Introduction to Cyber Security Flashcards
What is Offensive Security
Offensive Security is the process of breaking into computer systems, exploiting software bugs, and finding loopholes to gain unauthorised access to them, before then recommending patches to fix the issues you used to gain this privilege.
What is Defensive Security
Defensive security is the process of protecting an organizations network and computer systems by analysing and securing any digital threats.
What are the two main tasks of Defensive Security?
Preventing Intrusion from occurring
Detecting Intrusion when it does occur and responding accordingly
How is Cyber Awareness related to Defensive Security
Training users about cyber security can help protect against many attack vectors targeting systems, such as phishing attempts.
How does Documenting and Managing Assets aid Defensive Security
Documenting and Managing assets aids defensive security as the cyber professional hired to do the work knows what systems they are in charge of and how they can protect it properly
How does Updating and patching systems help Defensive Security?
Updating and Patching systems help with defensive security since it makes sure that the systems are up to date with defences against known vulnerabilities
How does the process of setting up preventative security settings aid Defensive Security?
Firewalls and Intrusion prevention systems (IPS) are important for defensive security as you can manage what goes in and out of a network, while Intrusion Prevention Systems can block attacks which match known attacking systems.
How does the presence of logging and monitoring devices aid Defensive Security
This aids with detection of malicious activities and intrusions, as well as recovering any damaged systems after an attack has stopped/been repelled.
What are the two main topics of Defensive Security?
Malware Analysis & Threat Analysis
What is a Security Operations Center?
The Security Operations Centre is a team of cyber professionals that monitor the network and system to detect malicious cyber security events.
What are the main areas of interest for the SOC?
Vulnerabilities, Policy Violations, Unauthorized Activity, Network Intrusion
What is Threat Intelligence?
Threat Intelligence is analysing the job of the client to understand what threats you may be going up against, to try and give you a better idea on what attacks might occur (i.e. a Nation State hacker may be much more skilled than a Ransomware hacker).
What is Digital Forensics?
Digital Forensics is the application of science to investigate crimes and establish facts from analysing a system.
What is Incident Response?
Incident Response can usually refers to Cyber Attacks or Data breaches, although it can also be less major events such as misconfigurations, intrusion attempts & policy violations.
What are the four major phases of Incident Response?
Preparation, Detection & Analysis, Containment, Post-Incident Activity