(Pre Security) Section 2: Intro to Defensive Security Flashcards

1
Q

Defensive security is somewhat the opposite of offensive security, as it is concerned with two main tasks:

A

Preventing intrusions from occurring
Detecting intrusions when they occur and responding properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ are part of the defensive security landscape.

A

Blue teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Security Operations Center (SOC) is…

A

A team of cyber security professionals that monitors the network and its systems to detect malicious cyber security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some of the main areas of interest for a SOC are:

A

Vulnerabilities: Whenever a system vulnerability (weakness) is discovered, it is essential to fix it by installing a proper update or patch. When a fix is not available, the necessary measures should be taken to prevent an attacker from exploiting it. Although remediating vulnerabilities is of vital interest to a SOC, it is not necessarily assigned to them.
Policy violations: We can think of a security policy as a set of rules required for the protection of the network and systems. For example, it might be a policy violation if users start uploading confidential company data to an online storage service.
Unauthorized activity: Consider the case where a user’s login name and password are stolen, and the attacker uses them to log into the network. A SOC needs to detect such an event and block it as soon as possible before further damage is done.
Network intrusions: No matter how good your security is, there is always a chance for an intrusion. An intrusion can occur when a user clicks on a malicious link or when an attacker exploits a public server. Either way, when an intrusion occurs, we must detect it as soon as possible to prevent further damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In this context, intelligence refers to…
A threat is…
Threat intelligence aims to…
The purpose would be to…

A

Information you gather about actual and potential enemies.
Any action that can disrupt or adversely affect a system.
Gather information to help the company better prepare against potential adversaries.
Achieve a threat-informed defense…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly