Security Operations: Examining Security monitoring and alerting Flashcards

1
Q

What are the three categories that need require monitoring?

A

Application
System
Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What options can you used for monitoring and measuring these computing resources?

A

Performance metrics
Anomaly Detection
Availability Metrics
Endpoint detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do we use Performance metrics?

A

Use in the implementation of a security baseline, such as user-experience scenarios.

For example, implementing database encryption can secure the database and has the potential to severely hinder performance and user experience. You could use performance metrics to detect this and also compromise, as that’s another scenario in which performance is a factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is anomaly detection important?

A

Anomaly detection: Through real-time monitoring, security professionals can detect and implement rapid response mechanisms and procedures to help detect and control unexpected or unauthorized processes, requests, events, or chains of events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is availability metrics critical?

A

Availability metrics: Provides crucial insights into the stability and performance of application-based computing resources, helping monitor and ensure seamless operation and minimal downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is endpoint detection and response critical?

A

Endpoint detection and response: Actively identifies and responds to potential security threats and breaches at the endpoint level, providing real-time insights and remediation capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is alerting so important?

A

Altering, which is crucial to security, is the process of generating notifications or alarms when suspicious or potentially malicious activities are detected within a network, system, or application.

These alerts serve as early warnings, allowing for you to rapidly implement response mechanisms to threats, vulnerabilities, and attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What tools can you utilize for alerts?

A

SCAP
SIEM
Antivirus
DLP
SNMPv3
NetFlow
Vulnerability scanners
Benchmark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SCAP?

A

Security Content Automation protocol (SCAP): A standardized framework for expressing and measuring security-related information in a standardized manner to support automated security-compliance checking and vulnerability management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SIEM?

A

Security information and event management (SIEM): A comprehensive technology that enables organizations to collect, correlate, and analyze security data from various sources to effectively detect, alert, and respond to security incidents. It uses automation to provide log aggregation, alerting, reporting, alert response, remediation, and quarantining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DLP?

A

Data loss prevention (DLP): A set of utilities and practices implemented to help protect an organization’s sensitive data through identifying, monitoring, and preventing unauthorized access or disclosure, both inside and outside an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SNMPv3?

A

Simple Network Management Protocol (SNMP) traps: Provide messages sent by network devices to a central management system. This ensures real-time notifications about network events and issues. (version 3 is recommended – Mutual authentication and encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Netflow?

A

NetFlow: Provides detailed information about network-traffic flow, assisting in the detection of anomalies and security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Vulnerability scanners?

A

Vulnerability scanners: Actively scan and identify security weaknesses within a network or system. Provides rapid remediation to mitigate potential risks and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is benchmark?

A

Benchmarks: Provide predefined performance and security standards. Systems and application performance can be compared to identify deviations and potential issues requiring remediation. - Secure score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does it mean by Agent monitoring?

A

Agents and agentless monitoring:

Agent-based monitoring requires installation of specialized software on the target systems or devices. Can allow for more verbose, real-time data collection but can introduce resource and management overhead.

Microsoft Defender

16
Q

What does it mean by agentless monitoring?

A

Agentless monitoring utilizes existing protocols and system capabilities to gather information without the need for installed agents. Provides simplified deployment but may have limitations in terms of data granularity and control over monitored resources.

Push a GPO through administration and apply without installing.