Week 3 Flashcards
What is the assumption behind SOIM?
The assumption is that we can’t, or won’t, fully protect our cyber environment
What is the MAPE-K model for cybersecurity?
Monitor, Analyse, Plan, Execute - Knowledge
What could be described as an architecture for adaptive systems?
MAPE-K
It is like an event-driven loop
What are the three workflows of SOIM?
-IDPS
-SIEM
-SOAR
What is CTI?
Cyber Threat Intelligence: Detailed knowledge of threats against an organisation
What is ISAC?
Information Sharing and Analysis Centers: Organisations that gather data on security threats
Why is it so crucial to maintain an internal knowledge base?
To be able to cross-reference events with known intelligence
What is an example of an open, commercial database of cybersecurity intelligence?
Mitre ATT&CK
Why are honeypots important to SOIM?
We can learn both about hacker techniques as well as who they are
What are examples of CTI that should be shared?
Signatures for different platforms, snort rule sets, YARA signature exchange, Indicators of Compromise (IoC)
What official European body can help increase our situational awareness of current cyber threats?
ENISA
Incident response is roughly divided into two tasks:
-Establishing capabilities
-Incident handling
Who should be part of a Computer Security Incident Response Team (CSIRT)?
Technical staff, legal, public relations, HR
Which five things should be part of the incident response plan?
-Incident classification
-Response list
-Resources available
-Communication plan (who to talk to and when)
-Contingency plan (prioritisation)
What types of resources need to be easily available during an incident response?
-Backup internet connection
-Backup recovery plan
-Empty removable storage
-Backup power
-Backup laptops with correct tools
-Evidence gathering gear
What is investigated during the analysis part of MAPE-K?
The nature of the incident and the damage caused