Security Assessment Techniques Flashcards
Threat hunting
Looking for threats
False positives
Things that are not issues brought up as a vulnerability
Protocol analyzer
Analyze network traffic
Network scanner
NMAP angry IP Scanner
Rogue system detection, discover open systems ports
Wireless scanners
inSSIDer meta Kimset
Password cracker
Used to find week passwords
Vulnerability scanner
Compliance scanner
Scans critical systems to ensure they meet security compliance standards set by the organization (Nessus)
Banner grabbing
Os fingerprinting. A method to determine the OS running on a remote system
NMAP
Ncat
Siem
Security information and event management.
IT industry monitoring standard use to detect anomalies
Provides security related events in real time
Helps identify trend and patterns over time
Collects data into a central repository
Target for attacks
SIEM continued
Rule base for specific environments.
Statistical correction engine
Event deduplication reduces the clutter that duplicate log entries for the same event can create
Post scan actions
After completing a vulnerability scan