software vulnerability, using social engineering tactics to trick a user, or using a brute force attack to guess a password.
Or visit this Wikipedia page.
Define:
Automated Incident Response
Automated Incident Response uses technology-driven workflows to quickly identify, contain, and remediate security events, minimizing human intervention and accelerating resolution to mitigate damage and reduce downtime.
Automated Incident Response relies on pre-defined playbooks, integrated threat intelligence, and orchestration tools to handle alerts in real time. Systems can isolate affected endpoints, block malicious IPs, or quarantine suspicious files without waiting for manual approvals. This speed significantly decreases an attacker’s window of opportunity and lowers the overall impact on business operations. By standardizing reactions to known threats, security teams free up resources for complex investigations and strategic improvements, enhancing both efficiency and resilience.
Define:
Automated Patch Management
The automatic identification, acquisition, and application of software updates to systems, essential for maintaining security by addressing vulnerabilities.
The process where software updates are identified, acquired, and applied to systems automatically, without the need for human intervention. This procedure is critical in maintaining system security as it ensures that vulnerabilities are quickly addressed, reducing the window of opportunity for malicious actors to exploit known weaknesses.
For more information, view this lecture on Patch Management. Or visit this Wikipedia page.
Define:
Backout Contingency Plan
A strategy for reverting system changes if updates cause issues, including restoring from backups and reverting to prior configurations.
A strategic plan outlining steps to revert changes made during system updates or modifications should these changes result in unforeseen issues or failures. This could include procedures to restore data from backups, reinstating prior configurations, or rolling back software updates. It plays a critical role in maintaining system stability and minimizing downtime, especially in high-risk environments where system reliability is paramount.
Or visit this Wikipedia page.
Define:
Backup Contingency Plan
A strategy for data and system recovery in case of data loss or failures, detailing backup processes and resources for maintaining data availability.
A comprehensive strategy aimed at maintaining data availability and system functionality in the event of data loss, system failures, or disasters. This plan details the mechanisms, processes, and resources for creating, managing, and restoring from data backups. It is a fundamental component of a robust digital environment, ensuring business continuity and minimizing the negative impact of potential disruptions.
For more information, view this lecture on BCP and DRP - Part 1. Or visit this Wikipedia page.
Define:
Backup or Backing Up
Creating data copies for restoration after data loss or system failure, an essential practice for data protection and ensuring business continuity.
The process of creating copies of data that can be used to restore the original information in the event of data loss, corruption, or system failures. This is a critical process in safeguarding data and ensuring business continuity, enabling the restoration of data from a previous point in time and reducing potential damage or disruptions caused by unforeseen events.
For more information, view this lecture on Backups. Or visit this Wikipedia page.
Define:
Backup Storage Strategies
Planning for how and where to store backup data, considering storage types, backup formats, and frequency, balancing protection needs with costs.
The methodology and planning involved in determining how and where backup data is stored. This might encompass decisions about the type of storage (local, off-site, or cloud), the format of the backup (full, incremental, or differential), and the frequency of backup creation. An effective strategy balances data protection needs, cost, and business continuity objectives to ensure a reliable and efficient recovery process.
For more information, view this lecture on Backups. Or visit this Wikipedia page.