ECIH

 0    128 fiszek    dawidwilk3
ściągnij mp3 drukuj graj sprawdź się
 
Pytanie Odpowiedź
Security police - permissive
rozpocznij naukę
open with blacklisting
Security police - prudent
rozpocznij naukę
clsoed with whitelisting
Security police - paranoid
rozpocznij naukę
no internet connection, forbids everything
Motive
rozpocznij naukę
if server stores something valuable
Incident management
rozpocznij naukę
Identify, analyze, prioritize and resolve incident to restore normal operation asap
Triage
rozpocznij naukę
Analyze, validate, categorize
Root cause
rozpocznij naukę
found in (6) Evidence Gathering and Forensics, eliminated in (7) Eradication
Vulnerability assemsent
rozpocznij naukę
pen testing to identify vulnerabilities
Threat assesment
rozpocznij naukę
process of analyzing data to create TI. Threat data is confronted with actual systems to match real-worl attacks
Threat correlation
rozpocznij naukę
reduces False-positives
Risk
rozpocznij naukę
degree of uncertainty or expectation of potential damage
Risk =
rozpocznij naukę
Threats X Vulnerabilities
Risk mitigation strategiy: Assumption
rozpocznij naukę
accept risk/bring to acceptable level
Risk mitigation strategy: Avoidance
rozpocznij naukę
Shutting down systems
Risk mitigation strategy: Limitation
rozpocznij naukę
use of supportive preventive and detective controls
Risk mitigation strategy: Planning
rozpocznij naukę
be prepared? know how to act
Risk mitigation strategiy: Research and Acknowledgement
rozpocznij naukę
analyze culnerabilities to countermeasure
Risk mitigation strategiy: Transference
rozpocznij naukę
insurance
CAT 0
rozpocznij naukę
Exercise/Network Defense Testing - not applicable (hrs)
CAT 1
rozpocznij naukę
Unauthorized Access - 1 (hrs)
CAT 2
rozpocznij naukę
DoS - 2(hrs)
CAT 3
rozpocznij naukę
Malicious code - Daily
CAT 4
rozpocznij naukę
Inappropriate usage - Weekly
CAT 5
rozpocznij naukę
Scans/Probes/Attempted Access - Monthly
CAT 6
rozpocznij naukę
Invetigation - not apllicable (hrs)
Setting up computer forensics lab
rozpocznij naukę
1) Planning and budgeting 2) Physical location 3) Work area considerations 4) Human resource consideration 5) Physical security recommendations 6) Forensics lab licensing
TRIAGE: Analysis and Validation
rozpocznij naukę
analyze indicators. examine security solutions. Log analysis, event correlation, natwork and system profiling, network traffiic and bandwidth, checksum, FIM
TRIAGE: Incident Classification
rozpocznij naukę
correlates severity, nature, criticality
TRIAGE: Prioritization
rozpocznij naukę
LOW - lss of passwd, scans and probes, wirus or worm. MIDDLE - unauthorized access, unflierdly employee termination, virus/work outbreeak. HIGH - dos, computer break-in, violation of law, cyber terrorism, damage over 100k$
Forensics policy
rozpocznij naukę
set of procedures to preserve and extract forensics evidence
Evidence bag content list
rozpocznij naukę
1) date and time 2) info of incider responder who seized info 3) exhibit number 4) site from which was siezed 5) details of content of the bag 6) submitting agencies and addresses
Volatile data includes:
rozpocznij naukę
psswd in clear text, executed commands, loging info, trojan horses, open ports, date and time, attached devices
Order of volatility
rozpocznij naukę
1) Registry and Cache 2) routing tables, processes, kernel 3) temp system files 4) disk and storage devices 5) remote logging 6) physical conf and network topology 7) archival media
uptime check tools
rozpocznij naukę
1 - PsUpTime(win) 2 - NetStatistics(Linux) 3 - Uptime and W(Linux)
Trojan
rozpocznij naukę
hidden in harmless, To control or damage systems, activated BY USER. Steal info, damage host
Backdoor
rozpocznij naukę
installed without user knowledge
rootkit
rozpocznij naukę
gain root by exploiting vulnerabilities
ransomware
rozpocznij naukę
usually spread by trojans
Virus
rozpocznij naukę
self-replicatin, withour user knowledge, can spread with assistance of user
Worms
rozpocznij naukę
spread without human intervention. To overload system. some carry payload to damage systems. Used to isntall backdoor
backdoor trojans
rozpocznij naukę
used to create botnet
Pharming
rozpocznij naukę
redirects web traffic to malicious site - DNS cache poisoning or HostFile modification
Spimming
rozpocznij naukę
exploits instans messages systems
puddle phishing
rozpocznij naukę
small orghanizations
CEO scam
rozpocznij naukę
spoofed CEO address
Mole detection
rozpocznij naukę
piece of fake info is given
Profiling
rozpocznij naukę
Observing behaviour. Everyone is different so profiling defines pattern of normality
Behavioral Analysis
rozpocznij naukę
compare past behavious also with other users. build profiles for each group, UEBA, SIEM, DLP. discover outliners in each group. Uses machine learning
DNS footprinting
rozpocznij naukę
DNS footprinting - extracting DNS info from public resources
DDoS Eradication: Egress filtering
rozpocznij naukę
DDoS Eradication: Egress filtering - scans leaving IP packets headers
DDoS Eradication: Ingress filtering
rozpocznij naukę
DDoS Eradication: Ingress filtering - prevents spoofing and flooding attacks
DDoS Eradication: Rate Limiting
rozpocznij naukę
DDoS Eradication: Rate Limiting - controls rate of outbound or inbound traffic
DDoS Eradication: RFC 3704 Filtering
rozpocznij naukę
DDoS Eradication: RFC 3704 Filtering - deying traffic with spoofed addresses - bogon list
CBCC LOG name: output
rozpocznij naukę
CBCC LOG name: output: 0-minimal info 1-bit more info, flags bits, previous LSN 2-detailed info 3-full info about each operation 4-same as 3 but with hex dump
Containment of Insider
rozpocznij naukę
Containment of Insider - seize all allocated devices, proper legal actions, inform about potential loss, and many abvious more
Eradicating insider
rozpocznij naukę
Eradicating insider - DCAP (Data centric audit and protection) monitoring and analyze user privilages, detecting unauthorized changes. And many more
Vulnerability
rozpocznij naukę
Vulnerability - existence of weakness, when exploited leads to compromise of a system
Threat
rozpocznij naukę
Threat - unddesired event - something that exists. The impact is potentially hazardous
Quantitive Risk
rozpocznij naukę
Quantitive Risk - deeper wiev (for example blood test)
Qualitative Risk
rozpocznij naukę
Qualitative - consequence X likelihood. (for example questions asked by doctors - simple)
Email bombing
rozpocznij naukę
Email bombing - sending email message to specific address
PKI
rozpocznij naukę
PKI - PUBLIC KEY INFRASTRUCTURE
Botnet
rozpocznij naukę
botnet - used to perform DDoS
Forensic readiness
rozpocznij naukę
Forensic readiness - organiztion ability to make optimal use of digital evidence
Forensics readiness plan
rozpocznij naukę
Forensics readiness plan - refers to set of procedures to achieve and maintain forensisc readiness
Forensisc Policy
rozpocznij naukę
Forensic Policy - set of procedures describing the actions to preserve and extract forensics evidence
Information Security Policy
rozpocznij naukę
Information Security Policy - basic security, requirements and rules to implement in order to protect and secure assets
Incident Management
rozpocznij naukę
Incident Management - set of defined processes to identify, analyze prioritize and resolve security incidents to restore to normal state
Policy
rozpocznij naukę
Policy - set of guidelines used to achieve goals
Pharming
rozpocznij naukę
pharming - aka domain spoofing. advanced form of phishing where attacker redirects connection
Risk Management
rozpocznij naukę
Risk Management - set of policies and procedures to identify, assess, prioritze, minimalize and control risks
Risk Assesment
rozpocznij naukę
Risk Assessment - refers to identification of the risk, estimate impact, and recommending mitigation measures
Risk Mitigation
rozpocznij naukę
Risk Mitigation - strategic approach to preparing to handle risks and reduce impact
Risk Determination
rozpocznij naukę
Risk Determination - crucial task in risk assessment. complex process based on various tangibler and intangible factors
Risk Management plan
rozpocznij naukę
Risk Management plan - defined as process designed to identify, eliminate and mitigate risks
Skimming
rozpocznij naukę
Skimming - stealing credit/debit card numbers by using special devices called skimmers
Threat Assessment
rozpocznij naukę
Threat Assessment - process of examining, filtering, modeling threat data to extract threat intelligence
Vulnerability Assesment
rozpocznij naukę
Vulnerability Assessment - zarzadzanie podatnosciami - skany, wiedza o podatnosciach, otwarte porty, miskonfiguracje. is the examination of the ability of system including curret sec. controls and rpocedures to withsand assault
Vulnerability assesment phase
rozpocznij naukę
Vulnerability assessment phase - refers to identifying vulns in infrastructure
Eradicating email
rozpocznij naukę
Eradicating email: use DNS filtering, disasble automatic download, new accouts
Threat intelligence
rozpocznij naukę
Threat intelligence - identify and minitage various risks
Identify risk by performing threat and vulnerability assessment
rozpocznij naukę
Identify risk by performing threat and vulnerability assessment
BEST PRACTICES IH&R - OWASP
rozpocznij naukę
BEST PRACTICES IH&R - OWASP - 1) Audit 2) Create response team 3) create documented IR plan 4) identify triggers 5) investigate problem, 6) triage and mitigate 7) recovery 8) document and report 9) process review 10) practise
BEST PRACTICES IH&R - ENISA (european)
rozpocznij naukę
BEST PRACTICES IH&R - ENISA (european): 1)develop workflow 2) develop IH process 3) legal officer 4) monitor netwrok 5) incident identification 6) final classification 7) up to date policies 8) eradication and revocery
BEST PRACTICES IH&R - GPG18 and Forensics REadiness Planning
rozpocznij naukę
BEST PRACTICES IH&R - GPG18 and Forensics REadiness Planning - 1) must develop forensics plan 2) which should be owned by director 3) should seek standard for forensics. 12 in total
Post incident avtivities
rozpocznij naukę
Post incident avtivities - 1) incident documentation 2) incident impact assesment 3) review and revise policies 4) close investigation 5) incident disclosure
Incident impact assesment
rozpocznij naukę
Incident impact assessment - determining losees (all types), find list of affeceted devices, finantial impact will help determine motive and perpetrator
DATE AND TIME are volatile
rozpocznij naukę
DATE AND TIME are volatile
Malware is most common threat
rozpocznij naukę
Malware is the most common threat - separate infected systems
Malware detection: Live systems/dynamic analysis
rozpocznij naukę
Malware detection: Live systems/dynamic analysis - analyzing live systems in operation. behavioral analysis. detects changes to the entities in system
Malware detection: memory dump/staticanalysis
rozpocznij naukę
Malware detection: memory dump/staticanalysis - analysis of memory dump or binary code
Malware detection: Intrustion analysis
rozpocznij naukę
Malware detection: Intrustion analysis - analysis of logs and alerts from systems
Guidelines for malware incidents:
rozpocznij naukę
Guidelines for malware incidents: educate, security policy, deal asap, monitor USB and downloads, seubscribe to sec bulletins, effective backup plan
Mail storming
rozpocznij naukę
Mail storming - like a bug, without human intervention, auto-forwarding
Preparation for email incidents includes
rozpocznij naukę
Preparation for email incidents includes - TRAINING AND AWARNESS PROGRAM
Network Unauthorized access Incidents include:
rozpocznij naukę
Network Unauthorized access Incidents include: Recon attacks, sniffing and spoofing, dns arp poisoning, firewall and IDS evasions attacks, Brute force
Only educationg employess can protect from social engineering
rozpocznij naukę
Only educationg employers can protect from social engineering
Permanent DoS aka...
rozpocznij naukę
Permanent DoS aka PHLASHING. causes irreversible damage by sending fake hardware update (method called bricking the system)
DRDoS
rozpocznij naukę
DRDoS - Distributed Reflection DoS - attackers usese corrupted system to make calls (one more "hop")
Eradication of WIRELESS using WPA2 with...
rozpocznij naukę
Eradication of WIRELESS using WPA2 with AEC/CCMP
Preparation for cloud
rozpocznij naukę
Preparation for cloud besides obvious do not disclose location of data base unless necessary
DNS attacks
rozpocznij naukę
DNS attacks: 1) dns poisoning - spoofed website 2) cyber squatting - phishing with domain with simmilar name 3) domain hijacking - stealing CSP domain name 4) domain sniping - registering name just after expiration
Containment of CLOUD:
rozpocznij naukę
Containment of cloud: -block communication with external networks -route services thriugh backup -block IP and compromised accounts -stop vulnerable services
Eradicating of CLOUD:
rozpocznij naukę
Eradicating of CLOUD: -remove malware files -deny access to compromised -enable 2FA, captcha -enforce SLA for patching -run vuln scans and config audits
Recover after CLOUD:
rozpocznij naukę
Recover after CLOUD: -install from clean backup -enable compromised accounts after changing passwords -restart after installation of updates that are permissioned by stakeholders!
Common OUTSIDERS attacks: easvesdropping and wiretapping
rozpocznij naukę
Common OUTSIDERS attacks: easvesdropping and wiretapping - podsluchiwanie np przez corporate spies, can use sniffers
Common OUTSIDERS attacks: Creatin of false dossiers and misinformation
rozpocznij naukę
Common OUTSIDERS attacks: Creatin of false dossiers and misinformation -missleading information spreading
Common OUTSIDERS attacks: -Intimidating exisitng employees
rozpocznij naukę
Common OUTSIDERS attacks: -Intimidating exisitng employees - get personal info and then blackmail
Common OUTSIDERS attacks: Data theft and spolation
rozpocznij naukę
Common OUTSIDERS attacks: Data theft and spolation -corporate spies or insiders, extract sensitive data in bulk (hurtowo) using hidden files, USB
Common OUTSIDERS attacks: pod slurping
rozpocznij naukę
Common OUTSIDERS attacks: pod slurping -tooles runned by USB or other stortage device to scan for confidential data
Best practices against CLOUD:
rozpocznij naukę
Best practices against CLOUD: -SLA -AICPA SAS 70 Type II Audit -strong key generator
Web 2.0 is technologies are used to improve buisiness efficiency and support critical business functions
rozpocznij naukę
Web 2.0 is technologies are used to improve business efficiency and support critical business functions
Causes of WEB:
rozpocznij naukę
Causes of WEB: 1) Insecure coding 2) Configuiration errors 3) platform vulnerabilities 4) Logic Errors
!!! LDAP injections are used to achieve
rozpocznij naukę
LDAP injections are used to achieve: Login bypass, information disclosure, privilage escalation, information alteration
To test if the app is vuln to LDAP injection send qurery with meaning to generate invalid input. If server returns error, attacker can exploit with injection
rozpocznij naukę
To test if the app is vuln to LDAP injection send query with meaning to generate invalid input. If server returns error, attacker can exploit with injection
We can detect web attacks by looking at response codes
rozpocznij naukę
We can detect web attacks by looking at response codes - 302 redirects so there is a chance invalid request was redirected to somewhere critical
Incident responders can look for file access attempts greping log file for /etc/psswd
rozpocznij naukę
Incident responders can look for file access attempts greping log file for /etc/psswd
Containment of WEB:
rozpocznij naukę
Containment of WEB: -enable blackhole(block all traffic after threshhold) -increase server capacity -define level of load -deny unnecessary access -negotiate to buy time -identify entry points
WEB containment methods (3):
rozpocznij naukę
WEB containment methods (3): -Whitelisting/blacklisting -Web content filtering: prevents user to visit malicious sites -Proxy Servers: to prevent IP blocking or maintain anonimity, useful to monitor traffic and control it
Eradicating WEB services attacks:
rozpocznij naukę
Eradicating WEB services attacks: -SOAP -Configure WDSL Access Control permissions -docuemnt-centric authorization -detect web services anomalies and signature detection -filter improper SOAP and XML -maintain and update security rtepo for XML schemas
Eradicating CAPTCHA attacks:
rozpocznij naukę
Eradicating CAPTCHA attacks: -Dont make CPTHCA solutions directly accessible by client -disbale captcha reuse -use well-established captcha immplementation -include random letters -encrypt -use multiple fonts to increase complexity
Eradicating Directory traversal:
rozpocznij naukę
Eradicating Directory traversal: -define access rights to protected areas -apply checks/hot fixes to prevent exploit. of vuln. -update
Eradicating Watering hole Attacks:
rozpocznij naukę
Eradicating Watering hole Attacks: -Secure DNS servers -analyze user behaviour
Eradicating CSRF:
rozpocznij naukę
Eradicating CSRF: -logoff after using -dont use login details -check HTTP Refferer header and ignrore URL parameters when processing POST
Eradicating Cookie/Session poisoning attack
rozpocznij naukę
Eradicating Cookie/Session poisoning attack: -implement cookies timeout -cookie auth should be associated with IP -make logout function availabe
Recovery afret WEB:
rozpocznij naukę
Recovery afret WEB: -identify vulns -scan web app resources -patched backup version -define control access values
Best practices for SECURE CODING WEB APPS
rozpocznij naukę
Best practices for SECURE CODING -permit nodes <OBJECT>, disable <IFRAME> -limit script activity -limit length of input -terminate prev login sessions -track user login and activity history -terminate old sessions -encyrpted cookie during transmit
Fuzz testing against:
rozpocznij naukę
Fuzz testing against: buffer overflow, DoS, XSS, SQL injection

Musisz się zalogować, by móc napisać komentarz.