Indicators Of Malicious Activity Flashcards
Incident response plan
Plan to quickly detect and respond to indicators of compromise or attack
IOA - indicator of attack
Type of indicator used to help and identify and detect threats,. IOA are behaviors or actions suggest an attack that is happening or about to happen, IOA are proactive. This os a set of behaviors typically observed during early stage of attack (network traffic patterns, system events, user activity)
IOCS - indicator of compromise
Type of indicator used to help, identify. Detect threats. IOCs are evidence that a system may have been compromised. IoCS are more reactive,. Are pure artifacts about an event that has already happen - used to identify potential breaches
Cyber kill chain
Explain how the attackers move through networks to identify vulnerabilities that can be exploited.
Reconnaissance (learning about target) => weaponization (decide how to attack) =>deliver (weapon)=> exploitation=> installation => command and control (c2) => action on objectives
Artifacts
Indicators of compromise. Typical artifacts left behind by an attacker, included new accounts, file hashes, virus signature, malicious files, command and control connections, modifications of system and registry settings, evidence of data exfiltration, patterns of suspicious behavior
C2 command and control server
Remote device that issues malicious instructions