Week 1 Flashcards
What is Network Security Monitoring?
The collection, detection, and analysis of network security data providing indications and warning to detect and respond to instrusions.
Information Security is divided into what 4 domains?
Protect- focus on securing systems to prevent exploitation
Detect- detect compromises that are actively occurring or have occurred. Network Security Monitoring is included in this.
Respond - focus on response after compromise has occurred
Sustain- deals with management of people, processes and associated tech.
What is the difference between being Vulnerability-centric and Threat-centric
Vulnerability-centric focuses on “how” (config, software weaknesses, aka preventation)
Threat-centric focuses on “who” and “why” (adversaries, requires visibility into network and to collect and analyze data)
What is the difference between NSM and Continuous Monitoring?
NSM is threat centric
CM is vulnerability-centric and should be seen as complement to NSM not a substitute or variant for NSM
What three primary sections is NSM broken down into?
Collection
Detection
Analysis
Collection includes what tasks?
Defining where largest amount of risk exists
IDing threats
IDing relevant data sources
Refining collection portions
Configing SPAN ports to collect packet data
Building SAN storage for log retention
Configing data collection
What the most common categories of NSM data (6)
Full content data/ full packet capture Session Data Statistical Data Packet string Data Log Data Alert Data
What is Full content Data?
Provides full accounting for every data packet transmitted between 2 endpoints
Collects all info passed across network
Makes exact copies of traffic (pcap data format)
What is Session Data?
Summary of communication
Most flexible and useful forms
Doesn’t provide level of detail in Full packet data
Small size allowed retention for longer time
What core elements exist in Session Data
timestamp Source IP address Source port Dest IP address des. port protocol application bytes
slide 29 for image
What is Statistical Data
Organization, analysis, interpretation and presentation of other types of data
What is Packet String Data
Derived from FPC data
Exists as intermediate data form between FPC data and session data
Provides granularity while maintaining a size that is more manageable
Describe Log Data
Generated from devices, systems or applications
includes web proxy logs, router and firewall logs, VPN auth. logs, Win security logs, SYSLOG data
What is Alert Data
The notification generated by detection tool when locates anomaly within data it is configured to examine
Contains a description of alert along with pointer to anomalous data
Explain Detection
Alerts are generated based on unexpected events and data
Examples:
Snort IDS and Bro IDS (network intrustion detection sys)
OSSEC, AIDE, McAfee HIPS (host intrusion detection sys)