Indicators of Compromise Flashcards
Are artifacts or evidence observed in a computer system or network that may indicate unauthorized access, security breaches, or malicious activities. These indicators are monitored and analyzed by security professionals to detect and respond to security incidents effectively.
Account Lockout
A sudden increase in failed login attempts, leading to the locking out of user accounts, can indicate a potential compromise attempt by an attacker.
Blocked Content
Attempts to access or transmit blocked or restricted content can indicate unauthorized activities or attempts to bypass security controls.
Impossible Travel
Login attempts from geographically distant locations within a short timeframe, which would be physically impossible for the legitimate user, may indicate account compromise or unauthorized access.
Resource Consumption
Unusual spikes in resource usage, such as CPU, memory, or network bandwidth, may indicate the presence of malware or unauthorized activities.
Resource Inaccessibility
Reports of users or systems experiencing difficulty accessing critical resources, such as files, databases, or applications, may indicate a compromise or denial-of-service attack.
Out of Cycle Logging
Unexpected changes in logging behavior, such as sudden increases or decreases in log volume or frequency, may indicate attempts to cover up malicious activities or tamper with log records.
Missing Logs
Unexplained gaps or missing entries in log files, especially in critical security logs, may indicate attempts to conceal unauthorized access or activities.
Published/ Documented
Known vulnerabilities, malware signatures, or attack techniques published by security researchers or organizations can serve as indicators of compromise, prompting proactive security measures to prevent exploitation.