IoC Indicators of compromise Flashcards
Account lock out
-credential aren’t working
-exceeded log in attempts
-account administratively disabled
Concurrent session usage
-in two places at once
-multiple account log in from different places
Impossible travel
-logged in from different states just in minutes
Resource consumption
refers to the utilization of system resources (such as CPU, memory, network bandwidth, and storage) by applications, processes, or malicious activities. Attacks that exploit resource consumption can lead to service degradation or denial of service
Out of cycle logging
-occurs at an unexpected time
Missing logs
Attackers will remove logs to cover their tracks
Published/documented
-company data may be published one