SG#4 - Operations and Incident Response Flashcards
NetFlow
Standardized way for collecting network information from switches, routers, and other network devices.
Usually, a single NetFlow Server examines all the data from all of your devices.
CRL
Certificate Revocation List is used to verify that a digital certificate is sill valid.
It is usually implemented before connecting VPN tunnels.
Isolation
Happens when you moved a device into an area with limited or not access to other resources.
This is often used when someone is trying to connect to the NETWORK and does not have the correct security posture on their device.
Runbooks
Explicit instructions on how to do certain task.
Examples: how to reset a password, create a website certificate, data backups.
Playbooks
Is a more detailed description of what to do if an specific event occurs. Often a combinations of Runbooks.
Examples: the steps to recover from a ransomware.
OpenSSL
A library and a series of utilities that allow you to manage SLL and TLS certificates into the systems.
Non-Repudiadtion
Can be provided in 2 ways
Message Authentication Code (MAC)
Digital Signature
Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the senders identity.
SIEM
Security Information Event Management
It supports thread detection and security solution through the collection and analysis of security events.
Four types of Vulnerability Assesment
Active
Passive
External
Internal
WinHex
Third party editor tool that can provide the raw representation of the dump files.
Also cloning/coping capabilities.
GRC
The Governance Risk and Compliance
Combined collection that allows organizations to operate ethically minimizing risk and still complying with state requirements.
netcat
It reads and writes information to or from the network
Example: open a port and send or receive some traffic
Nessus
Most popular vulnerability scanning tool because of its large database.
It has extensive reporting help to identify vulnerabilities.
It resolves vulnerabilities on the system.
Tcpreplay
Allows to captured the packets to quickly look at the information, reply to this information back onto the networ.
Tcpdump
it captures packets from the command line, displays the packets onto the screen, and writes then in files.
Does the same thing as WireShark