Module 2 - Threat Management & Cybersecurity Resources Flashcards
What are some features that SIEM (Security Information and Event Management) can perform?
1) SENTIMENT ANALYSIS - is the process of computationaly identifying and categorizing opinions, usually expressed in response to textual data, to determine the writer’s attitude toward a particular topic
2) USER BEHAVIOR ANALYSIS - looks at normal behavior of users and how they interact with systems to create a baseline of typical “everyday” activity
3) LOG AGGREGATION - combines data from multiple data sources to build a comprehensive picture of attacks
Which data management tool can automate an incident response?
Security Orchestration, Automation and Response (SOAR)
is similar to SIEM in that it is designed to help security teams manage and respond to security warnings and alarms; SOAR takes it a step further by combining more comprehensive data gathering and analytics to automate incident response
What premise is the foundation of threat hunting?
the premise that threat actors have already infiltrated the network
threat hunting is proactively searching for cyber threats that thus far have gone undetected
What ISO standard contains controls for managing and controlling risk?
ISO 31000
Which group is responsible for the Cloud Controls Matrix?
Cloud Security Alliance (CSA)
goal is to define and raise awareness of best practices to help secure cloud computing environments
the Cloud Controls Matrix is a specialized framework (meta-framework of cloud specific security controls)
What is developed by established professional organizations or government agencies using the expertise of seasoned security professionals?
regulations
the process of adhering to regulations is called regulatory compliance
What standard is used for handling customer card information?
Payment Card Industry Data Security Standard (PCI DSS)
was introduced to provide a minimum degree of security for handling customer card information
What are some sources of general information that can provide valuable in-depth information on cybersecurity?
1) vendor websites
2) conferences
3) academic journals
4) local industry groups
5) social media
What are documents authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?
Requests for Comments (RFCs)
RFCs describe methods, behaviors, research or innovations applicable to cybersecurity
What technique is used by a threat actor after penetrating the network to probe other systems using their newly acquired elevated privilege?
lateral movement
with advanced privileges, threat actors tunnel through the network looking for additional systems they can access from their elevated position
What is another name for footprinting?
footprinting is also known as active reconnaissance and is the preliminary information gathering fro outside the organization
What are the seven rules of engagement in conducting a penetration test?
1) timing - the timing parameter sets when the testing will occur - the first consideration is the start and stop dates of the test; the second consideration involves when the pen test should take place ie. during or after business hours
2) scope - is what should be tested; includes environments, internal targets, external targets, target locations and other boundaries
3) authorization - is the receipt of prior written approval to conduct the pen test - a formal written document MUST be signed by all parties before a pen test can begin
4) exploitation - exploitation level in a pen test should also be part of the scope discussed in the planning stages; should a vulnerability be exploited if detected?
5) communication - pen tester should communicate with the organization on several occasions during the process - initiation, incident response, status and emergency
6) cleanup - following exploitation of the systems the pen tester mus ensure that everything related to the pen test has been removed
7) reporting - once the test is complete a report should be generated to document its objectives, methods used and results; report should be divided into two parts - an executive summary and technical analysis
What are some advantages of crowdsourced penetration testing?
1) faster testing, resulting in quicker remediation of vulnerabilities
2) ability to rotate teams so different individuals test the system
3) option of conducting multiple pen tests simultaneously
What are the three levels of penetration testing given to testers?
1) black box - testers have no knowledge of the network and no special privileges
2) gray box - testers are given limited knowledge of the network and some elevated privileges
3) white box - testers are given full knowledge of the network and the source code of applications
What are some reasons for NOT using internal employees to conduct a penetration test?
insider knowledge: employees often have in-depth knowledge of the network and its devices; a threat actor would not have the same knowledge
lack of expertise: internal employees may not have the credentials needed to perform a comprehensive test; their lack of expertise may result in few deep vulnerabilities being exposed
reluctance to reveal: employees may be reluctant to reveal a vulnerability discovered in a network or system that they or a fellow employee has been charged with protecting
What are the four teams used in a penetration test war game scenario?
red team - attackers; scans for vulnerabilities and exploits them
blue team - defenders; monitors for red team attacks and shores up defenses as necessary
white team - referees; enforces the rules of the pen test
purple team - bridge; provides real-time feedback between red and blue teams to enhance the testing
What are some characteristics of a penetration test?
a penetration test is performed to find deep vulnerabilities; a pen test goes beyond scans by attempting to exploit vulnerabilities using manual techniques whereas a vulnerability scan utilizes internal employees, penetration test can be conducted by either internal employees or by an external 3rd party
What is the first step in performing an in-house penetration test?
planning
it is generally recognized that the most important element in a pen test is the first step: PLANNING; a lack of planning can result in a flawed penetration test that tries to do too little or too much
What is the Cloud Security Alliance (CSA)?
the Cloud Security Alliance (CSA) is an organization whose goal is to define and raise awareness of best practices to help secure cloud computing environments; it created a specialized framework, the Cloud Controls Matrix, of cloud specific security controls; these controls are mapped to the leading standards, best practices and regulations regarding cloud computing and are generally regarded as the authoritative source of information about securing cloud resources
Compare and contrast the two primary SOCs that relate to cybersecurity.
SSAE SOC 2 Type II - is an internal controls report that reviews how a company safeguards customer data and how well those controls are operating; is designed to determine if service organizations are compliant with the categories of security, availability, processing integrity, confidentiality and privacy
SSAE SOC 2 Type III - is the same as SOC 2 Type II report except for that it can be freely distributed; a SSAE SOC 2 Type II report can only be read y the user organizations that rely on the services