1.7 Summarize the techniques used in security assessments Flashcards

1
Q

Summarize Threat Hunting

A

It’s like a game of cat and mouse; you need to find the attackers before they find you. Strategies are constantly changing to guard against attacks. Intel data is reactive; you can’t see the attack until it happens. The goal then becomes to speed up the reaction time or to prevent the attacker from even arriving to your network in the first place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Summarize Intelligent Fusion

A

The goal of intelligence fusion is to fuse all the overwhelming amounts of security data into a database with big data analytics so that it becomes easier to analyze and sift through the various different types of data to find interesting data points and correlations. This makes it easier rather than parsing through all that raw security data individually. You do this by collecting all the data from various software and hardware, adding external sources that show the up-to-date problems, and begin to focus on predictive analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Summarize Threat Feeds

A

It is an ongoing stream of data related to potential or current threats to an organization’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Summarize Advisories and Bulletins

A

These are announcements made by the organizations providing security issues or information about their products. This is more in-depth than threat feeds because it provides threat intel on a specific vulnerability in a particular hardware or software product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Summarize Maneuvers

A

Describes how we maneuver our security software/hardware to do various tasks that we need to accomplish; things like firewalls, IPS, IDS, Antiviruses, etc. These can be automated and move at the speed of light and react instantly. When this is combined with intel fusion, it can be prepared for many different intrusions and become better at predictive analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Summarize Vulnerability Scans

A

These are scans designed to look at potential vulnerabilities from operating systems, network devices, and applications. They are usually minimally invasive unlike penetration tests. It looks at these things from the outside to see if there is potential for those vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Summarize False Positives

A

They are vulnerabilities that are identified but don’t really exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Summarize False Negatives

A

It is a vulnerability that exists but you couldn’t detect it. In order to resolve this, you’ll need to make sure that you have the latest signatures. Make sure to work with a vulnerability detection manufacturer to make sure they update their lists as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Summarize Log Reviews

A

Low reviews can help list the out the vulnerabilities on your system like a lack of security controls (No firewall, No anti-virus, No anti-spyware) or it’ll show misconfigurations like open shares, guest access. It is good for identifying that a software needs to be updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Summarize Credentialed vs. Non-credentialed

A

A non-credentialed scan is a scan from someone who doesn’t have the credentials to gain permissions and access to the network. Think of it as a user outside your network trying to scan it.

A credentialed is a scan is when you’re a normal user that has the credentials and this emulates an insider threat. This is a user that has rights and privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Summarize Application Scans

A

These are scans that check vulnerabilities in software that is on a webserver or mobile/desktop apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Summarize Intrusive vs. Non-intrusive scans

A

A non-intrusive scan tries to gather information and don’t try to exploit a vulnerability.

An intrusive scan will try to exploit that vulnerability to see if it works. These usually take the place as penetration tests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Summarize Common Vulnerability and Exposures(CVE)/Common Vulnerability Scoring System

A

These are summaries of vulnerabilities are and what they do, their scoring of how bad they are, and how to mitigate and protect against these.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Summarize Configuration Review

A

You need to validate the security of device configurations. It is easy to misconfigure one thing.

Workstation need account configs, local device settings

Servers need access controls, permission settings

Security devices need firewall rules, authentication options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Summarize Syslog/Security Information and Event Management (SIEM)

A

A SIEM is designed to collect anything on the network that can create log files, security alerts, or any type of real time information that can tell us what is going on in the network. It is commonly used as a central repository where all logs are aggregated. You can see data correlation that can help paint a picture as to what is going on even if the data sources are very different from different devices. Perfect place for forensics after an event has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Summarize SIEM Review reports

A

These will take all the logs and put them into a readable format that can be used to easily identify issues and easy to understand how severe the issues are.

17
Q

Summarize SIEM Packet capture

A

These can help with monitoring the network and it can further assist in painting a picture of what is occurring.

18
Q

Summarize SIEM Data Input

A

The different type of data that is stored on a SIEM can be Server authentication attempts, VPN connections, Firewall session Logs, Denied outbound traffic flows, network utilizations.

19
Q

Summarize SIEM User Behavior Analysis

A

This will look into how people are acting. It can be used to detect insider threats, identify targeted attacks, and can catch what the SIEM and DLP systems might miss.

20
Q

Summarize SIEM Sentiment Analysis

A

This reviews how the public views the organization. Public discourse correlates to real-world behavior. If they hate you, they hack you. Social media can be a barometer.

21
Q

Summarize SIEM Security monitoring

A

It monitors certain flags in information that can help create triggers to automate responses (create a ticket, reboot a server). Security monitoring can track important statistics like when exceptions occur. It can send alerts when problems are found.

22
Q

Summarize SIEM Log aggregation

A

It’s when all kinds of logs are collected that can be used to create statistics, predictive analysis, etc.

23
Q

Summarize SIEM Log collectors

A

A syslog is considered a log collector that is integrated into a SIEM and it wait for all of these diverse devices to send logs to this SIEM.

24
Q

Summarize Security orchestration,

automation, and response (SOAR)

A

The goal is to take all of these security processes that were manual and make it automated so it can perform at the speed of computers.
Orchestration means to connect many different tools together like firewalls, account management, email filters, etc.
Automation is used to handle tasks automatically
Response can means to respond to these occurrences very quickly.