Module 01: Security and Operations Management Flashcards

1
Q

What is security management?

A

Set of security activities by the organizations to maintain their security posture at an adequate level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four main activities in Security Management?

A

Security Infrastructure
Security Prevention
Compliance and Validation
Security Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main goal of security management?

A

Secure company assets from malicious activities and ensure CIA of assets and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Security Infrastructure Activities?

A

Perimeter, network, application, host and data security. through adequate controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are compliance and validation activities?

A

Security baselines, policies, audit and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are security prevention activities?

A

Vulnerability management and pentesting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the activities of security operations?

A

Security monitoring, incident management, vulnerability management, device management, network-flow monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a SOC?

A

centralized unit that monitors and analyzes ongoing activities on organization’s information systems (networks, servers, endpoints, databases, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the goal of the SOC?

A

Maintain continuity of an organization by determining, preventing, detecting, and responding to intrusion events before they affect the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main SOC capabilities?

A

Preventing, detecting, responding and reporting security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are typical SOC functions?

A
Log collection
Log retention and Archival
Log analysis
Monitoring of Security Environments for Security Events
Event Correlation
Incident Management
Threat Identification
Threat Reaction and Response
Reporting
Malware Analysis
Vulnerability Management
Security Device Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the high-level SOC workflow?

A

Collect > ingest > validate > report > respond > document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three components of a SOC?

A

People, processes, technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are people roles within a SOC?

A
L1 SOC Analyst
L2 SOC Analyst
Incident Responder
Subject Matter Expert/Threat Hunters
SOC Manager
Chief Information Security Officer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What soft skills are required?

A
Team Spirit
Communication
Trustworthiness
Self-confidence
Assertiveness
Empathy
Inquisitiveness and Creativity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are SOC technologies?

A
SIEM
Monitoring tools
dashboard
ticketing system
automated assessment tool
17
Q

How should SOC technologies be selected?

A

By choosing those that work for people and processes.

18
Q

What are the four main SOC processes?

A

Business, Technology, Operational, and Analytical.

19
Q

What are the three SOC models?

A

In-house/Internal
Outsourced
Hybrid

20
Q

What are SOC maturity models?

A

IT governance tools that explain the organization’s working process as per standardization, results, and measurement of effectiveness.

21
Q

What are the SOC maturity levels?

A

Level 1: Create correlation rules
Level 2: Automation of Responses
Level 3: Service Management Integration

22
Q

What are the types of SOC maturity models?

A

1: SOC-Capability Maturity Model
2: COBIT
3: NIST
4: SSE-CMM

23
Q

What are the steps to implementing a SOC?

A

Planning
Designing and building the SOC
Operating the SOC
Reviewing and Reporting the SOC

24
Q

What are SOC KPIs?

A
Completion time
First-time fix rate
Call service level compliance
Response time
Client satisfaction
operations audit
over time
transfer rate
system availability and accessibility
25
Q

What are some implementation challenges?

A
Increasing the volume of security alerts
Management of numerous security tools
Lack of skilled analysts
Legal and regulatory compliance
Technology selection and configuration
Processes and procedures formalization, orchestration and automation
Data integrity and intelligence management
Handling multi-staged advanced attacks
Rapid change in technology and security
Continuous training