Final 7-12 Flashcards
What is a United Threat Management device?
A piece of hardware that can do email spam filtering, malware protection, firewall capabilities, and more.
What is an MUA and MTA , what do they do?
Mail User Agent & Mail Transfer Agent. A MUA is what is used to read and send mail from an endpoint (gmail). MTAs are programs that accept email messages from senders and route them toward their recipients.
What is an endpoint?
A network-connected hardware device (phone, computer, tablet)
What products can assist in monitoring endpoint hardware?
An Endpoint Protection Platform (EPP) has antimalware scanning.
Endpoint Detection and Response (EDR)
Detects & investigates security incidents, & the ability to intervene and even remediate endpoints back to a preinfection state.
While identifying software for the presence of malware, how is that done with EPP and EDR?
Reverse engineering malware.
known-good behavior
“Normal” processes and actions used as a standard.
User and Entity Behavior Analytics?
Normal behaviors for users and entities
What is Layer 2 of the OSI model?
Data Link Layer, divides data into packets, handles error detection and correction.
Packet and protocol analysis?
Analyzing packets and the protocols that are used on a network in search of malware.
What is a TAP?
Test Access Point, transmits send and receive data streams simultaneously. Passive device, cannot be attacked. “court approved”
What tools can be used for packet analysis?
Wireshark (gui tool), EtherApe (virtual interpretation), Tcpdump (command-line, UNIX and LINUX), Tcpreplay (editing and replaying packets)
What is the DGA technique?
A domain generation algorithm can be used to create multiple random potential URLs for malware to communicate with a command and control server over.
Nicholas wants to implement an additional feature for the employees at his organization to be able to verify who the sender of the message is and that the message hasn’t been tampered with in transit. What will be required to send the message?
The message hash needs to be encrypted using the sender’s private key. The receiver will decrypt the message hash using the sender’s public key.
What can be added to prevent SQL injection or cross-site scripting attacks?
web application firewall
Jonquil has been asked to implement a system that collects information for analysis about traffic flowing through the routers and switches on her company’s network. What protocol should she consider to implement this type of setup?
NetFlow is a protocol developed by Cisco that collects info about traffic flowing through devices on a network.
What is Data correlation?
Looking for reasons why shit happens in event sequences
What is syslog?
A means by which network devices can use a standard message format to communicate with a logging server.
Suki wants to analyze all of the traffic being sent to and from a group of 10 computers that are all connected to the same networking device. He decides to install a sniffing device that will capture packets and then enable port mirroring on the networking device to send copies of the traffic to the sniffing device. What device is he using?
A switch, he is port mirroring to send copies of frames to a certain port for analysis.
Sanvi is a cybersecurity analyst at her company and has been asked to review a new platform that will combine software programs and tools in order to orchestrate a range of security operations, threat intelligence sources, as well as incident response mechanisms all into one. Which has she been asked to review?
SOAR (Security orchestration, automation, and response) combines software programs and tools in order to orchestrate a range of security options, threat intelligence sources, and incident response mechanisms.
What is data enrichment?
The process of enhancing data for cybersecurity analysis. Combining data from multiple orgs.
What is SCAP?
Security Content Automation Protocol. Open standard that enables an automated vulnerability management, measurement, and policy compliance evaluation.
What are the standards of SCAP?
Common Vulnerabilities and Exposures (CVE)
Common Configuration Enumeration (CCE)
Common Platform Enumeration (CPE)
Common Weakness Enumeration (CWE)
Define the standards of SCAP.
Common Vulnerabilities and Exposures (cve)
Vulnerabilities in operating systems and application software
Common Configuration Enumeration CCE
Configuration best-practice statements
Common Platform Enumeration CPE
Vulnerabilities in operating systems, applications, and hardware devices
Common Weakness Enumeration CWE
Software design flaws that could result in a vulnerability
Clustering?
A form of statistical analysis that separates groups (clusters) of similar data points from a larger set based on specific characteristics.
stack counting?
the application of frequency analysis (how often something occurs) to large sets of data to identify outliers.
Integrated intelligence?
Combining different sources to be used in threat hunting.
Artyom wants to implement a new threat detection and analysis system which automates a lot of the process of finding new intrusions and breaches at his company. He wants the system to analyze user behavior and determine when there are anomalies and abnormalities. What feature should he look for when looking for a new system to implement?
Machine learning
Attack vector?
The methods by which threat actors will use to attack systems, networks, and devices of an enterprise.
executable process analysis
Tools that allow for an investigation of how malware functions.
What is DevSecOps?
The process of integrating secure development best practices and methodologies into application software development and deployment processes using the agile model.
What are the automated courses of action for DevSecOps?
Continuous Monitoring (examining processes in real-time
Continuous Validation (ongoing approvals of code),
Continuous Integration (ensuring security features are incorporated at each stage),
Continuous Delivery (moving code to each stage as it is completed),
Continuous Deployment (continual code implementation).
HIPAA?
Health Insurance Portability and Accountability Act
What are the critical data types?
Personally identifiable information (PII)
Sensitive Personal Information (SPI)
Personal health information (PHI)
Financial information
Intellectual property
High value asset (HVA) information
Corporate information
What do PII AND SPI consist of?
Personally identifiable information (full name,ssn, driver’s license number)
Sensitive Personal Information (biometric data,sex, political party affiliation)