Indicators of Compromise Flashcards

1
Q
A

Are artifacts or evidence observed in a computer system or network that may indicate unauthorized access, security breaches, or malicious activities. These indicators are monitored and analyzed by security professionals to detect and respond to security incidents effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Account Lockout

A

A sudden increase in failed login attempts, leading to the locking out of user accounts, can indicate a potential compromise attempt by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blocked Content

A

Attempts to access or transmit blocked or restricted content can indicate unauthorized activities or attempts to bypass security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Impossible Travel

A

Login attempts from geographically distant locations within a short timeframe, which would be physically impossible for the legitimate user, may indicate account compromise or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Resource Consumption

A

Unusual spikes in resource usage, such as CPU, memory, or network bandwidth, may indicate the presence of malware or unauthorized activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Resource Inaccessibility

A

Reports of users or systems experiencing difficulty accessing critical resources, such as files, databases, or applications, may indicate a compromise or denial-of-service attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Out of Cycle Logging

A

Unexpected changes in logging behavior, such as sudden increases or decreases in log volume or frequency, may indicate attempts to cover up malicious activities or tamper with log records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Missing Logs

A

Unexplained gaps or missing entries in log files, especially in critical security logs, may indicate attempts to conceal unauthorized access or activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Published/ Documented

A

Known vulnerabilities, malware signatures, or attack techniques published by security researchers or organizations can serve as indicators of compromise, prompting proactive security measures to prevent exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly