Primary Definitions 23.0-27.0 Flashcards

(56 cards)

1
Q

Incident Response Process

A

Outlines a structured approach to manage and mitigate security incidents effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident

A

Act of violating an explicit or implied security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The 7 Phases of Incident Response

A

Preparation, Detection, Analysis, Containment, Eradication, Recovery, and Lessons Learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Root cause analysis

A

Identifies incident source and how to prevent it in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lessons learned process

A

Documents experiences during incident in formalized way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After-action report

A

Collects formalized information about what occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat Hunting

A

Cybersecurity method for finding hidden threats not caught by regular security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advisories and Bulletins

A

Published by vendors and security researchers when new TTPs and vulnerabilities are discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Forensic

A

Process of investigating and analyzing digital devices and data to uncover evidence for legal purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Order of Volatility

A

Dictates the sequence in which data sources should be collected and preserved based on their susceptibility to modification or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chain of Custody

A

Documented and verifiable record that tracks the handling, transfer, and preservation of digital evidence from the moment it is collected until it is presented in a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disk Imaging

A

Involves creating a bit-by-bit or logical copy of a storage device, preserving its entire content, including deleted files and unallocated space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

File Carving

A

Focuses on extracting files and data fragments from storage media without relying on the file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legal Hold

A

Formal notification that instructs employees to preserve all potentially relevant electronic data, documents, and records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Electronic Discovery

A

Process of identifying, collecting, and producing electronically stored information during potential legal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 Procedures of Digital Forensics

A

Identification, Collection, Analysis, and Reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

5 Steps of the Order of Volatility

A
  1. Collect data from the system’s memory
  2. Capture data from the system state
  3. Collect data from storage devices
  4. Capture network traffic and logs
  5. Collect remotely stored or archived data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Acquisition

A

The method and tools used to create a forensically sound copy of the data from a source device, such as system memory or a hard disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

6 Steps of Data Acquisition

A
  1. CPU registers and cache memory
  2. RAM, routing tables, ARP caches, process table, temporary swap files
  3. Data on persistent mass storage (HDD, SSD, Flash Drive)
  4. Remote logging and monitoring data
  5. Physical configuration and network topology
  6. Archival media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Log File

A

A file that records either events that occur in an operating system or other software that runs, or messages between different users of a communication software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Syslog/Rsyslog/Syslog-ng

A

Variations of syslog which all permit the logging of data from different types of systems in a central repository.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Journalctl

A

Linux command line utility used for querying and displaying logs from the journald (journal daemon), which is responsible for managing and storing log data on a Linux machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NXLog

A

A multi-platform log management tool that helps to easily identify security risks, policy breaches, or analyze operational problems.

24
Q

Sampled Flow (SFlow)

A

Provides a means for exporting truncated packets, together with interface counters for the purpose of network monitoring.

25
Internet Protocol Flow Information Export (IPFIX)
Universal standard of export for Internet Protocol flow information from routers, probes, and other devices that are used by mediation systems, account and billing systems, and network management systems to facilitate services.
26
Metadata
Data that describes other data by providing an underlying definition or description by summarizing basic information about data that makes finding and working with particular instances of data easier.
27
Dashboards
Visually display information from various systems, used in security operation centers for a comprehensive overview.
28
Automated Report
Computer-generated report created automatically.
29
Packet Capture
Gathers all data sent to or from a specific network device.
30
Automation
Automatic execution of tasks without manual involvement.
31
Orchestration
Coordination of the automated tasks for a specific outcome or workflow.
32
Security, Orchestration, Automation, and Response (SOAR)
Like a SIEM 2.0 because its automation capabilities allow it to serve in incident response.
33
Runbook
Automate versions of playbooks with human interaction points.
34
Technical Debt
Cost and complexity of poorly implemented software needing future adjustments.
35
Resource Provisioning
Allocating the necessary tools and resources that new employees need to perform their jobs.
36
Security Automation
Involves use of technology to handle repetitive security tasks and maintain consistent defenses.
37
Guardrails
Automated security controls to protect against insecure infrastructure configurations.
38
Service Access Management
A crucial area to prioritize in security automation for risk reduction and operational efficiency.
39
Continuous Integration (CI)
Practice in software development where developers merge code changes frequently in one place.
40
Release
Process of finalizing and preparing new software or updates.
41
Deployment
Involves automated process of software releases to users.
42
Continuous Delivery
Maintains deployable code with automation.
43
Continuous Deployment
Automates the process of deploying code changes from testing to production after completion of the build stage.
44
Integration
Process of combining different subsystems or components into one comprehensive system to ensure that they function properly together.
45
Application Programming Interface (API)
Set of rules and protocols that are used for building and integrating application software.
46
Representational State Transfer (REST)
Architectural style that uses standard HTTP methods and status codes, uniform resource identifiers, and MIME types.
47
Simple Object Access Protocol (SOAP)
Protocol that defines a strict standard with a set structure for the message, usually in XML format.
48
CURL
Tool to transfer data to or from a server using one of the supported protocols. The protocols it can use are HTTP, HTTPS, FTP, FTPS, SCP, SFTP, TFTP, DICT, TELNET, LDAP, FILE.
49
Security Awareness
Refers to the knowledge and understanding of potential threats.
50
Situational Awareness
Being mindful of surroundings, tasks, and the potential consequences of one's actions.
51
Operational Security (OPSEC)
Stresses data protection against social engineers for business aspects such as routines, project details, and internal procedures.
52
Handbook
Concise booklet offering detailed guidance on organization-specific procedures, guidelines, and best practices for individuals.
53
Remote Work
A work setup in which the employees work from locations outside a traditional office.
54
Hybrid Work
Combination of traditional office settings with remote work options.
55
Organizational Change Management (OCM)
Recognizing the human role in security, ensuring staff engagement, and policy adherence.
56
3 Phases to Develop Security Culture
Development, Execution, Reporting/Monitoring.