Module 2 Flashcards

1
Q

Purpose and Mission of the SOC

A

Formalized structure for defending against cyber threats. Three-tier elements: People, Process and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Element 1: People (3 Tier’s plus a manager)

A

Tier 1 Threat Analyst, Tier 2 Threat Responder, Tier 3 Threat Hunter and lastly we have the SOC manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tier 1 - notes

A

Monitors incoming alerts, verifies a true incident and forwards to LVL 2 if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tier 2

A

Deep investigation of incidents and advises for remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tier 3

A

Experts in network, endpoint, threat intelligence, malware reverse engineering and tracing the process of the malware, determining its impact and removal strategy. Also deeply involved in hunting for threats and implementing threat detection tools. They search for threats that exist in the network but have not been detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Head Guy

A

Manages the resources of the SOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Element 2: The process

A

Think of how tickets are utilized in your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the Process in the SOC

A

Analyst monitors security alert queues and investigates assigned alerts. *Be aware of false positives, make sure it is a “true incident.” Escalate to Responders for deeper investigation. Escalated to Tier 3 if ticket needs help.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Element 3: Technologies

A

Technologies in the SOC: SIEM and SOAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SIEM

A

Security Information Event Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does SIEM work?

A

It collects and filters data - classify - analyze and investigate threats. It takes data from a wide arena of systems - think network appliances, firewalls, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SOAR

A

Security Orchestration Automation and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does SOAR work?

A

Similar to SIEM, they aggregate, correlate and analyze alerts. Integrates threat intelligence and automates incident investigation and response workflows based on playbooks developed by the security team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOC Metrics

A

(5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dwell Time

A

The length of time that threat actors have access to a network before they are detected and their access is stopped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mean Time to Detect (MTTD)

A

The average time that it takes for the SOC personnel to identify valid security incidents have occurred in the network.

17
Q

Mean Time to Respond (MTTR)

A

The average time it takes to stop and remediate a security incident

18
Q

Mean Time to Control (MTTC)

A

The time required to stop the incident from causing further damage.

19
Q

Time to Control

A

The time required to stop the spread of malware in the network.