Lecture 1 Flashcards

Introduction to Security Operations and SOC

1
Q

What is the primary purpose of a Security Operations Center (SOC)?

A

To deal with security issues on both an organizational and technical level using people, processes, and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What factors can lead to a dysfunctional SOC?

A

Lack of educated security professionals, hyper focus on preventing compromises, inability to scale to meet demand, and improper security considerations when moving to cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the four types of cyber threat actors.

A

Cybercriminals, Hacktivists, State-sponsored actors, and Cyberterrorists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the core principles of Information Assurance?

A

Confidentiality, Integrity, and Availability (CIA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Defense in Depth strategy.

A

It uses a combination of people, processes, and technology to create multiple layers of defense to ensure continuous protection even if one layer fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Cyber Kill Chain Model?

A

A model describing the stages of a cyber attack: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions and Objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three types of detection methods in cybersecurity?

A

Signature detection, Behavior detection, and Anomaly detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the NIST Cybersecurity Framework?

A

To provide standards, guidelines, and best practices to manage and reduce cybersecurity-related risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do cybercriminals differ from hacktivists?

A

Cybercriminals are motivated by financial gain, whereas hacktivists are driven by a cause or belief.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the importance of establishing a baseline in cybersecurity?

A

To assess the maturity of current practices and develop goals for future capabilities and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are fundamental cybersecurity capabilities for a SOC?

A

Signature detection, Behavior detection, and Anomaly detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the concept of ‘Defense-in-depth.’

A

A layered approach to security that ensures multiple defensive measures are in place to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the Cyber Kill Chain Model?

A

To break down the steps an adversary takes to launch an attack, helping defenders understand and counteract each stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some key impacts of a security breach on an organization?

A

Financial losses, loss of customer trust, potential fines, and loss of staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does a dysfunctional SOC affect an organization?

A

It leaves the organization vulnerable to cyber threats, leading to potential exploitation of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly