Secure Operations 4.9 Flashcards
Use a situation to support an investigation
Firewall log
Traffic Flows through the firewall. Source/Destination IP. Port Numbers, dispositions.
Application Logs
Records events set to it by applications or programs running on the system. Any application has the capability of writing events in the application log. This includes, warnings, errors and routine messages.
Endpoint logs
A lot of data which can be seen on the endpoint. Log on events, Policy changes, System events.
OS-specific security logs
Monitoring Apps. Brute force, file changes, Authentication details. Find problems before they happen. Brute force attacks, May require filtering.
IPS/IDS Logs
Provide information on known vulnerabilities. Common data point, Time stamp, Type or class of attack, Source and destination IP, Source and destination port.
Network Logs
Switches, routers, access points, VPNS concentrators.
Metadata
Information which describes an other data sources.
Vulnerability scans
Will identify lack of security controls.
Misconfigurations will be identified.
Packet captures.
Analyse every bit and bite which is sent over the network.