Endpoint and Application Development Security Flashcards
KRIs
Key Risk Indicators
exceeding normal baselines; failed logins; bandwidth
CISCP
Cyber Information Sharing and Collaboration Program
Analyst-to-analyst technical exchange
OSINT
Open Source Intelligence
Public information sharing centers
DHS and CISCP
What are the 2 concerns of public information sharing centers?
Privacy and Speed
AIS
Automated Indicator Sharing
STIX and TAXII
More in public information sharing
STIX
Structured Threat Information Expression
visually and stored lightweight
TAXII
Trusted Automated Exchange of Intelligence Information
Forced over HTTPS
Closed Source Information
owned
must go through a vetting process and meet certain criteria
Adversary TTP
Tactics, Techniques, and Procedures
Threat actors and how they attack
Boot Attestation
determining boot process is valid
Antivirus - String Scanning
matching patterns
Antivirus - Wildcard scanning
skips bytes to look for exact match
Antivirus - Mismatch scanning
number of bytes in string be any value no matter position
Heuristic Monitoring - Code emulation
virtual environment is made to determine virus
Anti-Malware - Bayesian filtering
for spam
divides emails
every word is analyzed and how often
First-party cookies
from website being viewed so when revisited
could be stolen to impersonate
Third-party cookies
websites try to place in local hard drive for advertisment
Session cookie
in RAM
duration of site visit
Secure cookie
sent to server w encrypted requested over HTTPS
HTTP Response Headers - HSTS
HTTP Strict Transport Security
forces HTTPS
HTTP Response Headers - CSP
Content Security Policy
restricts what resources a user can load into site
HTTP Response Headers - X-XSS
Cross-Site Scripting Protection
stops a page loading if detects XSS attack
HTTP Response Headers - X-Frame-options
prevents attacks that overlay their content on site
EDR
Endpoint Detection and Response
more robust than HIDPS
gathers from multiple hosts to a central database