Network forensics Flashcards

(22 cards)

1
Q

Define internet

A

Collection of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an internet service provider (ISP)

A

Internet entry point
Username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of a Domain Name Service (DNS)

A

Translate IP addresses to named addresses or vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe IPv4

A

Binary representation
32-bit long divided into 4 8-bit groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of Network Address Translation (NAT)

A

Translates IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe firewalls

A

Key device to be considered
Combine deny/allow ruleset with IDS or IPS and controlling network access to applications
Creates a significant source of evidence that can be leveraged during an incident
Acquiring evidence is dependent on manufacturer and model used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the connection log

A

Provides source and destination IP addresses and protocols of connections between internal/external systems

Critical for determining if any internal system has contacted an adversary controlled systems or are possibly being controlled

Can also provide insight to where connections were denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe remote access logs

A

Show connected systems and what time they connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define network forensics

A

Systematic tracking of incoming/ outgoing traffic to ascertain how an attack was carried out or how an event occurred on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 2 main causes of abnormal traffic

A

Internal bug
Attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When are live acquisitions used

A

When dealing with active network intrusions/attacks
Before taking a system offline
-might leave footprints only in running processes or RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the sequence of storage devices in the order of volatility

A

Cache
RAM
Paging file
HDD
Logs on remote systems
Archive media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define volatility

A

Used to describe how data on a host system is maintained after changes such as log offs or power offs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is non-volatile data

A

Data stored on a hard drive that usually persists after shut down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the steps of live acquisition

A

Create or download a bootable forensic CD
Keep log of all your actions
Send information you collect to a network drive
Copy the physical memory (RAM)
Get forensic hash value for all recovered files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the standard procedure for network forensics

A

Always use a standard installation image for systems on a network

Close any way in after an attack
Attempt to retrieve all volatile data

Acquire all compromised devices

Compare forensic image files to original installation image

17
Q

Define packet sniffers

A

Devices/software that monitor network traffic
Most work at layer 2/3 of the OSI model

18
Q

What is a security operations center (SOC)

A

A team dedicated to securing an enterprise

Aims to detect, investigate, triage and respond to real-time and historical threats to reduce the cyber risk across the organisation

19
Q

What are the 3 main components of an SOC

A

The people- analysts, architects, managers, engineers

Technology and tools used in day-to-day operations

Frameworks and methodologies the team puts into practice

20
Q

What are the key steps of an SOC

A

Gather relevant evidence

Enrich with contextual knowledge

Pivot, filter and iterate

Integrate lessons learned

21
Q

What are the key issues faced by SOC investigations

A

Advanced Threat Actors

Lack of visibility

Time-intensive analysis

Alert fatigue

22
Q

Where do SOC investigations gather evidence from

A

Network
DNS
Firewall
Proxy
Access
Web
IDS
Threat intelligence