Week 1 Flashcards

1
Q

What is Network Security Monitoring?

A

The collection, detection, and analysis of network security data providing indications and warning to detect and respond to instrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Security is divided into what 4 domains?

A

Protect- focus on securing systems to prevent exploitation
Detect- detect compromises that are actively occurring or have occurred. Network Security Monitoring is included in this.
Respond - focus on response after compromise has occurred
Sustain- deals with management of people, processes and associated tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between being Vulnerability-centric and Threat-centric

A

Vulnerability-centric focuses on “how” (config, software weaknesses, aka preventation)

Threat-centric focuses on “who” and “why” (adversaries, requires visibility into network and to collect and analyze data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between NSM and Continuous Monitoring?

A

NSM is threat centric

CM is vulnerability-centric and should be seen as complement to NSM not a substitute or variant for NSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What three primary sections is NSM broken down into?

A

Collection
Detection
Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Collection includes what tasks?

A

Defining where largest amount of risk exists
IDing threats
IDing relevant data sources
Refining collection portions
Configing SPAN ports to collect packet data
Building SAN storage for log retention
Configing data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What the most common categories of NSM data (6)

A
Full content data/ full packet capture
Session Data
Statistical Data
Packet string Data
Log Data
Alert Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Full content Data?

A

Provides full accounting for every data packet transmitted between 2 endpoints
Collects all info passed across network
Makes exact copies of traffic (pcap data format)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Session Data?

A

Summary of communication
Most flexible and useful forms
Doesn’t provide level of detail in Full packet data
Small size allowed retention for longer time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What core elements exist in Session Data

A
timestamp
Source IP address
Source port
Dest IP address
des. port
protocol
application bytes

slide 29 for image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Statistical Data

A

Organization, analysis, interpretation and presentation of other types of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Packet String Data

A

Derived from FPC data
Exists as intermediate data form between FPC data and session data
Provides granularity while maintaining a size that is more manageable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Log Data

A

Generated from devices, systems or applications

includes web proxy logs, router and firewall logs, VPN auth. logs, Win security logs, SYSLOG data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Alert Data

A

The notification generated by detection tool when locates anomaly within data it is configured to examine
Contains a description of alert along with pointer to anomalous data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Detection

A

Alerts are generated based on unexpected events and data
Examples:
Snort IDS and Bro IDS (network intrustion detection sys)
OSSEC, AIDE, McAfee HIPS (host intrusion detection sys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly