Domain 4.0 Operations/Incident Response

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 122

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

123 Terms

1

Tracert / Traceroute

Shows the route to a remote host like a website and displays response latency at each hop.

New cards
2

Nslookup / Dig

Command line tools to verify IP addresses of hostnames or domains in DNS server database.

New cards
3

Ipconfig / Ifconfig

Tools to display IP configuration, with Windows using ipconfig and Unix/Linux using ifconfig.

New cards
4

Nmap

Free Network Mapper for device inventory, service discovery, and banner grabbing, used cautiously for active reconnaissance.

New cards
5

Pathping

Combines Ping and Traceroute functionalities, calculating statistics and packet loss at each router.

New cards
6

Hping

Open-source TCP/IP Packet Generator and Analyzer for auditing firewalls and networks, useful for pentesting.

New cards
7

Netstat

Windows tool for network statistics, showing connections, listening ports, and running services.

New cards
8

Nc

Linux/Unix utility for network connections, port scanning, and file transfer.

New cards
9

IP Scanners

Tools like Angry IP scanner to scan IP addresses for open ports, available in command line and GUI versions.

New cards
10

Arp

Address Resolution Protocol for mapping IP to MAC addresses on LAN, with commands like arp -a and arp -d.

New cards
11

Route

Windows and Linux command for listing and adding routes in local routing tables.

New cards
12

Curl

Command line tool for data transfer using various protocols like HTTP, FTP, and SMTP.

New cards
13

TheHarvester

Passive tool in Kali Linux for harvesting email addresses, useful for reconnaissance.

New cards
14

Sn1per

Linux tool for automated penetration testing, scanning vulnerabilities, open ports, and web app vulnerabilities.

New cards
15

Scanless

Linux pentesting tool for anonymous open port scans on target hosts, developed in Python.

New cards
16

Dnsenum

Linux command line tool for identifying DNS records and attempting reverse DNS resolution in penetration testing.

New cards
17

Nessus

Network security scanner for vulnerability checks, available in Linux and Windows.

New cards
18

Cuckoo

Open-source tool for creating a sandbox for malware inspection on Windows and Linux.

New cards
19

(Cat)

Linux command for viewing, creating, and combining files, and redirecting output in terminal or files.

New cards
20

Head

Command to view top messages in log files like var/log/messages.

New cards
21

Tail

Command to view last lines in log files, complementary to the head command.

New cards
22

Grep

Linux command for searching text and log files using regular expressions.

New cards
23

Chmod

Command for changing permission levels on files or directories.

New cards
24

What a logger can do?

Adds messages to local system logs or remote syslog servers, commonly used in automation scripts.

New cards
25

SSH

Secure alternative to Telnet for remote command execution, commonly used for secure remote access.

New cards
26

PowerShell

Scripting language for performing tasks in Windows environments, with commands known as commandlets.

New cards
27

Python

Widely used programming language in cybersecurity and data science.

New cards
28

OpenSSL

Software suite for managing TLS and SSL functions like keys and certificates.

New cards
29

Protocol Analyzers

Tools like Wireshark for capturing and analyzing network packets.

New cards
30

Tcpreplay

Open-source tool for analyzing and replaying traffic from .pcap files.

New cards
31

TcpDump

Linux/Unix network packet analyzer tool for monitoring Ethernet adapter information.

New cards
32

Wireshark

Free and open-source network packet analyzer available for Windows and Linux.

New cards
33

Forensics

Tools used in forensic investigations for analyzing digital evidence.

New cards
34

Dd tool

Linux command for cloning disks or copying folders in forensic investigations.

New cards
35

WinHex

Hexadecimal editor for finding evidence in forensic investigations on Windows OS.

New cards
36

Memdump

Linux tool for analyzing dump files created during system crashes.

New cards
37

FTK Imager

Data preview and imaging tool for assessing electronic evidence quickly.

New cards
38

Autopsy

Forensic tool for analyzing hard drives, smartphones, and media cards, with translation capabilities.

New cards
39

Exploitation Frameworks

Software tools for detecting and exploiting vulnerabilities on remote systems.

New cards
40

Password Crackers

Tools like Cain and Abel for cracking passwords and creating password hashes.

New cards
41

Data Sanitization

Process of irreversibly removing data from memory devices to ensure it's not recoverable.

New cards
42

Plan vs Process vs Procedures

Definitions distinguishing between high-level plans, ordered processes, and detailed procedures.

New cards
43

Incident Response Plans

Plans designed to respond to incidents quickly and prevent further compromise of an organization, focusing on maintaining Confidentiality, Integrity, and Availability (C.I.A).

New cards
44

Incident Response Process

Comprised of 6 phases - Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned - to effectively manage and resolve incidents.

New cards
45

Tabletop (Exercise)

A paper-based hypothetical distribution of Incident Response Plans to team members for review and feedback to keep the plan current.

New cards
46

Walkthroughs

Involves role-playing an incident scenario in a large conference room to ensure team members are familiar with their roles and available resources.

New cards
47

Simulations

Structured walkthroughs where response measures are tested, making it the best exercise to enhance incident response capabilities.

New cards
48

MITRE ATT&CK Framework

An online framework developed by MITRE to provide information about adversaries, their tactics, techniques, and common knowledge to prevent cyber-attacks.

New cards
49

The Cyber Kill Chain

Traces stages of a cybersecurity attack from early reconnaissance to achieving the intruders' objectives, following a structured process.

New cards
50

The Diamond Model of Intrusion Analysis

A framework used for gathering intelligence on network intrusion attacks, focusing on adversary, capabilities, infrastructure, and victim.

New cards
51

Communication Plan

Details how stakeholders will be informed in the event of a security breach, ensuring confidentiality and compliance with regulations like GDPR.

New cards
52

Stakeholder Management

Involves informing and managing various groups of stakeholders such as internal stakeholders, cyber insurance providers, and law enforcement during incidents.

New cards
53

Business Continuity Plan (BCP)

An organizational plan focused on how to continue business operations during and after an incident.

New cards
54

Disaster Recovery Plan (DRP)

A plan for recovering from a disaster impacting IT infrastructure and returning it to regular operations.

New cards
55

Retention Policies

Policies determining how long an organization can store data, considering data classification and regulatory compliance requirements.

New cards
56

Vulnerability Scanner

Identifies and reports vulnerabilities like software flaws, missing patches, and weak passwords to prevent known attacks.

New cards
57

Credentialed Vulnerability Scanner

A thorough scan using admin credentials to expose vulnerabilities effectively, providing detailed information for mitigation.

New cards
58

SIEM Dashboards

Collect data for correlation and analysis, offering centralized visibility and real-time information on threats.

New cards
59

Sensors

Deployed across networks to monitor changes in network patterns or log file entries, aiding in detecting and responding to events.

New cards
60

Sensitivity (SIEM Dashboards)

Monitors sensitive data to ensure regulatory compliance, focusing on protecting personally identifiable information (PII) and other sensitive data.

New cards
61

Trends

Identify patterns in network traffic, event volume, and activities to understand changes in the environment.

New cards
62

Alerts (from SIEM Solution)

Provide information about events on network devices, with optional email notifications and response automation for timely actions.

New cards
63

Correlation

Analyzes log files from multiple sources to generate a centralized view, emphasizing the importance of time synchronization for accurate analysis.

New cards
64

Log Files

Core evidence sources for investigations, including network, web, system, application, security, DNS, and authentication logs.

New cards
65

VOIP and Call Managers

Systems that log call details, including call quality metrics, to secure VoIP phones and monitor call activities for security purposes.

New cards
66

Session Initiation Protocol (SIP) / Traffic

Used for internet-based calls, log files show events like INVITE and 200 OK, helping detect potential attacks based on call patterns.

New cards
67

Syslog

A log collector that gathers event logs from various devices and sends them to a central syslog server. In Linux, it is implemented as syslogd or syslog daemon, storing logs in the var/log/syslog directory.

New cards
68

Rsyslog

Known for high performance, it receives, transforms, and sends data to destinations like SIEM servers or other syslogs. It is an open-source option.

New cards
69

Syslog-ng

An open-source logging solution for Unix and Linux systems with broader platform support than Rsyslog.

New cards
70

Journalctl

Utility for querying and displaying logs from journald, systemd's logging service, to view logs in a readable format.

New cards
71

NXLog

An open-source log management tool for identifying security risks in Linux/Unix environments, offering log processing features and supporting Linux, Windows, and Android.

New cards
72

Bandwidth Monitors

Tools used to understand network traffic flow, monitor changes in traffic patterns, identify network devices causing bottlenecks, and detect broadcast storms or denial-of-service attacks.

New cards
73

Metadata

Data providing information about other data, such as email headers, mobile telecom data, website metadata, and file metadata.

New cards
74

Netflow, sflow, IPFIX

Network monitoring solutions like Netflow (CISCO proprietary), sflow (multi-vendor), and IPFIX (Open Standard Protocol) used to monitor network traffic and identify patterns.

New cards
75

Protocol Analyzer Output

Details on output format, compatibility, and use in forensic investigations, often referred to as a packet sniffer, saving data to a .PCAP file format.

New cards
76

Reconfigure Endpoint Security Solutions

Adjusting endpoint security solutions due to technological changes or data breaches.

New cards
77

Approved Applications List

A list of authorized applications; if an app is not listed, it cannot be launched.

New cards
78

Application Block List/Deny List

Catalog of dangerous apps, preventing them from running, especially offensive security tools.

New cards
79

Quarantine

Isolating infected devices from the network, ensuring compliance before granting access, and potentially placing them in a remediation network.

New cards
80

Configuration Changes

Adjustments made to secure the environment against emerging threats.

New cards
81

Firewall Rules

Used to block traffic, with changes applied through MDM solutions or group policies on endpoint devices.

New cards
82

MDM (Mobile Device Management)

Manages and configures mobile devices, enforcing settings like password policies and camera blocking.

New cards
83

Data Loss Prevention (DLP)

Policy-based protection of sensitive data, safeguarding data at rest or in transit, in various platforms.

New cards
84

Content Filter / URL Filter

Filters updated to counter new threats, especially on proxy servers or UTM firewalls.

New cards
85

Update or Revoke Certificates

Updating or revoking certificates to address errors or compromises, essential for internet-facing services.

New cards
86

Isolation

Blocking all access, like air-gapping endpoints to protect against network-based attacks.

New cards
87

Containment

Minimizing damage and limiting incident scope, crucial in incident response before root cause analysis.

New cards
88

Segmentation

Dividing a network into smaller parts for better management, including mobile device, endpoint, and application segmentation.

New cards
89

SIEM & SOAR

Security solutions utilizing AI, ML, and threat intelligence, offering centralized alerting and response automation.

New cards
90

Runbooks

Documents detailing actions to stop threats, human response steps for security incidents, and pre-defined procedures for managing incidents.

New cards
91

Playbooks

Contain rules and actions to identify and respond to incidents, often requiring amendments for better automated responses.

New cards
92

Legal Hold

Protecting evidence from alteration or destruction, also known as litigation hold.

New cards
93

Chain of Custody

Tracks evidence movement through collection, safeguarding, and analysis, documenting handling and transfers.

New cards
94

Admissibility

Requirements for evidence to be valid in court, ensuring relevance, materiality, and legal collection.

New cards
95

Video

CCTV as evidence for identifying attackers and reconstructing events.

New cards
96

Timelines of Sequences of Events

Using timestamps and time offsets to reconstruct event sequences accurately.

New cards
97

Tags

eDiscovery labels attached to documents for easier search and organization.

New cards
98

Reports

Documenting key discussions and decisions post-incident for review and stakeholder presentation.

New cards
99

Event Logs (For Documentation / Evidence)

Centralized log collection for reconstructing events and maintaining audit trails.

New cards
100

Interviews

Witness statements and photofits used to develop a picture of involved parties.

New cards

Explore top notes

note Note
studied byStudied by 1 person
74 days ago
4.0(1)
note Note
studied byStudied by 3 people
113 days ago
5.0(1)
note Note
studied byStudied by 1 person
112 days ago
5.0(1)
note Note
studied byStudied by 472 people
781 days ago
4.0(1)
note Note
studied byStudied by 4 people
148 days ago
5.0(1)
note Note
studied byStudied by 53 people
705 days ago
5.0(1)
note Note
studied byStudied by 5 people
288 days ago
5.0(1)
note Note
studied byStudied by 462 people
156 days ago
4.0(2)

Explore top flashcards

flashcards Flashcard (25)
studied byStudied by 45 people
820 days ago
4.0(1)
flashcards Flashcard (69)
studied byStudied by 111 people
344 days ago
5.0(2)
flashcards Flashcard (45)
studied byStudied by 220 people
111 days ago
5.0(1)
flashcards Flashcard (126)
studied byStudied by 4 people
686 days ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 14 people
834 days ago
5.0(2)
flashcards Flashcard (98)
studied byStudied by 237 people
370 days ago
5.0(6)
flashcards Flashcard (62)
studied byStudied by 29 people
917 days ago
4.5(2)
flashcards Flashcard (28)
studied byStudied by 4 people
30 days ago
5.0(1)
robot