Domain 7: Security Operations Flashcards
Preparation
These include training, writing incident response policies and procedures, providing tools such as laptops with sniffing software, crossover cables, original OS media, removable drives, etc. Preparation should include anything that may be required to handle an incident, or which will make incident response faster and more effective.
Detection
Detection (also called identification) is the phase in which events are analyzed in order to determine whether these events might comprise a security incident
Response
The response phase (aka containment) of incident response is the point at which the incident response team begins interacting with affected systems and attempts to keep further damage from occurring as a result of the incident. Responses might include taking a system off the network, isolating traffic, powering off the system, or other items to control both the scope and severity of the incident
The mitigation phase
involves the process of understanding the cause of the incident so that the system can be reliably cleaned and ultimately restored to operational status later in the recovery phase
Reporting
Reporting must begin immediately upon detection of malicious activity. Reporting contains two primary areas of focus: technical and non-technical reporting. The incident handling teams must report the technical details of the incident as they begin the incident handling process, while maintaining sufficient bandwidth to also notify management of serious incident
Recovery
The recovery phase involves cautiously restoring the system or systems to operational status. Typically, the business unit responsible for the system will dictate when the system will go back online
Remediation
Remediation steps occur during the mitigation phase, where vulnerabilities within the impacted system or systems are mitigated
four types of IDS
True Positive
True Negative
• False Positive
False Negative:
True Positive
Conficker worm is spreading on a trusted network, and NIDS alerts
True Negative
User surfs the Web to an allowed site, and NIDS is silent
False Positive
User surfs the Web to an allowed site, and NIDS alerts
False Negative:
Conficker worm is spreading on a trusted network, and NIDS is silent
Difference between active NIDS AND NIPS
. Architecturally, an active response NIPS is like the NIDS in Figure 8.5; the difference is the monitoring interface is read/write.N
Tripwire
Tripwire protects system integrity by detecting changes to critical operating system files. Changes are detected through a variety of methods, including comparison of cryptographic hashes.
Pattern Matching
works well for detecting known attacks, but usually does poorly against new attacks.
The Security Information and Event Management (SIEM) is the primary tool used to
ease the correlation of data across disparate sources.
Typical challenges associated with endpoint security are associated
with volume considerations: vast number of products/systems must be managed; significant data must be analyzed and potentially retained.
Application whitelisting is superior to application
blacklisting
A honeypot
is a system designed to attract attackers. This allows information security researchers and network defenders to better analyze network-based attacks. Honeypots have no production value beyond research.
Low-interaction honeypots
usually by scripting network actions (such as simulating network services by displaying banners)
High-interaction honeypots
run actual operating systems, in hardware or virtualized
honeynet
Honeynets can include a honeywall (honeynet firewall) that is intended to limit the likelihood of the honeynet being used to attack other systems.
Security baselining
is the process of capturing a point in time understanding of the current system security configuration.
The three basic types of backups are
full backup, incremental backup and differential backup.
Incremental backups
only archive files that have changed since the last backup of any kind was performed.
. Though the time to perform each incremental backup is extremely short, the downside is that a full restore can require quite a few tapes, especially if full backups are performed less frequently
Differential
Another approach to data backup is the differential backup method. While the incremental backup only archived those files that had changed since any backup, the differential method will back up any files that have been changed since the last full backup.
Incremental backups
Incremental backups only archive files that have changed since the last backup of any kind was performed
differential backup
While the incremental backup only archived those files that had changed since any backup, the differential method will back up any files that have been changed since the last full backup.
RAID
The goal of a Redundant Array of Inexpensive Disks (RAID) is to help mitigate the risk associated with hard disk failures.
Three critical RAID terms are:
mirroring, striping and parity.