Pytanie |
Odpowiedź |
Security police - permissive rozpocznij naukę
|
|
|
|
|
Security police - prudent rozpocznij naukę
|
|
|
|
|
Security police - paranoid rozpocznij naukę
|
|
no internet connection, forbids everything
|
|
|
rozpocznij naukę
|
|
if server stores something valuable
|
|
|
rozpocznij naukę
|
|
Identify, analyze, prioritize and resolve incident to restore normal operation asap
|
|
|
rozpocznij naukę
|
|
Analyze, validate, categorize
|
|
|
rozpocznij naukę
|
|
found in (6) Evidence Gathering and Forensics, eliminated in (7) Eradication
|
|
|
rozpocznij naukę
|
|
pen testing to identify vulnerabilities
|
|
|
rozpocznij naukę
|
|
process of analyzing data to create TI. Threat data is confronted with actual systems to match real-worl attacks
|
|
|
rozpocznij naukę
|
|
|
|
|
rozpocznij naukę
|
|
degree of uncertainty or expectation of potential damage
|
|
|
rozpocznij naukę
|
|
Threats X Vulnerabilities
|
|
|
Risk mitigation strategiy: Assumption rozpocznij naukę
|
|
accept risk/bring to acceptable level
|
|
|
Risk mitigation strategy: Avoidance rozpocznij naukę
|
|
|
|
|
Risk mitigation strategy: Limitation rozpocznij naukę
|
|
use of supportive preventive and detective controls
|
|
|
Risk mitigation strategy: Planning rozpocznij naukę
|
|
be prepared? know how to act
|
|
|
Risk mitigation strategiy: Research and Acknowledgement rozpocznij naukę
|
|
analyze culnerabilities to countermeasure
|
|
|
Risk mitigation strategiy: Transference rozpocznij naukę
|
|
|
|
|
rozpocznij naukę
|
|
Exercise/Network Defense Testing - not applicable (hrs)
|
|
|
rozpocznij naukę
|
|
Unauthorized Access - 1 (hrs)
|
|
|
rozpocznij naukę
|
|
|
|
|
rozpocznij naukę
|
|
|
|
|
rozpocznij naukę
|
|
Inappropriate usage - Weekly
|
|
|
rozpocznij naukę
|
|
Scans/Probes/Attempted Access - Monthly
|
|
|
rozpocznij naukę
|
|
Invetigation - not apllicable (hrs)
|
|
|
Setting up computer forensics lab rozpocznij naukę
|
|
1) Planning and budgeting 2) Physical location 3) Work area considerations 4) Human resource consideration 5) Physical security recommendations 6) Forensics lab licensing
|
|
|
TRIAGE: Analysis and Validation rozpocznij naukę
|
|
analyze indicators. examine security solutions. Log analysis, event correlation, natwork and system profiling, network traffiic and bandwidth, checksum, FIM
|
|
|
TRIAGE: Incident Classification rozpocznij naukę
|
|
correlates severity, nature, criticality
|
|
|
rozpocznij naukę
|
|
LOW - lss of passwd, scans and probes, wirus or worm. MIDDLE - unauthorized access, unflierdly employee termination, virus/work outbreeak. HIGH - dos, computer break-in, violation of law, cyber terrorism, damage over 100k$
|
|
|
rozpocznij naukę
|
|
set of procedures to preserve and extract forensics evidence
|
|
|
Evidence bag content list rozpocznij naukę
|
|
1) date and time 2) info of incider responder who seized info 3) exhibit number 4) site from which was siezed 5) details of content of the bag 6) submitting agencies and addresses
|
|
|
rozpocznij naukę
|
|
psswd in clear text, executed commands, loging info, trojan horses, open ports, date and time, attached devices
|
|
|
rozpocznij naukę
|
|
1) Registry and Cache 2) routing tables, processes, kernel 3) temp system files 4) disk and storage devices 5) remote logging 6) physical conf and network topology 7) archival media
|
|
|
rozpocznij naukę
|
|
1 - PsUpTime(win) 2 - NetStatistics(Linux) 3 - Uptime and W(Linux)
|
|
|
rozpocznij naukę
|
|
hidden in harmless, To control or damage systems, activated BY USER. Steal info, damage host
|
|
|
rozpocznij naukę
|
|
installed without user knowledge
|
|
|
rozpocznij naukę
|
|
gain root by exploiting vulnerabilities
|
|
|
rozpocznij naukę
|
|
usually spread by trojans
|
|
|
rozpocznij naukę
|
|
self-replicatin, withour user knowledge, can spread with assistance of user
|
|
|
rozpocznij naukę
|
|
spread without human intervention. To overload system. some carry payload to damage systems. Used to isntall backdoor
|
|
|
rozpocznij naukę
|
|
|
|
|
rozpocznij naukę
|
|
redirects web traffic to malicious site - DNS cache poisoning or HostFile modification
|
|
|
rozpocznij naukę
|
|
exploits instans messages systems
|
|
|
rozpocznij naukę
|
|
|
|
|
rozpocznij naukę
|
|
|
|
|
rozpocznij naukę
|
|
piece of fake info is given
|
|
|
rozpocznij naukę
|
|
Observing behaviour. Everyone is different so profiling defines pattern of normality
|
|
|
rozpocznij naukę
|
|
compare past behavious also with other users. build profiles for each group, UEBA, SIEM, DLP. discover outliners in each group. Uses machine learning
|
|
|
rozpocznij naukę
|
|
DNS footprinting - extracting DNS info from public resources
|
|
|
DDoS Eradication: Egress filtering rozpocznij naukę
|
|
DDoS Eradication: Egress filtering - scans leaving IP packets headers
|
|
|
DDoS Eradication: Ingress filtering rozpocznij naukę
|
|
DDoS Eradication: Ingress filtering - prevents spoofing and flooding attacks
|
|
|
DDoS Eradication: Rate Limiting rozpocznij naukę
|
|
DDoS Eradication: Rate Limiting - controls rate of outbound or inbound traffic
|
|
|
DDoS Eradication: RFC 3704 Filtering rozpocznij naukę
|
|
DDoS Eradication: RFC 3704 Filtering - deying traffic with spoofed addresses - bogon list
|
|
|
rozpocznij naukę
|
|
CBCC LOG name: output: 0-minimal info 1-bit more info, flags bits, previous LSN 2-detailed info 3-full info about each operation 4-same as 3 but with hex dump
|
|
|
rozpocznij naukę
|
|
Containment of Insider - seize all allocated devices, proper legal actions, inform about potential loss, and many abvious more
|
|
|
rozpocznij naukę
|
|
Eradicating insider - DCAP (Data centric audit and protection) monitoring and analyze user privilages, detecting unauthorized changes. And many more
|
|
|
rozpocznij naukę
|
|
Vulnerability - existence of weakness, when exploited leads to compromise of a system
|
|
|
rozpocznij naukę
|
|
Threat - unddesired event - something that exists. The impact is potentially hazardous
|
|
|
rozpocznij naukę
|
|
Quantitive Risk - deeper wiev (for example blood test)
|
|
|
rozpocznij naukę
|
|
Qualitative - consequence X likelihood. (for example questions asked by doctors - simple)
|
|
|
rozpocznij naukę
|
|
Email bombing - sending email message to specific address
|
|
|
rozpocznij naukę
|
|
PKI - PUBLIC KEY INFRASTRUCTURE
|
|
|
rozpocznij naukę
|
|
botnet - used to perform DDoS
|
|
|
rozpocznij naukę
|
|
Forensic readiness - organiztion ability to make optimal use of digital evidence
|
|
|
rozpocznij naukę
|
|
Forensics readiness plan - refers to set of procedures to achieve and maintain forensisc readiness
|
|
|
rozpocznij naukę
|
|
Forensic Policy - set of procedures describing the actions to preserve and extract forensics evidence
|
|
|
Information Security Policy rozpocznij naukę
|
|
Information Security Policy - basic security, requirements and rules to implement in order to protect and secure assets
|
|
|
rozpocznij naukę
|
|
Incident Management - set of defined processes to identify, analyze prioritize and resolve security incidents to restore to normal state
|
|
|
rozpocznij naukę
|
|
Policy - set of guidelines used to achieve goals
|
|
|
rozpocznij naukę
|
|
pharming - aka domain spoofing. advanced form of phishing where attacker redirects connection
|
|
|
rozpocznij naukę
|
|
Risk Management - set of policies and procedures to identify, assess, prioritze, minimalize and control risks
|
|
|
rozpocznij naukę
|
|
Risk Assessment - refers to identification of the risk, estimate impact, and recommending mitigation measures
|
|
|
rozpocznij naukę
|
|
Risk Mitigation - strategic approach to preparing to handle risks and reduce impact
|
|
|
rozpocznij naukę
|
|
Risk Determination - crucial task in risk assessment. complex process based on various tangibler and intangible factors
|
|
|
rozpocznij naukę
|
|
Risk Management plan - defined as process designed to identify, eliminate and mitigate risks
|
|
|
rozpocznij naukę
|
|
Skimming - stealing credit/debit card numbers by using special devices called skimmers
|
|
|
rozpocznij naukę
|
|
Threat Assessment - process of examining, filtering, modeling threat data to extract threat intelligence
|
|
|
rozpocznij naukę
|
|
Vulnerability Assessment - zarzadzanie podatnosciami - skany, wiedza o podatnosciach, otwarte porty, miskonfiguracje. is the examination of the ability of system including curret sec. controls and rpocedures to withsand assault
|
|
|
Vulnerability assesment phase rozpocznij naukę
|
|
Vulnerability assessment phase - refers to identifying vulns in infrastructure
|
|
|
rozpocznij naukę
|
|
Eradicating email: use DNS filtering, disasble automatic download, new accouts
|
|
|
rozpocznij naukę
|
|
Threat intelligence - identify and minitage various risks
|
|
|
Identify risk by performing threat and vulnerability assessment rozpocznij naukę
|
|
Identify risk by performing threat and vulnerability assessment
|
|
|
BEST PRACTICES IH&R - OWASP rozpocznij naukę
|
|
BEST PRACTICES IH&R - OWASP - 1) Audit 2) Create response team 3) create documented IR plan 4) identify triggers 5) investigate problem, 6) triage and mitigate 7) recovery 8) document and report 9) process review 10) practise
|
|
|
BEST PRACTICES IH&R - ENISA (european) rozpocznij naukę
|
|
BEST PRACTICES IH&R - ENISA (european): 1)develop workflow 2) develop IH process 3) legal officer 4) monitor netwrok 5) incident identification 6) final classification 7) up to date policies 8) eradication and revocery
|
|
|
BEST PRACTICES IH&R - GPG18 and Forensics REadiness Planning rozpocznij naukę
|
|
BEST PRACTICES IH&R - GPG18 and Forensics REadiness Planning - 1) must develop forensics plan 2) which should be owned by director 3) should seek standard for forensics. 12 in total
|
|
|
rozpocznij naukę
|
|
Post incident avtivities - 1) incident documentation 2) incident impact assesment 3) review and revise policies 4) close investigation 5) incident disclosure
|
|
|
Incident impact assesment rozpocznij naukę
|
|
Incident impact assessment - determining losees (all types), find list of affeceted devices, finantial impact will help determine motive and perpetrator
|
|
|
DATE AND TIME are volatile rozpocznij naukę
|
|
DATE AND TIME are volatile
|
|
|
Malware is most common threat rozpocznij naukę
|
|
Malware is the most common threat - separate infected systems
|
|
|
Malware detection: Live systems/dynamic analysis rozpocznij naukę
|
|
Malware detection: Live systems/dynamic analysis - analyzing live systems in operation. behavioral analysis. detects changes to the entities in system
|
|
|
Malware detection: memory dump/staticanalysis rozpocznij naukę
|
|
Malware detection: memory dump/staticanalysis - analysis of memory dump or binary code
|
|
|
Malware detection: Intrustion analysis rozpocznij naukę
|
|
Malware detection: Intrustion analysis - analysis of logs and alerts from systems
|
|
|
Guidelines for malware incidents: rozpocznij naukę
|
|
Guidelines for malware incidents: educate, security policy, deal asap, monitor USB and downloads, seubscribe to sec bulletins, effective backup plan
|
|
|
rozpocznij naukę
|
|
Mail storming - like a bug, without human intervention, auto-forwarding
|
|
|
Preparation for email incidents includes rozpocznij naukę
|
|
Preparation for email incidents includes - TRAINING AND AWARNESS PROGRAM
|
|
|
Network Unauthorized access Incidents include: rozpocznij naukę
|
|
Network Unauthorized access Incidents include: Recon attacks, sniffing and spoofing, dns arp poisoning, firewall and IDS evasions attacks, Brute force
|
|
|
Only educationg employess can protect from social engineering rozpocznij naukę
|
|
Only educationg employers can protect from social engineering
|
|
|
rozpocznij naukę
|
|
Permanent DoS aka PHLASHING. causes irreversible damage by sending fake hardware update (method called bricking the system)
|
|
|
rozpocznij naukę
|
|
DRDoS - Distributed Reflection DoS - attackers usese corrupted system to make calls (one more "hop")
|
|
|
Eradication of WIRELESS using WPA2 with... rozpocznij naukę
|
|
Eradication of WIRELESS using WPA2 with AEC/CCMP
|
|
|
rozpocznij naukę
|
|
Preparation for cloud besides obvious do not disclose location of data base unless necessary
|
|
|
rozpocznij naukę
|
|
DNS attacks: 1) dns poisoning - spoofed website 2) cyber squatting - phishing with domain with simmilar name 3) domain hijacking - stealing CSP domain name 4) domain sniping - registering name just after expiration
|
|
|
rozpocznij naukę
|
|
Containment of cloud: -block communication with external networks -route services thriugh backup -block IP and compromised accounts -stop vulnerable services
|
|
|
rozpocznij naukę
|
|
Eradicating of CLOUD: -remove malware files -deny access to compromised -enable 2FA, captcha -enforce SLA for patching -run vuln scans and config audits
|
|
|
rozpocznij naukę
|
|
Recover after CLOUD: -install from clean backup -enable compromised accounts after changing passwords -restart after installation of updates that are permissioned by stakeholders!
|
|
|
Common OUTSIDERS attacks: easvesdropping and wiretapping rozpocznij naukę
|
|
Common OUTSIDERS attacks: easvesdropping and wiretapping - podsluchiwanie np przez corporate spies, can use sniffers
|
|
|
Common OUTSIDERS attacks: Creatin of false dossiers and misinformation rozpocznij naukę
|
|
Common OUTSIDERS attacks: Creatin of false dossiers and misinformation -missleading information spreading
|
|
|
Common OUTSIDERS attacks: -Intimidating exisitng employees rozpocznij naukę
|
|
Common OUTSIDERS attacks: -Intimidating exisitng employees - get personal info and then blackmail
|
|
|
Common OUTSIDERS attacks: Data theft and spolation rozpocznij naukę
|
|
Common OUTSIDERS attacks: Data theft and spolation -corporate spies or insiders, extract sensitive data in bulk (hurtowo) using hidden files, USB
|
|
|
Common OUTSIDERS attacks: pod slurping rozpocznij naukę
|
|
Common OUTSIDERS attacks: pod slurping -tooles runned by USB or other stortage device to scan for confidential data
|
|
|
Best practices against CLOUD: rozpocznij naukę
|
|
Best practices against CLOUD: -SLA -AICPA SAS 70 Type II Audit -strong key generator
|
|
|
Web 2.0 is technologies are used to improve buisiness efficiency and support critical business functions rozpocznij naukę
|
|
Web 2.0 is technologies are used to improve business efficiency and support critical business functions
|
|
|
rozpocznij naukę
|
|
Causes of WEB: 1) Insecure coding 2) Configuiration errors 3) platform vulnerabilities 4) Logic Errors
|
|
|
!!! LDAP injections are used to achieve rozpocznij naukę
|
|
LDAP injections are used to achieve: Login bypass, information disclosure, privilage escalation, information alteration
|
|
|
To test if the app is vuln to LDAP injection send qurery with meaning to generate invalid input. If server returns error, attacker can exploit with injection rozpocznij naukę
|
|
To test if the app is vuln to LDAP injection send query with meaning to generate invalid input. If server returns error, attacker can exploit with injection
|
|
|
We can detect web attacks by looking at response codes rozpocznij naukę
|
|
We can detect web attacks by looking at response codes - 302 redirects so there is a chance invalid request was redirected to somewhere critical
|
|
|
Incident responders can look for file access attempts greping log file for /etc/psswd rozpocznij naukę
|
|
Incident responders can look for file access attempts greping log file for /etc/psswd
|
|
|
rozpocznij naukę
|
|
Containment of WEB: -enable blackhole(block all traffic after threshhold) -increase server capacity -define level of load -deny unnecessary access -negotiate to buy time -identify entry points
|
|
|
WEB containment methods (3): rozpocznij naukę
|
|
WEB containment methods (3): -Whitelisting/blacklisting -Web content filtering: prevents user to visit malicious sites -Proxy Servers: to prevent IP blocking or maintain anonimity, useful to monitor traffic and control it
|
|
|
Eradicating WEB services attacks: rozpocznij naukę
|
|
Eradicating WEB services attacks: -SOAP -Configure WDSL Access Control permissions -docuemnt-centric authorization -detect web services anomalies and signature detection -filter improper SOAP and XML -maintain and update security rtepo for XML schemas
|
|
|
Eradicating CAPTCHA attacks: rozpocznij naukę
|
|
Eradicating CAPTCHA attacks: -Dont make CPTHCA solutions directly accessible by client -disbale captcha reuse -use well-established captcha immplementation -include random letters -encrypt -use multiple fonts to increase complexity
|
|
|
Eradicating Directory traversal: rozpocznij naukę
|
|
Eradicating Directory traversal: -define access rights to protected areas -apply checks/hot fixes to prevent exploit. of vuln. -update
|
|
|
Eradicating Watering hole Attacks: rozpocznij naukę
|
|
Eradicating Watering hole Attacks: -Secure DNS servers -analyze user behaviour
|
|
|
rozpocznij naukę
|
|
Eradicating CSRF: -logoff after using -dont use login details -check HTTP Refferer header and ignrore URL parameters when processing POST
|
|
|
Eradicating Cookie/Session poisoning attack rozpocznij naukę
|
|
Eradicating Cookie/Session poisoning attack: -implement cookies timeout -cookie auth should be associated with IP -make logout function availabe
|
|
|
rozpocznij naukę
|
|
Recovery afret WEB: -identify vulns -scan web app resources -patched backup version -define control access values
|
|
|
Best practices for SECURE CODING WEB APPS rozpocznij naukę
|
|
Best practices for SECURE CODING -permit nodes <OBJECT>, disable <IFRAME> -limit script activity -limit length of input -terminate prev login sessions -track user login and activity history -terminate old sessions -encyrpted cookie during transmit
|
|
|
rozpocznij naukę
|
|
Fuzz testing against: buffer overflow, DoS, XSS, SQL injection
|
|
|