Network Analyst
Cyber operator whose main focus is infrastructure devices & netflow. Responsible for handling cyber incidents, network security
What are the benefits of a network analyst?
In depth knowledge of common network protocols, packet formats, & infrastructure security vulnerabilities
Network Baseline
Defines what is normal for enterprise netflow and ports, protocols & services used at a predetermined level
What are the benefits of a network baseline?
Cyber Threat Intelligence (CTI)
Knowledge about adversaries
What are the benefits of Cyber Threat Intelligence (CTI)?
Network Artifacts
Piece of network traffic data that may be relevant to an investigated response
What are the benefits of network artifacts?
What are some things that could be network artifacts?
Logs (router, switch, firewall, DNS, web proxy, etc), files/directories (names, timestamps, sizes, hashes), registry keys
Network Triage
A process for sorting network violations into groups based on need for or likely benefit from immediate attention
What is the benefit of network triage?
Helps the network analyst & the unit prioritize important systems to prevent mission failure
Sandbox
Highly controlled environment used to test unverified programs or malicious software
What are the benefits of sandboxes?
Safely examine suspicious files
Intrusion Detection System
Device or software application that passively monitors a network or systems for malicious activity or policy violations; “Man-on-the-Side”
What are the benefits of intrusion detection systems?
Intrusion Prevention System
Preemptive network security approach that uses techniques to detect and block possible intrusion attempts into a network
What are the benefits of intrusion prevention systems?
Security Info & Event Management (SIEM)
A group of technologies that together provide a bird’s eye view of the network
What are the benefits of SIEMs?
What is the difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?
An IDS passively monitors while an IPS actively tries to prevent possible intrusions
Full Packet Capture
File containing original packet data as seen at collection point (*.pcap, *.pcapng, *.cap, *.dmp)
What are the benefits of Full Packet Capture?
What are the drawbacks of Full Packet Capture?
NetFlow