Event Logging and monitoring Flashcards

1
Q

Evidence of Critical Events

A
  • Recon against systems
  • Weaponisation
  • Delivery
  • Installation of malware
  • Command and control
  • Action begins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recon against systems

A

where perpetrators perform research environments that could be their next targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weaponisation

A

Intrusion in computing environment where perpetrators take action against a network and IT system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Delivery

A

The manifestation of an exploit against a vulnerability on a network or IT system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Installation of malware

A

This is observed when a perp has modified native functionality in a computing environment to maintain persistence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command and control

A

When a hacker gain access of a server and system and take control of computing environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Action Begins

A

Trying to figure out the objective of the perp, and maintaining visibility on them at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Benefits of Event Logging and Monitoring

A
  • Detection of security breaches
  • Event reconstruction
  • Faster recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detection of security breaches

A
  • Security logging and monitoring can help guard against malicious external threats while also guarding against internal misuses of information.
  • Threats can be detected in real-time to facilitate fast intervention.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Event reconstruction

A
  • Even if a breach should occur, audit trails can facilitate a reconstruction of the events leading up to the incursion.
  • Security personnel will have a clear idea of how the breach occurred, how to rectify vulnerabilities, and what steps are
    needed to prevent it from happening again.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Faster recovery

A
  • Downtime of systems is extremely costly to organisations.
  • Audit logs can create a fast and effective recovery process.
  • They can help to reconstruct data files which were lost or corrupted by reverse engineering from the changes recorded in the logs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly