Security Operations 4.4 Flashcards

Explain security alerting and monitoring concepts and tools.

1
Q

Security Monitoring - Systems
What can be monitored?

A

Authentication - logins from strange places
Server monitoring - Service activity, backups software versions.
Applications - availability - uptime and response times
Data transfers - increases or decreases in rates.
Security notifications - from the developer/manufacturer.
Infrastructure - Remove access systems. Employees, vendors, guests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Log aggregation

A

SIEM or SEM
Consolidate many different logs to a central database. Servers, firewall, VPN concentrators, SANs, cloud services.
Correlation between diverse systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scanning

A

A constantly changing threat landscape. Operating systems types and versions. Actively check systems and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reporting

A

Analyse the collected data,
Status information, number of devices up to date/in compliance
Devices running older operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Archiving

A

SIEM’s handle massive amounts of data. It would be too expensive to keep this dat in active storage and so they move it into offline archives. These are cheaper and can be restored later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alerting - Real-time notification of security events.

A

Important to make sure that the alerts a fine tuned. To avoid false positives and false negatives.
SMS/Text messages to alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

False positive?

A

When a non-attack is recorded as an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

False negative

A

A genuine attack not recorded by the systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quarantine

A

A foundational security response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SCAP

A

Security Content Automation Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Security Content Automation Protocol.

A

Consolidates all vulnerabilities into a single language that all devices understand.

Maintained by the national institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Using SCAP

A

Content can be shared between tools. The specification standard enables automation.
Automation types - ongoing monitoring,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benchmarks

A

Is is important to provide security best practices to everything. Operating systems, cloud providers, mobile devices etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Agents/agentless

A

Device installed to check to see if the device is compliance.

Agents usually provide more detail as they are always monitoring for real time notifications.

Agentless runs without a formal install. Performs the check, the disappears.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SIEM

A

Security information and event management
Log collection of security alerts
log aggregation and long term storage
data correlation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data loss prevention. Stop the data before the attacker gets it.
Often requires multiple solutions, Endpoint clients, cloud-based systems.

17
Q

SNMP (MIP)

A

Simple network management protocol.
Managers and monitors network devices such as routers and switches and provides reports back to the SNMP manager.

Often done in object identifiers. Values instead of specifics activity data.

18
Q

SNMP Trap

A

alerting or alarming process. When the trap fires an alert is raised and said to the management station over udp/162.

19
Q

Netflow

A

Standard for monitoring traffic flows and looking at statistics relating to application use.

20
Q

Vulnerability scanners

A

Gathers information on potential vulnerabilities. Minimally invasive.