Introduction to Cybersecurity Flashcards
Assets
An asset is any object(tangible or intangible) that is considered valuable to an individual or group of individuals.
Critical Infrastructure
Blue Team
Will constantly perform tests and analysis using security monitoring programs, such as SIEM, and methods such as threat hunting, to identify security flaws and verify that the most effective security measures have been deployed.
Critical Infrastructure
Red Team
Will constantly evaluate security levels of the infrastructure by trying to exploit the many security measures that are implemented in the organization, including using Social Engineering.
Incidence Response
Also known as the Blue Team, will create a playbook that contains many scenarios, each scenario will have the best way to approach the situation with the attempt to limit damages to an infrastructure.
What is SOC
Security Operation Center is a facility responsible for monitoring, preventing, detecting, investigating, and responding to cyber threats 24/7 to maintain safety.
Security Operation Center goals
> Detect the signs of a cyberattack
prevent before it happens
isolate an attack
Once isolated perform the Incident Response.
Security Operation Centers within an Organization
Organizations need SOC teams to prevent, identify, and remedy attacks as quickly as possible and limit damages.
Security Operation Center:
Blue Team Aspects
Cybersecurity experts that aim to safeguard an organization against cyberattack.
Security Operations Center:
Red Team Aspects
Responsible for performing penetration testing in an organization. Tests try to avoid Security Operations Center detection and perform stealthy maneuvers that simulate how actual cybercriminals launch attacks.
Security Operations Center:
Purple Team
When Red and Blue teams in an organization are integrated, their cybersecurity experts can more efficiently test and improve an organizations defenses.
What are Viruses?
A computer virus is a type of malware designed to perform damaging and illegal operations on a host computer, primarily by deleting critical systems files.
How do viruses spread?
Viruses spread from file to file, it attempts to achieve higher privilege along the way.
How do viruses impact a computer?
Performance issues- OS frequently freezes or crashes, or there is prolonged boot-up, a drop in performance, or an unusual amount of resource usage.
File System Changes- Missing or corrupt computer files.
Abnormal Behavior- Applications and programs are executed without user interaction.
Program Changes- Unusual program activities and changes to the machine, such as the appearance of new files or a changed default homepage.
Significance in Cybersecurity:
IT Aspect
An important IT team task is the Installation and maintenance of updated protection and identification measures. Usually includes antiviruses on all endpoints and network components of the organization, to detect and prevent the presence of the viruses in organization computers.
What is Cybersecurity
Cybersecurity refers to any activity that aims to protect devices and systems from both internal and external threats.