Home
Explore
Exams
Search for anything
Login
Get started
Home
Engineering
Information and Communication Technology
3.1.1 GIVEN A SCENARIO, ANALYZE DATA AS PART OF SECURITY MONITORING ACTIVITIES (part 1)
0.0
(0)
Rate it
Studied by 0 people
Knowt Play
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/41
Earn XP
Description and Tags
Information and Communication Technology
Add tags
Study Analytics
All Modes
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
42 Terms
View all (42)
Star these 42
1
New cards
Heuristic Analysis
• Uses a rules created from a knowledge base and then determines likelihood of data being harmful
2
New cards
Signature Based Analysis
• Makes comparisons to traffic from known attack patterns in a database or file
3
New cards
Anomaly Based
• Compares traffic to what 'normal' looks like to determine if it is harmful
4
New cards
Trend Analysis
• Enhances security, growth planning and Risk Management by studying past results to understand future outcomes
5
New cards
Malware Analysis
• Analysing potentially harmful data in a safe environment to assess if it is a threat
6
New cards
Reverse Engineering Tools
Disassemblers, Decompilers, Unpackers and String Analysis are all types of this
7
New cards
Windows Memory Analysis Tools
2 Types which are Resource Monitor which shows Hardware and Software Memory usage and
8
New cards
• Autorun which shows executables that will run at login/startup
9
New cards
Linux Memory Analysis Tools
• ps: Show process statuses and information about them.
10
New cards
• -A or -e : Display all processes, not just the current user's.
11
New cards
• -ef or -ely : Similar to above, but displays detailed information.
12
New cards
System and Application Behaviour (Windows)
• There should only be one instance of winnit.exe and services.exe as they handle drivers and services
13
New cards
System and Application Behaviour Processess
• We can check for processes running under suspicious circumstances (netcat) or make sure the proper ports are being used
14
New cards
Dropper
• A Trojan Exploit Technique that will 'drop' a piece of malware onto a system, which is harder to detect because the payload is encrypted.
15
New cards
• Downloader is a type of this that requires internet access
16
New cards
Shell Code
• An exploit technique whereby instructions are injected onto and then run by the host
17
New cards
Masquerading (Code and Injection)
• An exploit technique where genuine code is replaced by malicious one
18
New cards
DLL Injection (Code and Injection)
• This is where a legit process is forced to run a malicious DLL
19
New cards
"Living off the Land" (Code and Injection)
• An exploit technique whereby malware takes over a legitimate processes and tools making it harder to detect as they are whitelisted
20
New cards
File System
• We need to monitor the integrity of files (tripware and checksums)
21
New cards
User and Entity Behavior Analytics (UEBA)
• A method that is useful to detect insider threats by tracking users and machine accounts and flagging anomalies
22
New cards
URL and DNS Analysis
• Commonly we blacklist/whitelist parts of the internet to control what internets with our internal network
23
New cards
Domain Generation Algorithm (DGA)
• Method used by attackers/malware to avoid blacklisting
24
New cards
URL Analysis and Percent Coding
• Changing Characters to a hexadecimal version to get around content filters and hide XSS and other attacks
25
New cards
Http Response Codes (URL Analysis)
• 100-199: Informational response • 200-299: Successful response (e.g. 200 \= OK)
26
New cards
• 300-399: Redirects (e.g. 307 \= Temporary redirect)
27
New cards
• 400-499: Client-side error (e.g. 404 \= Page/File not found)
28
New cards
• 500-599: Server-side error (e.g. 500 \= Internal server error)
29
New cards
Http methods
GET / POST / PUT / HEAD /
30
New cards
Flow Analysis
Looking at network traffic statistics instead of payloads and using a visualisation tool to map network connections
31
New cards
Flow Analysis Tools
• Net Flow/IPFlow Information expert (IPFIX)
32
New cards
• sFlow
33
New cards
• Zeek
34
New cards
• Multi Router Traffic Grapher (MRTG)
35
New cards
Packet and Protocol Analysis
• E.g. Wireshark allows us to analyse traffic, payloads, headers, frames to see if there is anything suspicious
36
New cards
Log Review Tools
• Event Logs
37
New cards
• Firewall Logs
38
New cards
• WAF
39
New cards
• Proxies
40
New cards
• IDS/IPS
41
New cards
Syslog
• Port 514 UDP
42
New cards
• A way to define severity levels from logs/event messages sent from various network devices to a central server
Explore top notes
Unit 5: Indigenous Americas, 1000 BCE–1980 CE
Updated 866d ago
Note
Preview
Chapter 3:Ionic Compounds
Updated 1046d ago
Note
Preview
PHOTO LINE UP
Updated 942d ago
Note
Preview
AP Gov Unit 1 Chapter 3 Notes
Updated 711d ago
Note
Preview
Medieval Armaments and Armor Vocabulary
Updated 65d ago
Note
Preview
cdgtfegrhter4etfg
Updated 175d ago
Note
Preview
Untitled
Updated 810d ago
Note
Preview
The Napoleonic Era
Updated 1174d ago
Note
Preview
Explore top flashcards
AP Statistics - Chapter 1: Exploring One Variable Data
Updated 843d ago
Flashcards (34)
Preview
Mod 2 test review
Updated 339d ago
Flashcards (30)
Preview
Holt McDougal Chemistry Chapter 6
Updated 976d ago
Flashcards (78)
Preview
nltt
Updated 82d ago
Flashcards (322)
Preview
Abdomen (digestive viscera & relationships)
Updated 713d ago
Flashcards (71)
Preview
Engels onderzoek, onderwijs etc
Updated 891d ago
Flashcards (87)
Preview
The Crucible Quiz 1
Updated 356d ago
Flashcards (20)
Preview
Dutch Verbs
Updated 627d ago
Flashcards (91)
Preview