Indicators Of Malicious Activity Flashcards

1
Q

Incident response plan

A

Plan to quickly detect and respond to indicators of compromise or attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IOA - indicator of attack

A

Type of indicator used to help and identify and detect threats,. IOA are behaviors or actions suggest an attack that is happening or about to happen, IOA are proactive. This os a set of behaviors typically observed during early stage of attack (network traffic patterns, system events, user activity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IOCS - indicator of compromise

A

Type of indicator used to help, identify. Detect threats. IOCs are evidence that a system may have been compromised. IoCS are more reactive,. Are pure artifacts about an event that has already happen - used to identify potential breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber kill chain

A

Explain how the attackers move through networks to identify vulnerabilities that can be exploited.

Reconnaissance (learning about target) => weaponization (decide how to attack) =>deliver (weapon)=> exploitation=> installation => command and control (c2) => action on objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Artifacts

A

Indicators of compromise. Typical artifacts left behind by an attacker, included new accounts, file hashes, virus signature, malicious files, command and control connections, modifications of system and registry settings, evidence of data exfiltration, patterns of suspicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

C2 command and control server

A

Remote device that issues malicious instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly