Domain 7.1: Security Operations Flashcards
Review operational security terms covering monitoring, response, and recovery processes.
Define:
Job Rotation
A security practice of moving employees among different jobs to prevent excessive system knowledge or control.
A security practice where employees are moved from one job to another within an organization. It is intended to prevent employees from gaining excessive knowledge or control over a particular system or process, reducing the risk of fraud or insider threats. It is used in personnel security and access control. Examples include rotating IT staff between different departments or rotating security guards on different shifts.
For more information, view this lecture on Administrative personnel controls.. Or visit this Wikipedia page.
Define:
Limited Maintenance
A strategy of providing only essential system updates, commonly applied to legacy systems or products being phased out.
The practice of providing only essential updates and fixes to a product or system, typically one that is nearing the end of its life cycle. During this stage, changes to the product or system are minimized and are usually focused on addressing critical vulnerabilities or significant operational issues. This practice is usually applied in an effort to manage resources effectively while planning for the replacement or retirement of the product or system.
Define:
Load Balancer
A device that distributes network or application traffic across multiple servers, ensuring performance and reliability.
A network device that distributes incoming network traffic across multiple servers or network resources to improve performance and availability. It is used in large-scale networks to distribute workloads evenly and to prevent a single server from becoming overwhelmed. Examples include load balancers in cloud computing environments and web applications.
For more information, view this lecture on Redundancy.. Or visit this Wikipedia page.
Define:
Load Balancing
Load balancing distributes network traffic or workload evenly across multiple servers or endpoints, improving performance, availability, and reliability for applications and services.
By preventing any single machine from being overwhelmed, load balancers reduce bottlenecks, session timeouts, and downtime. Techniques include round-robin scheduling, least connections, or dynamic load monitoring. In modern architectures, hardware or software-based solutions manage traffic distribution, scaling automatically to match demand. Properly implemented load balancing fosters seamless user experiences, resilient systems, and efficient resource utilization under varying loads.
For more information, view this lecture on Redundancy.. Or visit this Wikipedia page.
Define:
Loss Event
An occurrence causing negative effects on an organization’s assets, reputation, or operations.
Refers to a circumstance or occurrence that causes a negative impact on the assets, operations, or personnel of an organization. This can include data breaches, system failures, or other disruptions that lead to the loss of data, productivity, or financial resources. Understanding and preparing for potential loss events are crucial aspects of risk management and business continuity planning.
Or visit this Wikipedia page.
Define:
Maintenance Key
A specialized key used for performing system maintenance tasks, requiring protection to prevent abuse.
A maintenance key is a specialized type of cryptographic key that is designated specifically for performing maintenance or administrative functions on a system. This key facilitates secure access for tasks like updating software or managing hardware settings, but due to its elevated access privileges, it must be protected to avoid misuse or exploitation.
Define:
Managed Detection and Response
(MDR)
A security service providing continuous threat monitoring and real-time response.
A security service where a third-party provider continuously monitors a network for security threats and responds to them in real-time. It is used in organizations that do not have the resources or expertise to handle security threats on their own. Examples include monitoring network activity for malware and responding to cyberattacks.
Or visit this Wikipedia page.
Define:
Managed Security Services Providers
(MSSPs)
Companies offering outsourced security services like monitoring, firewalls, and anti-virus protection.
Specialized companies that provide outsourced monitoring and management of security systems and devices. Services often include managed firewalls, intrusion detection, virtual private networks, vulnerability scanning, and anti-viral services, among others. MSSPs offer their expertise and dedicated resources to help organizations secure their information systems, manage risk, and meet compliance demands.
Or visit this Wikipedia page.
Define:
Management Information System
(MIS)
An integrated system providing management with critical information for decision-making.
A Management Information System (MIS) is an integrated, user-machine system that provides management with critical information on a regular basis to support operational, tactical, and strategic decision-making processes. MIS encompasses a variety of components, including databases, software applications, hardware, and procedures, designed to compile and analyze data and deliver it as manageable information.
Or visit this Wikipedia page.
Define:
Mandatory Vacations
A control requiring employees to take time off, aiding in detecting fraud and reducing insider threat risks.
Mandatory vacations are a security and administrative control requiring employees to take uninterrupted time away from their specific job responsibilities. This policy is designed to help detect any fraudulent activities or inconsistencies in their absence, which might be concealed by their continuous presence. It’s often used in conjunction with job rotation and cross-training to strengthen internal controls and reduce the risk of fraud or error within an organization.
For more information, view this lecture on Administrative personnel controls..
Define:
Masqueraders
Individuals pretending to be authorized users to gain system or data access, posing significant security threats.
Individuals who pretend to be another user or entity to gain unauthorized access to systems or data. They might employ a range of techniques, from simple password guessing to sophisticated social engineering, in order to mislead systems or people into granting them access. Masquerading is a significant threat to both the integrity and confidentiality of data.
Define:
Maximum Tolerable Downtime / Maximum Allowable Downtime
(MTD) / (MAD)
The longest acceptable period a system can be down before causing unacceptable damage to an organization.
The longest period of time that a system or network can be down (unavailable or not operational) before the impact becomes unacceptable to the organization. This is a crucial concept in business continuity planning and disaster recovery, as it helps determine appropriate strategies to minimize downtime and its associated costs.
For more information, view this lecture on BIA (Business Impact Analysis). Or visit this Wikipedia page.
Define:
Maximum Tolerable Outages
(MTO)
The longest time essential services can be unavailable before stakeholders cannot tolerate the impact.
The maximum duration that an organization’s key products or services can be unavailable or undeliverable before stakeholders deem the situation intolerable. It’s a critical measure in business continuity and disaster recovery planning, used to inform recovery strategies and ensure timely restoration of functions following an outage.
For more information, view this lecture on BIA (Business Impact Analysis). Or visit this Wikipedia page.
Define:
Mean Time Between Failures or Mean Time To Failure
(MTBF) or (MTTF)
Indicators of system reliability measuring average time between failures or to failure.
Measures of reliability typically used in the context of hardware or systems. MTBF is the average time between system breakdowns or failures, while MTTF refers to the average time it takes for a non-repairable system or component to fail. Both metrics are crucial in planning maintenance schedules, resource allocation, and system design to improve reliability and availability.
For more information, view this lecture on BIA (Business Impact Analysis). Or visit this Wikipedia page.
Define:
Mean Time to Detect
(MTTD)
The average time to identify an issue within a system or network, important for rapid incident response.
The average time it takes to identify an issue or anomaly within a system or network, often a security incident or breach. Shorter MTTD values are preferred as they allow for quicker incident response, minimizing potential damage or disruption. It’s an important metric for monitoring system health and the effectiveness of security controls.
For more information, view this lecture on BIA (Business Impact Analysis).
Define:
Mean Time To Repair/Restore
(MTTR)
The average time taken to fix system components or restore operations after an outage.
The average time it takes to repair a faulty component or restore a system to full functionality after an outage. It’s a valuable metric in evaluating the efficiency of repair processes, and a shorter MTTR generally correlates with decreased downtime and improved system availability.
For more information, view this lecture on BIA (Business Impact Analysis). Or visit this Wikipedia page.
Define:
Memorandum of Agreement
(MOA)
A document outlining cooperative relationships and responsibilities, often including data protection terms.
A written agreement between two or more parties detailing the cooperative relationship to be undertaken. This often involves the delineation of responsibilities, sharing of resources, and defining the terms for data sharing or processing, which is critical for maintaining data integrity and security.
For more information, view this lecture on Personnel.. Or visit this Wikipedia page.
Define:
Memorandum of Understanding
(MOU)
A formal agreement outlining mutual goals and responsibilities of entities, used for partnerships involving sensitive data.
A formal document that outlines mutual goals, expectations, and responsibilities between two or more entities, often used to establish partnerships. It’s critical in setting up collaborations where data sharing or other interactions involving sensitive information are required, with an aim to ensure confidentiality, integrity, and availability of the shared resources.
For more information, view this lecture on Personnel.. Or visit this Wikipedia page.
Define:
Memory Dump
Recording and storing memory contents during a system crash for diagnostic purposes, may contain sensitive data.
A process in which the contents of memory are displayed and stored in case of an application or system crash. This information can be used to diagnose and identify the cause of a failure. However, these files may contain sensitive data and, if not managed properly, could present an avenue for data leakage.
Or visit this Wikipedia page.
Define:
Memory Scavenging
Technique to locate and use unused memory in a system, ensuring sensitive data is properly sanitized upon reallocation.
A technique used to identify and recover unused memory within a system. In terms of security, it’s crucial that once memory blocks are freed or repurposed, any sensitive data previously stored is properly sanitized to prevent information exposure to subsequent processes, effectively mitigating the risk of data leakage or exploitation.
Define:
Microservices
A software architecture that structures applications as small, independent services.
Microservices break down applications into loosely coupled, independently deployable services that each focus on a specific function. This architectural style increases scalability, resilience, and flexibility, allowing individual components to be updated or scaled without impacting the entire application, thereby enhancing overall development efficiency and system reliability.
For more information, view this lecture on Hardware architecture- Part 2. Or visit this Wikipedia page.
Define:
Mirrored Site
An exact copy of a website hosted on a different server, used for disaster recovery or load balancing.
A duplicate copy of a website or web application hosted on a different server or location. It is used to improve availability and reliability by providing a backup site in case the primary site becomes unavailable. Examples include disaster recovery sites and load-balanced sites.
For more information, view this lecture on Disaster Recovery sites.. Or visit this Wikipedia page.
Define:
Mission-Critical Application
An application pivotal to an organization’s operations, its failure would significantly impact business functions.
An application that is essential to the operation of an organization or business. It is used to classify applications based on their importance and the impact of their failure on the organization. Examples include financial systems, healthcare systems, and emergency response systems.
Define:
MITRE ATT&CK
(Adversarial Tactics, Techniques, and Common Knowledge)
A framework detailing adversary tactics and techniques to understand and defend against cyber threats.
A framework for understanding the tactics, techniques, and procedures (TTPs) used by attackers in cyber-attacks. It is used in IT security to help organizations identify and defend against potential threats by providing a comprehensive view of the various stages of an attack. Examples include using the framework to prioritize security measures and detect and respond to attacks in progress.
Or visit this Wikipedia page.