A security administrator has been tasked with improving an organization’s security stance. The administrator has collected and processed data and used the information to establish a hypothesis. What process is the administrator performing?
Threat hunting is a complex and often expensive process, and for most organizations, it requires the use of outside security professionals
Threat Hunting
Threat hunting is used to identify man-made or natural events that could adversely impact an organization | Threat hunting aims to identify threats that are not easily recognizable or are difficult to detect using common security or risk analysis tools | Once threats to an org are identified, the organization’s vulnerability to those threats can be evaluated and modeled.
What is Threat modeling?
Threat modeling the process of identifying and evaluating threats | This is an important part of risk analysis
What is the primary benefit of TPM technology?
The primary benefit of TPM is that it facilitates whole disk encryption
What is the role of continuous integration in streamlining the software development process?
To roll validated changes back into the main branch more quickly
What information should be used when determining how best to prioritize response actions to identified vulnerabilities?
Being out of compliance could lead to legal liabilities, which could result in fines and other actions
What technology can an administrator use to mitigate the risk of sensitive data being vulnerable to sniffing?
The administrator can use IPsec to mitigate the risk of a sniffing attack
Other protocols such as IPsec encrypt all data between two nodes, regardless of the application being used
How is bus encryption used in PCs?
One use of bus encryption in PCs is to help enforce digital rights management (DRM), which are access control techniques that are used to protect copyrighted materials and proprietary hardware.
Bus encryption uses encrypted program instructions on a computer data bus | Bus encryption is used on PCs that are running Microsoft OS(s) to help protect certificates, passwords, and program authenticity | Bus encryption is also used in electronic systems that need high security, such as ATMs
Notes on PowerShell
PowerShell is a shell, or CLI, and scripting language that can be run on Windows, Linux, and MacOS operating systems.
Unlike most shells, PowerShell can ingest, process, and return objects that are structured data
What is Email Harvesting?
Email harvesting the process of using different means to collect email addresses
The addresses can then be used to launch a phishing attack, which is a deceptive communication attack that is used to steal personal information or login credentials
What is the most appropriate vulnerability scanner solution that must include computers deployed in the company’s DMZ, support remote offices with limited bandwidth connections, as well as meet vulnerability management requirements?
Agent-based scans
An agent-based solution proves the best support when scans must include remote locations with limited bandwidth connections and computers deployed in the DMZ | Agent-based scans are also best suited to providing threat management and continuous scans | Agent-based solutions rely on an agent installed on the scanned devices and they are based on pull technology
What are some indicators of data exfiltration?
Data exfiltration refers to the unauthorized movement of data to an external recipient or destination | Spontaneous restarts are not directly related to data exfiltration but could be an indicator of the malware orchestrating the data exfiltration or a symptom of overloading the host’s resources
What is Fingerprinting?
Fingerprinting the process of scanning networks and hosts in order to identify node OS(s), running services, and active security mechanisms
What are two technologies or methods that an org can use to passively monitor all inbound and outbound network traffic?
What is Fuzzing (Fuzz testing)?
Fuzzing is used to test software, OS(s) and networks to find and report vulnerabilities | Fuzzing is not effective in identifying other types of vulnerabilities that DO NOT result in system crashes from data input
Fuzzing a type of dynamic analysis that is used to look for coding errors or security vulnerabilities by inputting random data
Fuzzing works by flooding the test subject with massive amounts of data in an attempt to make the program crash | Result reporting provides information about vulnerabilities that can be exploited through:
What should cybersecurity team use to help them determine the criticality of an incident?
The team should use the Maximum Tolerable Downtime (MTD), which is also known as Maximum Allowable Downtime (MAD) to help them determine criticality
MTD refers to the maximum amount of time an organization can tolerate the loss of a resource
What are the typical criticality ratings?
Explain the difference between patch management vs configuration management
What does attack surface mean?
Attack surface the ways in which your network can be exploited by attackers, and it is often defined as the sum of your network’s vulnerabilities
Reducing your network’s vulnerabilities helps to reduce its attack surface
What are some types of static code analysis?
Remember: Static analysis is the process of examining the program code without executing it
What is the difference between netstat and nmap?
Which command should be used to capture network packets and write them to a text file?
tcpdump command should be used to capture network packets and write them to a text file
tcpdump command can also be used to print packet contents and to read packets from a saved packet file
What is a lightweight data interchange format that has become a popular alternative to XML due to its simplicity and flexibility?
JavaScript Object Notation (JSON)
Which programming language is commonly used for vulnerability scanning, malware analysis, network scanning and reconnaissance, web application penetration testing, and data analysis in cybersecurity?
Python