Logging user events Flashcards

1
Q

What is considered a security event?

A

Every activity on a system, from loging to sending an email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why should all these events be logged?

A

To monitor behaviour, especially user behaviour, in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to organisations monitor logs?

A

Organisations will examine the electronic audit log files of confidential information for signs of unauthorised activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens if unauthorised activities or attempts are found?

A

Data can be moved to a control database for additional investigations and necessary action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When can security event logging and monitoring only work

A

When it is part of an effective data collection and analysis process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do security logs contain?

A

Mass of data to the point where it will be near impossible for a human to effectively identify threats within it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the key to effective security logging and monitoring?

A

The ability to filter out unecessary information and focus solely on critical events that could compromise the integrity and/or availability of confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Critical Events(Reconnaissance against systems)

A

Adversaries perform research on computing environments that could be their next target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Critical Events(Weaponisation)

A

An intrusion with a computing environment when adversaries decided to take action against a network or IT system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Critical Events(Delivery)

A

The manifestation of an exploit against a vulnerability within a network or IT system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Critical Events(Installation of malware)

A

observed when an adversary has modified native functionality of a network or IT system to maintain persitstance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Critical Events(Command and control)

A

When criminal hackers gain access to a server and system and effectively take control of a computing environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Critical Events(Action begins)

A

Determining what the adversary does and maintaining visibility of them at all times in critical; it is vital to understand their desired goal and prevent the successful intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly