Real Exam 2 Written Flashcards
Describe the functionality of an IDS.
IDS is responsible for detecting unauthorized access or attacks against systems and networks. Can verify, itemize, and characterize threats from outside and inside the network.
Describe the three modes of detection for an IDS
Signature based - analyzes traffic for patterns associated with known attacks stored in database
Anomaly based - Analyzes traffic and compares it to normal or baseline traffic for deviations that might indicate attack
Rule/Heuristic based - Analyzes traffic by using pre-configured rules and an interface engine to determine when characteristics of an attack exists.
What is the Security Onion
Open-source linux application suite of tools that provides IDS and IPS functionality, security monitoring, and log analysis
What are the hardware requirements for the Security Onion
64-bit CPU, 4 cores, 8GB Ram 40-60GB Hard drive capacity
What is the purpose of a NSM (Describe the functionality of the 4 major utilities types found in SO)
Network security monitoring Collects and displays suspicious network activity Analyzes alerts of suspicious activity Collects packets for analysis Allows for overview of network activity 4 Major Utilities types in Security Onion IDS/IPS SNORT IDS session analysis OSSEC Session analysis BRO Visibility to logs SGUIL ELSA
Describe sources of Event Logs
Network devices/ appliances
End devices
IoT devices
What are the Cisco alert logging categories
0 emergency: System unstable 1 alert: Immediate action needed 2 critical: Critical conditions 3 error: Error conditions 4 warning: Warning conditions 5 notice: Normal, but significant condition 6 informational: Informational messages only 7 debug: Debugging messages
What can be used to centralize logs from network devices
A central logging server, centralized logging management application (SYSLOG)
What can be used to centralize logs from windows devices
A event log subscriber. A source and a collector. Have the source computer have the collector as an event log reader, enable windows remote management on the source
Describe the 3 major logs available in a Windows environment
SYSTEM: Operating System events
SECURITY: Security events
APPLICATION: Application Events
What are the three events seen in Windows logs?
Information: Events that describe the successful operation of a task, such as an application, driver, or service. E.g. when a network drive loads successfully
Warning: An event that is not necessarily significant, but may indicate a possible future problem
Error: An event that indicates a significant problem such as loss of data or loss of functionality. E.g. if a service fails to load during startup
Audited events appear in which Windows Log?
Security Event Log
Describe how RSYSLOG is configured and deployed on a LINUX computer
Install RSYSLOG
Configure RSYSLOG server to accept remote log messages
Configure RSYSLOG computer to send events to another server using UDP
What are the three default chains in IPtables?
Input chain- Incoming to firewall for packets going to local server
Output chain - Outgoing from Firewall, For packets generated locally and going out of the local server
Forward Chain - Packet for another NIC on local server
What are the three possible actions which can be taken to packets with IPtables?
Accept, Drop, and Reject
Where are RSYSLOG events stored by default in linux?
/var/log/message
Describe the functionality of Splunk
Splunk captures, indexes, and correlates real-time machine data in a searchable repository
Describe the functionality of ELSA
Log receiver, archiver, indexer, and web for incoming syslogs. Web interface to search through several types of logs.
Describe the functionality of Dumpit
Used to generate a physical memory dump snapshot of windows registry
Describe the functionality of Volatility
Analyzes ram in 32 and 64-bit systems as a raw dump or crash dump
Name four stakeholders involved in the IR process
HR, Legal, Marketing, and Management
Describe 6 common network signs of a security incident
BandWidth Consumption: abnormal, non-legit traffic
Beaconing: Traffic leaving at regular intervals from within attempting to phone home
Irregular peer-to-peer communication: abnormal communication between peers could indicate something like illegal file sharing
Rogue Devices: Wireless keyloggers that collect info and transmit to criminal
Unusual traffic spikes: Could be something like increase bandwidth usage or network traffic
Unknown scan sweeps: When a scan is taking place without a known penetration test or routing scan
Describe 10 common host signs of a security incident
Process consumption Memory consumption Hard drive capacity Unauthorized software Malicious processes Unauthorized privileges Data exfiltration Unauthorized changes
Describe any three containment techniques
Segmentation: Limits the scope of an incident by dividing the network into segments by using “barriers” to prevent the spread into other networks
Isolation: Blocking traffic to and from the device or by shutting down interfaces
Removal: Shutdown the device, but not advisable because you can erase volatile evidence