Domain 7: Security Operations Flashcards


Set Details Share
created 4 months ago by DPasik
updated 4 months ago by DPasik
Subjects:
cissp
show moreless
Page to share:
Embed this setcancel
COPY
code changes based on your size selection
Size:
X
Show:

1

IT Asset Management (ITAM)

  • Database of all IT assets
  • Includes firmware, software versions, locations, and ownership

2

Configuration Management Database (CMDB)

  • Central repository of asset configurations and settings
  • Works with ITAM
  • CI (Configuration Item): Individual entry in the CMDB

3

Privileged Users in IT

Includes:

  • System admins
  • Network admins
  • Security admins
  • DB admins
  • Help-desk
  • Custodians
  • Operators (legacy term for sys admins)

Supervisor Responsibilities:

  • Supervision (preventative)
  • Training & Awareness (detective)
  • Monitoring (detective – trust but verify)

4

Zero-Day Vulnerability

  • Attack occurs shortly after a vulnerability is discovered
  • No vendor fix available yet, or fix is brand-new and not installed

5

Incident Response Terminology

  • Event: Observable occurrence
  • Hazard: Precondition that could lead to an event
  • Incident: Adverse occurrence or policy violation

6

CIRT (Cyber Incident Response Team)

  • IRT (Incident Response Team)
  • CSIRT (Computer Security Incident Response Team)

7

Basic Incident Response Phases

  1. Detection and Triage
  2. Investigation
  3. Containment
  4. Analysis & Tracking
  5. Mitigation
  6. Recovery & Repair

8

(ISC)² Incident Response Phases

  • Detection
  • Response
  • Mitigation
  • Reporting
  • Recovery
  • Remediation
  • Lessons Learned

9

SANS Incident Response Phases

  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned

10

Logging an Incident

  • User-ID
  • Time & Date
  • Event Description
    Note:
    User's name is less important (may not be unique)

11

Threat Intelligence

Knowledge about current and emerging threats to help prevent or mitigate cyberattacks.
Sources:

  • Cybersecurity newsletters
  • Conferences
  • Social media
  • Dark Web research

12

UEBA (User and Entity Behavior Analytics)

Analyzing network activity to detect anomalous behavior.
Targets:

  • Insider threats
  • Compromised accounts
    Observes:
  • User behavior
  • Device usage
  • Security events

13

SOAR (Security Orchestration, Automation, and Response)

Term coined by Gartner to describe tools that automate repetitive security tasks.

Benefits:

  • Faster incident response
  • Increased team productivity
  • Improved efficiency

14

Software-Defined Security

Security model managed through policy-driven software.

Features:

  • Automates and monitors controls like IDS, network segmentation, and access controls
  • Centralized management of security infrastructure

15

SIEM (Security Information and Event Management)

Splunk, SolarWinds, Datadog

Function:

  • Aggregates and correlates logs from multiple sources
  • Helps security managers understand the IT environment and detect threats

16

SIEM Tuning

Reduce false positives without increasing false negatives.

Benefit:
Minimizes analyst fatigue and improves alert quality

17

Audit Log Reduction Tools

  • Clipping Levels: Only record violations above a set threshold
  • Event Filtering: Focus on significant events that require attention

18

Dr. Edmond Locard

Pioneer in forensic science
Locard’s Principle of Exchange:

  • Criminals bring something into the scene
  • Criminals leave with something from the scene
    Key Idea: Every encounter leaves a trace

19

Suspect Narrowing Strategy

Mnemonic: M.O.M.

  • Means – Did the suspect have the tools or ability?
  • Opportunity – Was the suspect present or able to commit the act?
  • Motive – Did the suspect have a reason?

20

Hearsay

Evidence based on what the witness was told, not what they personally know.

Note:
Not normally admissible in court.

21

Chain-of-Custody

Chronological documentation of evidence handling.

Must Track:

  • Who had the evidence
  • When it was handled
  • How it was protected
    Stages:
    Identification, Gathering, Protection, Access, Presentation

22

Interviewing

Discover what happened.

Method:

  • Gather info from witnesses and victims
  • Resolve conflicting stories and timelines

23

Interrogation

Obtain testimony or confession to be used as evidence in trial.

24

Expert Witness

Educates the jury on specialized topics.

Use:
Can be presented as evidence.

25

Evidence Admissibility Rules

Mnemonic: S.T.R.I.C.

  • S: No unlawful Search & Seizure
  • T: Evidence must be Trustworthy & Reliable
  • R: Evidence must be Relevant to the case
  • I: Proper Identification and Protection
  • C: Maintain Chain of Custody

26

Evidence Lifecycle

  1. Discovery
  2. Protection
  3. Recording
  4. Collection and Identification
  5. Analysis
  6. Storage, Transportation, Preservation
  7. Present in Court
  8. Return to Owner

27

Capturing Digital Evidence

Start from volatile forms, then move to persistent forms.

28

Order of Volatility (OOV)

  1. Live system info (RAM, process list, unsaved work, encryption keys)
  2. Virtual memory (paging/swap/temp files)
  3. Physical media (hard drives, DVDs, USBs, printouts)
  4. Backups & networks (backup media, servers, log files, cloud storage)

29

Hard Drive Analysis Process

  1. Install write-blocker (Forensic Disk Controller)
  2. Hash the drive
  3. Create forensic bit-level images
  4. Hash the images to verify integrity
  5. Use images for analysis

30

Slack Space

Disk areas with lingering data from deleted files.

Forensics Tip:
Inspect slack space for hidden data fragments.

31

Common Types of Evidence

  • Direct/Testimony: Witness statements
  • Real/Physical: Objects proving/disproving guilt
  • Documentary: Records, photos, manuals
  • Digital: Emails, backups, browser history
    • ⚠️ Less reliable due to tampering risks
  • Demonstrative: Models, timelines, re-enactments

32

Types of Evidence (Legal Definitions)

  • Conclusive: Irrefutable, cannot be contradicted
  • Corroborative: Supports existing evidence
  • Circumstantial: Implies facts without direct proof

33

Types of Digital Forensics

1. Media Analysis:

  • Examines computers, storage devices, printers, faxes, smartphones, data, files, photos, recycle-bin, etc.

2. Software Analysis:

  • Examines applications and their output
  • Analyzes malware and its consequences

3. Network Analysis:

  • Examines logs, ISP logs, tools used, and affected devices
  • Traces email headers to locate sources

34

Legal Terms in Digital Forensics

  • Legal Hold: Notice to preserve relevant evidence
  • eDiscovery: Locating and securing electronic evidence for trial
  • Search Warrant: Court order for search and seizure
  • Subpoena: Legal order for witness or evidence submission
  • Wire Tapping: Eavesdropping on communications (requires warrant or consent)

35

Categories of Computer Crime

  • Financial Attacks: Fraud, credit card theft, salami attacks
  • Business Attacks: Corporate espionage
  • Military & Intelligence Attacks
  • Hacktivist Attacks: Politically motivated hacking
  • Terrorist Attacks
  • Grudge Attacks
  • Thrill Attacks: For fun or bragging rights
  • Piracy of Intellectual Materials
  • Wire & Mail Fraud

36

Trusted Path

A secure communication path that ensures:

  1. Tamper-resistant data
  2. User awareness of authenticity
    • Example: SSL/TLS encryption

37

Types of IDPS (Detection/Prevention)

Network-Based IDPS:

  • Scans network traffic for attacks or intrusions

Host-Based IDPS:

  • Scans only the host it's installed on

Alternate Names for Host-Based IDPS:

  • HBSS (Host-Based Security Solution)
  • ESS (Endpoint Security Solution)
  • EDR (Endpoint Detection and Response)

38

Why Use Both Network & Host-Based IDPS?

  • Defense-in-Depth (layered security)
  • Host-based detects internal threats
  • Network-based can't read encrypted traffic
  • Devices may be taken off-site

39

IDPS Scanning Technologies

Signature-Based (Pattern Matching / Knowledge-Based):

  • Uses known attack signatures
  • Detects known threats

Behavior-Based (Anomaly-Based / Profile-Based):

  • Learns normal behavior profiles
  • Detects new or unknown threats
  • May use AI for analysis
  • Requires secure environment during learning phase

40

IDPS Detection Outcomes

True Postive - correctly identifies an intrusion

True Negative - correctly identifies no intrusion

False Positive - mistakenly flags legitimate traffic as intrusion

False Negative - fails to detect an actual intrusion

41

IDS Placement Scenarios

IDS Placement – Internet-Side of Firewall

Advantages:

  • Sees most attacks unfiltered from the Internet
  • Better visibility into external attack types and frequency
  • Can detect misconfigured firewalls if attacks exit the network

IDS Placement – LAN-Side of Firewall

Advantages:

  • Detects misconfigured firewalls if attacks enter the network
  • Better detection of insider threats
  • Less noise from external traffic → fewer false alarms

42

Honeypot / Honey-net

Fake targets designed to lure attackers

Benefits:

  • Protects real network
  • Observes attacker behavior
  • Acts as early-warning system
    Honey-net:
    A network of multiple honeypots

43

Padded Cell

Sandboxed honeypot environment

Function:
Attacker is redirected here by IDS

  • No harm can be done
  • Used for safe observation

44

Backup Strategy

Recover data in case of deletion, corruption, or alteration

3-2-1 Rule:

  • 3 copies of critical files
  • 2 backups on different media
  • 1 backup stored off-site

45

Backup Types

Onsite Backup:

  • Stored at same location as source
  • Enables rapid recovery

Offsite Backup:

  • Stored at a different, remote location
  • Protects against local disasters

Cloud Backup (Electronic Vaulting):

  • Scalable, high availability
  • Pay-as-you-go model

46

Backup Types & Schedule

  • Normal (Full): Resets archive bit on all files
  • Incremental: Backs up files changed since last backup
  • Differential: Backs up files changed since last full backup
  • Crash and Restore: Used for full system recovery

Example Schedule:

  • Monday: Full backup (file_a, file_b)
  • Tuesday: Incremental (file_c)
  • Wednesday: Incremental (file_d, file_e, file_f)
  • Thursday: Differential
  • Friday: Crash and Restore

47

Archive Bit

A flag attached to each file that is turned on when the file is edited.

Used by:
Incremental and differential backups to determine which files to back up.

48

Backup Restoration Rules

To restore a system:

  • Always need the latest full backup
  • Need all incrementals since the last full backup
  • Only need the last differential if using differential backups

Summary:
Latest full + last night’s + all incrementals in-between

49

Media Management Tips

  • Encrypt backup tapes
  • Physically protect tapes during transport and storage
  • Track first use-date and number of uses (tapes degrade over time)

50

Tape Rotation Schemes

  • Grandfather-Father-Son
  • Tower of Hanoi
  • Six Cartridge Weekly

Purpose:
Avoid overwriting important backups and maintain historical copies

51

File Sensitivity & CIA

  • Sensitive Files: Focus on Confidentiality
  • Critical Files: Focus on Integrity and Availability
  • Backups support all CIA elements

52

Disk Check

Checking the starting and ending sectors of each partition

Tool Example:
chkdsk (Microsoft command-line utility)

53

RAID 0

Type: Striping
Disks: 2–32
Purpose: Performance
Fault Tolerance: ❌ Not fault-tolerant

54

RAID 1

Type: Mirroring
Disks: Exactly 2
Purpose: Fault tolerance
Performance: ❌ Not for performance

55

RAID 5

Type: Striping with Distributed Parity
Disks: Minimum 3
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 1 disk

56

RAID 6

Type: Striping with Distributed Parity
Disks: Minimum 4
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 2 disks

57

RAID 10 (1+0)

Type: Mirrored RAID 0 or Striped RAID 1
Purpose: Combines performance and fault tolerance

58

NAS (Network Attached Storage)

Function: Local data storage and retrieval over LAN
Protocols: SMB/CIFS
Access: Direct user access

59

SAN (Storage Area Network)

Function: Centralized storage for servers
Protocols: iSCSI, Fibre Channel, FCoE
Access: No direct user access; servers retrieve data

60

VSAN (Virtual SAN)

Function: Logical separation of a physical SAN
Analogy: Like VLANs for networks

61

DLP (Data Loss Prevention)

Prevent sensitive data from leaving the organization

Types:

  • Network-based DLP: Scans outgoing data at the perimeter
  • Host-based DLP: Prevents copying, printing, or burning sensitive data on endpoints

62

NAS vs SAN Overview

NAS (Network Attached Storage):

  • Connected via LAN
  • Used by laptops/workstations
  • File-level access
  • Easier to manage, lower cost

SAN (Storage Area Network):

  • Connected via Fibre Channel (FC) switches
  • Used by servers
  • Block-level access
  • Higher performance, more complex

63

Disaster Recovery Locations

Mirrored Site

  • Full equipment
  • Full data
  • MINS TO HOURS

Hot Site

  • Full equipment
  • HOURS TO 1 DAY

Warm Site

  • Some equipments
  • DAYS

Cold Site

  • No equipment
  • WEEKS+

64

Reciprocal Agreement

  • Also called mutual-aid agreement
  • Two organizations agree to be each other's disaster recovery site

65

Dual Sites

  • Multiple live processing centers
  • Used for redundancy and fault-tolerance

66

Other Sites to Plan For:

  1. Press Conference Site
  2. Command Center Site
  • Backup site should be:
    • Far enough to avoid same disaster
    • Close enough for employee access

67

Resource Capacity Agreement

  • Pre-arranged vendor agreements
  • Ensures access to resources post-disruption

68

Miscellaneous Planning Tips

  • Use job titles in DRP, not names
  • People change roles or leave the company

69

Call-Tree / Call-List

  • You call 5 people → they each call 5 more
  • Ensures rapid communication during disaster

70

Disaster Recovery vs. Restoration

  • Recovery = Over to backup site
    (Memory trick: "recover" has "over")
  • Restoration = Back to original site
    (Memory trick: "restore" has "OR" for "original")

71

Restoration Steps

  • Confirm incident is over
  • Ensure safety of return
  • Document losses (photos, insurance)
  • Salvage assets
  • Perform repairs/replacements
  • Shut down alternate site
  • Conduct lessons learned/post-mortem

72

Checklist / Desk-Check

  • Each department gets a copy of the DRP
  • Run through a checklist to verify coverage of relevant points

73

Table-Top Review

  • Representatives meet to discuss the plan
  • No actual actions performed

74

Structured Walk-Through

  • Team physically walks to response locations
  • Verbally reviews each step for effectiveness

75

Simulation Test

  • Practice drill
  • Mobilize personnel to attempt reaching RTO (Recovery Time Objective)

76

Parallel Test

  • Run operations at alternate site in parallel with production

77

Full-Interruption Test

  • Shut down production environment
  • Run live operations at alternate site

78

DRP Testing Frequency

  • Minimum: Once per year
  • Also test when significant changes are made

79

DRP Miscellaneous

  • Update plan after major changes
  • Include version numbers on each copy
  • Consider setting an expiration date (e.g., 1 year)

80

Version Control for DRP

  1. Archive obsolete plans
  2. Collect old copies
  3. Confirm collection (e.g., serial numbers)
  4. Issue new plans
  5. Destroy old plans

81

Failure Modes

Fail Open

  • System opens access upon failure
  • Prioritizes high availability
  • Example: Firewall fails and allows all traffic

Fail Closed

  • System blocks access upon failure
  • Prioritizes confidentiality/security
  • Example: Firewall fails and blocks all traffic

Fail Secure

  • Fails into a pre-defined secure state
  • Example: Doors lock when system fails

Fail Soft

  • System enters reduced functionality
  • Hibernates or saves data
  • Terminates non-essential functions

Fail Safe

  • Prioritizes safety of people/property
  • May compromise security
  • Example: Doors unlock during failure

Fail Over

  • Switches to a hot backup site
  • Ensures continuity of operations