Lessons 15-19 Flashcards
Asset
An asset is any device, data or other components of value to an organization
Owners-
are responsible for decisions related to classification, and access control, as well as oversight of protection mechanisms.
Custodians
are responsible for implementing, managing, and monitoring controls
Network mapping
used to create physical and logical diagrams. Popular network mapping tools include Solarwinds, Spiceworks, ManageEngine, and Nmap.
Network Enumeration
discover and document devices and characteristics. DumpSec and Nessus.
End-of-sale
when the product, service, or subscription, is no longer for sale.
End-of-life & End-of-support
- when the product, service, or subscription is deemed obsolete. Once obsolete the product is not sold, improved, or maintained.
- the last date to receive service and support. After this date, updates are no longer available.
Fixed lifecycle-
products with defined dates at the time of release.
Continuous (modern) lifecycle-
products with continuous support and servicing. Generally, customers must take the latest update to remain supported.
ARCHIVING
The process of securely storing original, unmodified files for later potential retrieval
LEGAL HOLD
Is the requirement of an organization to preserve all forms of relevant information when litigation, audit, or government investigation is anticipated.
DATA REMANENCE
Refers to the residual traces of data that remain on a storage medium even after attempts have been made to erase or delete the information.
TRIM
is a command used by OS to inform solid state drives which blocks of data are no longer in use. When TRIM is executed, the SSD may immediately erase the associated data, reducing the likelihood of remanence
DATA SANITIZATION
Aka disk wiping- is a clearing technique that overwrites all addressable storage and indexing locations multiple times.
Shredding (shearing), Pulverizing, Pulping, Burning
- physically breaking media into pieces
- reducing media to dust
- chemically altering media
- incinerating media
CERTIFICATE OF DESTRUCTION
Is issued by the commercial services upon the destruction of media
Certificates should include at minimum: date of destruction, description of media(including serial number), method of destruction, witnesses, company name and address with contact information.
Exposure-
a system of software configuration issue, or lack of control that could contribute to a successful exploit or compromise.
BUG BOUNTY PROGRAM
Aka A vulnerability rewards program (VRP) is an incentive program that compensates individuals for identifying and reporting vulnerabilities or bugs
Open bug bounty program- offered by hundreds of companies like Google, Microsoft, and Facebook
Closed bug program- invitation only.
CVE PROGRAM
Is an international, community-driven effort to catalog hardware and software vulnerabilities for public access.
A CVE is a standardized identifier for a given vulnerability or exposure.
COMMON VULNERABILITY SCORING SYSTEM
CVSS
CVSS is an open frame for communicating the characteristics and severity of hardware and software vulnerabilities.
There 5 ratings: none, low, medium, high, and critical
VULNERABILITY SCANNING
The automated activity that relies on a database of known vulnerabilities such as CVE/NVD, designed to identify vulnerabilities in the target environment
Vulnerability assessment-
identify host attributes and known common vulnerabilities and exposures CVE. find the report.
Penetration testing
evaluate the security of a target by identifying and providing proof of concept of flaws and vulnerabilities or by performing compromise exploitation. Find then exploit then report.
PATCH MANAGEMENT
The process of identifying, acquiring, installing, and verifying patches (updates)
Dynamic application security testing - DAST
a type of security testing that analyzes a running application to find vulnerabilities by simulating attacks.
AUDIT AND EVENT LOGS
Are a chronological record of events and actions
SYSLOG
System logging protocol is a standard protocol used to send system log or event messages to a Syslog server.
* Syslog is used to collect logs from different devices to store in a central location for monitoring and review
SIEM-
security information and event management is an automation tool for real-time data capture event correlation analysis, and reporting
TIP
threat intelligence platform is an automation tool that combines multiple threat intelligence feeds and integrates with existing SIEM solutions
UEBA
User and Entity Behavior Analytics is an automation tool that models the behavior of humans and machines to identify normal and abnormal behavior
SOAR
security orchestration automation, and response is an automation tool that responds to the alerts, triages the data, and takes remediation steps
Orchestration
he integration of disparate tools and platforms for an automated response.
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
Is a widely used network management protocol that allows administrators to monitor and manage network devices.
SNMP agents
software modules installed on managed devices. They collect and store information about the device’s performance and respond to queries from SNMP management systems.
SNMP managers
send SNMP queries to agents to retrieve information and can also issue configuration commands to the device
NETFLOW
A network protocol developed by Cisco Systems that allows the collection and analysis of network traffic data.
IPFIX-
is an industry-standard protocol based on NetFlow v9 that provides a vendor-agnostic format
cve- Common Vulnerabilities and Exposures
is a database of publicly known cybersecurity vulnerabilities and exposures. Each vulnerability is assigned a unique identifier, making it easier for organizations to share and reference security issues consistently.
CCE (Common Configuration Enumeration)
a standard that provides unique identifiers for system configuration settings to help organizations manage and assess their security configurations.
CPE (Common Platform Enumeration
is a standardized method of naming and identifying software applications, operating systems, and hardware devices.
CVSS (Common Vulnerability Scoring System)
is a standardized framework for rating the severity of security vulnerabilities. It provides a numerical score from 0 to 10, with higher scores indicating more severe vulnerabilities, helping organizations prioritize their responses to security issues.
OVAL (Open Vulnerability and Assessment Language)
is a standardized language used to describe and share information about the security vulnerabilities and configuration issues of computer systems. It helps automate the assessment, reporting, and remediation of these security issues.
IDS/IPS-
analyze and monitor for suspicious traffic. IPS can deny traffic access
DLP
detect and prevent unauthorized transfer and exfiltration of data.
NAC
enforce endpoint access privileges based on pre-admission and post-admission policies
Web filters
enforce restrictions to websites based on predefined criteria