terms Flashcards
remediation
process of addressing a breach and limiting damage to environment
Q: What is your plan for remdiation?
IOA
Indicator of attack - a tool that recognizes patterns of attacks
Q: Does your current provider have a tool like this?
Next Gen AV
Advanced AV software that protects against more sophisticated malware signatures because of its cloud approach
Q: What kind of AV do you have in place?
EDR
Falcon Insight -
Endpoint Detection & Response - an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware
EX: DVR that records everything thats happening on the endpoint and feeding back up into our cloud , which we call the threat graph. once data is received, our EDR team solution will act on it.
Question: what is your experience with EDR?
What are you using for EDR (if any) today?
Dwell Time
time vistor spends on page
Workload
IT resources hosted by DC or cloud platforms
ex: the comp power to run an application
SEIM
Security Event and Incident Management - provides real time analysis, monitoring/alerting on security logs from apps, hosts, devices
Brands of SEIM: Solarwinds has one, although thats not what they do
MDR
Managed detection and response - outsourced cybsec services to protect data even if a threat eludes common sec org controls
Threat Containment
A threat incident that is recognized, contained, and put on a path to eradication
TEI
Total economic impact - forester report that measures benefits, costs, risk flexibility
lets customer compare from a credible source
Biggest competitors (not all encompassing)
Sentinel One, Artic Wolf (MDR), Sophos, trend micro, fireeye
Silo
isolated point on system where data is kept segregated from other parts of the architecture
Q: Have you experienced Silos getting in the way? - that’s a sign of a potential hacker using that to distract attention
Ransomware
Malware designed to deny a user/org access to their file
Example: WannaCry outbreak demanding ransom payment for decryption key
Question: Have you experienced ransomware before?
Malware
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
Example: computer virus, crypto-mining, ransomware
Sensor
input devices that record data about the physical environment around it
Example: Data recorded from a detection connected to a light, heat, motion
Question: