Domaine 4 : Opérations de sécurité Flashcards

1
Q

What is the Principle of Least Privilege?

A

Users are granted only the permissions necessary to perform their job functions

This principle minimizes potential damage from malicious activities or accidental misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Discretionary Access Control (DAC) entail?

A

Resource owners determine access permissions.

DAC is common in standard operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Mandatory Access Control (MAC)?

A

Access decisions are based on fixed policies and classifications.

MAC is often used in environments requiring high security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Role-Based Access Control (RBAC).

A

Permissions are assigned based on user roles within an organization.

RBAC simplifies management by grouping users with similar access needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Rule-Based Access Control?

A

Access is determined by system-enforced rules set by administrators.

Examples include time-based restrictions or specific browser requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Attribute-Based Access Control (ABAC).

A

Access decisions are based on attributes (e.g., user, resource, environment).

ABAC allows for more granular and context-aware access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Time-of-Day Restrictions?

A

Access can be limited to specific times or days.

This enhances security by restricting access during non-business hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is continuous monitoring important in security?

A

It is vital for detecting unauthorized activities and potential threats.

Continuous monitoring helps in maintaining the integrity and security of systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What types of sources should logs be collected from?

A

Logs should be collected from:
* Firewalls
* Servers
* Applications

Collecting logs from various sources allows for comprehensive analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of analyzing logs in security monitoring?

A

To identify anomalies or suspicious activities.

Analyzing logs is crucial for proactive threat detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SIEM stand for?

A

Security Information and Event Management.

SIEM systems play a key role in security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of a SIEM system?

A

It aggregates and correlates data from multiple sources and provides real-time analysis and alerts for security incidents.

SIEM systems are essential for effective security incident management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are baselines used for in security monitoring?

A

To define normal behavior patterns for systems and networks.

Baselines help in detecting deviations that may indicate security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of alerting mechanisms in security monitoring?

A

To notify administrators of potential threats and ensure alerts are actionable while reducing false positives.

Effective alerting mechanisms are crucial for timely incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should regular auditing and review processes assess?

A

The effectiveness of security controls.

Periodic audits help in identifying areas for improvement in security monitoring strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: SIEM systems provide ________ analysis and alerts for security incidents.

17
Q

Why are logs important in system monitoring?

A

Logs are essential for monitoring system activities, detecting anomalies, and supporting forensic investigations

Logs provide a chronological record of events, aiding in identifying security incidents.

18
Q

What do system logs record?

A

Operating system events, such as startups, shutdowns, and errors

System logs provide insights into the overall health and status of the operating system.

19
Q

What do application logs capture?

A

Events specific to applications, including user activities and errors

Application logs are crucial for troubleshooting application-specific issues.

20
Q

What types of events do security logs track?

A

Security-related events like login attempts and access control changes

Security logs are vital for identifying potential security breaches.

21
Q

What is the purpose of audit logs?

A

Provide a trail of user activities for compliance and auditing purposes

Audit logs help organizations maintain accountability and meet regulatory requirements.

22
Q

What is centralized logging?

A

Aggregate logs from various sources into a centralized system for easier analysis

Centralized logging facilitates a unified view of log data across different systems.

23
Q

What is the importance of regular monitoring of logs?

A

Continuously monitor logs to detect unusual activities promptly

Regular monitoring helps in early detection of potential security threats.

24
Q

What should retention policies for logs establish?

A

How long logs should be retained based on regulatory requirements

Retention policies ensure compliance with legal and organizational standards.

25
Q

Why is secure storage of logs crucial?

A

To prevent unauthorized access or tampering

Secure storage protects the integrity and confidentiality of log data.

26
Q

What tools can be used for analyzing log data?

A

Automated tools and Security Information and Event Management (SIEM) systems

SIEM systems help in correlating events and identifying security threats efficiently.

27
Q

What can be identified through analyzing log data?

A

Patterns and correlations that may indicate security threats

Analyzing log data is essential for proactive security measures.