siem Flashcards

Security Information and Event Management

1
Q

SIEM

A

Security information and event management, SIM+SEM together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SIM

A

Security information management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SEM

A

Security event information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SIM definition

A

The practice of collecting, monitoring, and analyzing data from computer logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SEM definition

A

The process of collecting, monitoring, and analyzing data from events in software, system, and IT environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of logs to capture

A

Application logs, system logs, and host activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application logs

A

Logs modification of applications and changing records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System logs

A

Logs who logged into system and what actions they performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Host activity

A

Machines starting up, rebooting, shutting down, changes to configs, and disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SIEM collects data from

A

Firewalls, intrusion detection systems, intrusion prevention systems, and application servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security intrusion

A

A security event, or a combination events, that constitutes a security incident in which an intruder
gains, or attempts to gain, access to a system (or system resource) without having authorization to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion detection

A

A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized
manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intrusion detection system

A

Notifies that an unusual activity has occurred and is usually placed behind the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Parts of IDS

A

Sensors, analyzers, and user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IDS sensors

A

Collect data from network packets, logs files, and system call traces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDS analyzers

A

Determine if intrusion has occurred based on data from sensors and can send alerts or rocommendations

17
Q

IDS user interface

A

View output and control system behavior

18
Q

3 classifications of IDS

A

Host-based (HIDS), network-based (NIDS), and distributed/hybrid

19
Q

HIDS

A

Monitors the characteristics of a single host for suspicious activity

20
Q

NIDS

A

Monitors network traffic and analyzes network, transport, and application protocols to identify suspicious activity on the perimeter security

21
Q

Distributed/hybrid IDS

A

Combines information from a number of sensors, often both host and network based, in a central analyzer that is able to better identify and respond to intrusion activity

22
Q

What are the 2 interfaces for NIDS?

A

One for monitoring/watching traffic, other for accessing reports

23
Q

NID sensors

A

Inline sensor and passive sensor (more common)

24
Q

Inline sensor

A

Inserted into network segment so traffic must go through it and part of a firewall

25
Q

Passive sensor

A

Monitors a copy of the network traffic with no extra step in handling live data to contribute to a packet delay