Introduction to Cybersecurity Flashcards
Assets
An asset is any object(tangible or intangible) that is considered valuable to an individual or group of individuals.
Critical Infrastructure
Blue Team
Will constantly perform tests and analysis using security monitoring programs, such as SIEM, and methods such as threat hunting, to identify security flaws and verify that the most effective security measures have been deployed.
Critical Infrastructure
Red Team
Will constantly evaluate security levels of the infrastructure by trying to exploit the many security measures that are implemented in the organization, including using Social Engineering.
Incidence Response
Also known as the Blue Team, will create a playbook that contains many scenarios, each scenario will have the best way to approach the situation with the attempt to limit damages to an infrastructure.
What is SOC
Security Operation Center is a facility responsible for monitoring, preventing, detecting, investigating, and responding to cyber threats 24/7 to maintain safety.
Security Operation Center goals
> Detect the signs of a cyberattack
prevent before it happens
isolate an attack
Once isolated perform the Incident Response.
Security Operation Centers within an Organization
Organizations need SOC teams to prevent, identify, and remedy attacks as quickly as possible and limit damages.
Security Operation Center:
Blue Team Aspects
Cybersecurity experts that aim to safeguard an organization against cyberattack.
Security Operations Center:
Red Team Aspects
Responsible for performing penetration testing in an organization. Tests try to avoid Security Operations Center detection and perform stealthy maneuvers that simulate how actual cybercriminals launch attacks.
Security Operations Center:
Purple Team
When Red and Blue teams in an organization are integrated, their cybersecurity experts can more efficiently test and improve an organizations defenses.
What are Viruses?
A computer virus is a type of malware designed to perform damaging and illegal operations on a host computer, primarily by deleting critical systems files.
How do viruses spread?
Viruses spread from file to file, it attempts to achieve higher privilege along the way.
How do viruses impact a computer?
Performance issues- OS frequently freezes or crashes, or there is prolonged boot-up, a drop in performance, or an unusual amount of resource usage.
File System Changes- Missing or corrupt computer files.
Abnormal Behavior- Applications and programs are executed without user interaction.
Program Changes- Unusual program activities and changes to the machine, such as the appearance of new files or a changed default homepage.
Significance in Cybersecurity:
IT Aspect
An important IT team task is the Installation and maintenance of updated protection and identification measures. Usually includes antiviruses on all endpoints and network components of the organization, to detect and prevent the presence of the viruses in organization computers.
What is Cybersecurity
Cybersecurity refers to any activity that aims to protect devices and systems from both internal and external threats.
Red Team
Tests software, system, websites, tools, vulnerabilities, and more from the attacker’s perspective.
Blue Team
Defends against potential threats by monitoring systems, implementing patches, closing security holes, providing real-time protection against attacks.
Purple Team
Combines some aspects of Blue Team and Red Team, purple team will test and attack a system, resolve any issues that are discovered on their own.
Yellow Team
A rarely employed team that consists of the developers who are also knowledgeable in the areas of cybersecurity, and are able to design code that can thwart software related attacks.
Anti Virus
An endpoint protection application that inspects and detects viruses and malware. If a program is determined to be malicious, the anti-virus will handle the threat by, for example, removing it, deactivating it, or isolating it.
Two Elements of antivirus
Database are lists of strings and actions that may indicate malware activity,
Rules are sets of definition that together can be used to profile various types of malware.
File Signature
A type of AV that identifies malware based on raw data, name, size, has, bits, address, author, and magic bytes.
Heuristics
A type of AV that analyzes malware behavior, including the memory it uses and communication with the kernel, system, and network via DDLs.
Penetration Testing
An authorized simulated cyberattack on a computer system or network designed to check for exploitable vulnerabilities.