4.9 Log data Flashcards

(12 cards)

1
Q

Security log files

A
  • Detailed security-related information
    –Blocked and allowed traffic flows
    –Exploit attempts
    –Blocked URL categories
    –DNS sinkhole traffic
  • Critical security information
    –Documentation of every traffic flow
    –Summary of attack info
    –Correlate with other logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall logs

A

Traffic flows through the firewall
–Source/destination IP, port numbers, disposition
* Next Generation Firewalls (NGFW)
–Logs the application used,
–URL filtering categories, anomalies and suspicious data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application logs

A
  • Specific to the application
    –Information varies widely
  • Windows
    –Event Viewer / Application Log
  • Linux / macOS/
    –var/log
  • Parse the log details on the SIEM
    –Filter out unneeded information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Endpoint logs

A
  • Attackers often gain access to endpoints
    –Phones, laptops, tablets, desktops, servers, etc.
  • There’s a lot of data on the endpoint
    –Logon events, policy changes, system events,
    processes, account management, directory services,
    etc.
  • Everything rolls up to the SIEM
    –Security Information and Event Manager
  • Use with correlation of security events
    –Combine IPS events with endpoint status
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OS-specific security logs

A
  • OS security events
    –Monitoring apps
    –Brute force, file changes
    –Authentication details
  • Find problems before they happen
    –Brute force attacks
    –Disabled services
  • May require filtering
    –Don’t forward everything
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPS/IDS logs

A
  • Intrusion prevention system/Intrusion detection system
    –Usually integrated into an NGFW
  • Logs contain information about predefined
    vulnerabilities
    –Known OS vulnerabilities, generic security events
  • Common data points
    –Timestamp
    –Type or class of attack
    –Source and destination IP
    –Source and destination port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network logs

A
  • Switches, routers, access points, VPN concentrators
    –And other infrastructure devices
  • Network changes
    –Routing updates
    –Authentication issues
    –Network security issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Metadata

A
  • Metadata
    –Data that describes other data sources
  • Email
    –Header details, sending servers, destination address
  • Mobile
    –Type of phone, GPS location
  • Web
    –Operating system, browser type, IP address
  • Files
    –Name, address, phone number, title
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability scans

A
  • Lack of security controls
    –No firewall
    –No anti-virus
    –No anti-spyware
  • Misconfigurations
    –Open shares
    –Guest access
  • Real vulnerabilities
    –Especially newer ones
    –Occasionally the old ones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Automated reports

A

Most SIEMs include a report generator
–Automate common security reports
* May be easy or complex to create
–The SIEM may have its own report generator
–Third-party report generators may be able to
access the database
* Requires human intervention
–Someone has to read the reports
* These can be involved to create
–Huge data storage and extensive processing time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dashboards

A
  • Real-time status information
    –Get summaries on a single screen
  • Add or remove information
    –Most SIEMs and reporting systems allow for customization
  • Shows the most important data
    –Not designed for long-term analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet captures

A
  • Solve complex application issues
    –Get into the details
  • Gathers packets on the network
    –Or in the air
    –Sometimes built into the device
  • View detailed traffic information
    –Identify unknown traffic
    –Verify packet filtering and security controls
    –View a plain-language description of the application data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly