Domaine 4 : Opérations de sécurité Flashcards

(27 cards)

1
Q

What is the Principle of Least Privilege?

A

Users are granted only the permissions necessary to perform their job functions

This principle minimizes potential damage from malicious activities or accidental misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Discretionary Access Control (DAC) entail?

A

Resource owners determine access permissions.

DAC is common in standard operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Mandatory Access Control (MAC)?

A

Access decisions are based on fixed policies and classifications.

MAC is often used in environments requiring high security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Role-Based Access Control (RBAC).

A

Permissions are assigned based on user roles within an organization.

RBAC simplifies management by grouping users with similar access needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Rule-Based Access Control?

A

Access is determined by system-enforced rules set by administrators.

Examples include time-based restrictions or specific browser requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Attribute-Based Access Control (ABAC).

A

Access decisions are based on attributes (e.g., user, resource, environment).

ABAC allows for more granular and context-aware access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Time-of-Day Restrictions?

A

Access can be limited to specific times or days.

This enhances security by restricting access during non-business hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is continuous monitoring important in security?

A

It is vital for detecting unauthorized activities and potential threats.

Continuous monitoring helps in maintaining the integrity and security of systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What types of sources should logs be collected from?

A

Logs should be collected from:
* Firewalls
* Servers
* Applications

Collecting logs from various sources allows for comprehensive analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of analyzing logs in security monitoring?

A

To identify anomalies or suspicious activities.

Analyzing logs is crucial for proactive threat detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SIEM stand for?

A

Security Information and Event Management.

SIEM systems play a key role in security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of a SIEM system?

A

It aggregates and correlates data from multiple sources and provides real-time analysis and alerts for security incidents.

SIEM systems are essential for effective security incident management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are baselines used for in security monitoring?

A

To define normal behavior patterns for systems and networks.

Baselines help in detecting deviations that may indicate security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of alerting mechanisms in security monitoring?

A

To notify administrators of potential threats and ensure alerts are actionable while reducing false positives.

Effective alerting mechanisms are crucial for timely incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should regular auditing and review processes assess?

A

The effectiveness of security controls.

Periodic audits help in identifying areas for improvement in security monitoring strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: SIEM systems provide ________ analysis and alerts for security incidents.

17
Q

Why are logs important in system monitoring?

A

Logs are essential for monitoring system activities, detecting anomalies, and supporting forensic investigations

Logs provide a chronological record of events, aiding in identifying security incidents.

18
Q

What do system logs record?

A

Operating system events, such as startups, shutdowns, and errors

System logs provide insights into the overall health and status of the operating system.

19
Q

What do application logs capture?

A

Events specific to applications, including user activities and errors

Application logs are crucial for troubleshooting application-specific issues.

20
Q

What types of events do security logs track?

A

Security-related events like login attempts and access control changes

Security logs are vital for identifying potential security breaches.

21
Q

What is the purpose of audit logs?

A

Provide a trail of user activities for compliance and auditing purposes

Audit logs help organizations maintain accountability and meet regulatory requirements.

22
Q

What is centralized logging?

A

Aggregate logs from various sources into a centralized system for easier analysis

Centralized logging facilitates a unified view of log data across different systems.

23
Q

What is the importance of regular monitoring of logs?

A

Continuously monitor logs to detect unusual activities promptly

Regular monitoring helps in early detection of potential security threats.

24
Q

What should retention policies for logs establish?

A

How long logs should be retained based on regulatory requirements

Retention policies ensure compliance with legal and organizational standards.

25
Why is secure storage of logs crucial?
To prevent unauthorized access or tampering ## Footnote Secure storage protects the integrity and confidentiality of log data.
26
What tools can be used for analyzing log data?
Automated tools and Security Information and Event Management (SIEM) systems ## Footnote SIEM systems help in correlating events and identifying security threats efficiently.
27
What can be identified through analyzing log data?
Patterns and correlations that may indicate security threats ## Footnote Analyzing log data is essential for proactive security measures.