Sec+ Set D Sec Ops

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:50 PM on 3/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

Secure Baseline

A documented minimum security configuration standard for a device type. All new devices must meet the baseline before deployment. Drift from baseline must be detected and remediated. CIS Benchmarks provide industry-standard baselines.

2
New cards

Hardening

Reducing a system’s attack surface. Steps - change default credentials, disable unnecessary services and ports, remove unused software, apply patches, enable logging, restrict user permissions, enable host firewall.

3
New cards

Patch Management

Process of identifying, testing, and applying software updates to fix vulnerabilities. Critical patches applied urgently. Non-critical follow change management process. Unpatched systems are the leading cause of breaches.

4
New cards

Vulnerability Scanning

Automated testing of systems to identify known vulnerabilities, misconfigurations, and missing patches. Produces prioritised list using CVSS scores. Must be authenticated for complete results. Run regularly and after changes.

5
New cards

Penetration Testing

Authorised simulated attack attempting to exploit vulnerabilities. Goes beyond scanning to actually exploit weaknesses. Types - black box (no prior knowledge), white box (full knowledge), grey box (partial knowledge).

6
New cards

Penetration Testing Phases

Reconnaissance (information gathering), Scanning (identify targets), Exploitation (attack), Post-exploitation (lateral movement, persistence), Reporting (document findings and recommendations).

7
New cards

Vulnerability Management Lifecycle

Identify (scanning) - Analyse (prioritise by CVSS and context) - Remediate (patch, mitigate, or accept) - Verify (rescan to confirm fix) - Report (document and communicate).

8
New cards

False Positive

A security alert indicating a threat that does not actually exist. Wastes analyst time. Too many false positives cause alert fatigue. Must be tuned to reduce without missing real threats.

9
New cards

False Negative

A real threat that is not detected by security controls. More dangerous than false positives. Must be minimised through comprehensive detection coverage.

10
New cards

EDR (Endpoint Detection and Response)

Security solution monitoring endpoints for suspicious activity, recording events, and enabling rapid investigation and response. Goes beyond traditional antivirus to detect behavioural anomalies.

11
New cards

XDR (Extended Detection and Response)

Extends EDR across multiple security layers - endpoints, network, email, cloud. Correlates data from multiple sources for comprehensive threat detection and response.

12
New cards

SIEM (Security Information and Event Management)

Centralised platform aggregating, correlating, and analysing security logs. Real-time alerting, dashboards, and forensic investigation. Requires tuning to reduce false positives. Examples - Splunk, Microsoft Sentinel, IBM QRadar.

13
New cards

SOAR (Security Orchestration, Automation and Response)

Automates repetitive security tasks and incident response workflows. Works alongside SIEM. Can automatically contain threats (block IP, isolate endpoint) without human intervention.

14
New cards

DLP (Data Loss Prevention)

Technology preventing unauthorised transmission of sensitive data. Monitors network traffic, email, endpoints, and cloud storage. Blocks or alerts on attempts to send PII, credit card numbers, or classified data.

15
New cards

NAC (Network Access Control)

Controls which devices can access the network based on compliance with security policies. Checks - antivirus current, OS patched, encryption enabled. Non-compliant devices quarantined to remediation VLAN.

16
New cards

DNS Filtering

Blocking access to malicious or prohibited domains at the DNS level. Prevents connections to known malware C2 servers, phishing sites, and inappropriate content. Low overhead, effective first line of defence.

17
New cards

Firewall Types

Packet filtering (Layer 3-4, stateless), Stateful inspection (tracks connection state), Application-layer/proxy (Layer 7 aware), NGFW (combines all with IDS/IPS, app awareness, user identity).

18
New cards

IDS vs IPS

IDS (Intrusion Detection System) - passive, out-of-band, alerts only. IPS (Intrusion Prevention System) - inline, active, blocks traffic. IDS cannot stop attacks. IPS can but may block legitimate traffic (false positives).

19
New cards

Signature-Based Detection

Compares activity against database of known attack patterns. Fast and accurate for known threats. Cannot detect unknown or zero-day attacks. Requires regular signature updates.

20
New cards

Anomaly-Based (Heuristic) Detection

Establishes a baseline of normal behaviour and alerts on deviations. Can detect unknown threats. Higher false positive rate. Used alongside signature-based.

21
New cards

Identity and Access Management (IAM)

Framework managing digital identities and controlling access to resources. Covers - provisioning, authentication, authorisation, deprovisioning. Principle of least privilege applied throughout.

22
New cards

Provisioning

Creating and configuring user accounts and granting appropriate access when users join an organisation. Must follow least privilege. Often automated through HR system integration.

23
New cards

Deprovisioning

Removing user access when they leave an organisation or change roles. Critical security step - must be timely. Accounts not deprovisioned are orphaned accounts that can be exploited.

24
New cards

MFA (Multifactor Authentication)

Requires two or more factors from different categories. Something you know (password/PIN). Something you have (token, smart card, phone). Something you are (biometrics). Significantly reduces account compromise risk.

25
New cards

MFA - TOTP (Time-based One-Time Password)

Codes changing every 30 seconds based on shared secret and time. Authenticator apps (Google Authenticator, Authy). Vulnerable to phishing if codes are entered on fake sites.

26
New cards

MFA - Push Notification

Authentication app sends a push notification for user approval. Convenient. Vulnerable to MFA fatigue attacks (bombing user with requests until they approve).

27
New cards

MFA - Hardware Token

Physical device generating one-time codes. RSA SecurID. More secure than software tokens. Not vulnerable to malware on the user’s phone.

28
New cards

MFA - FIDO2/WebAuthn

Phishing-resistant MFA standard. Uses public key cryptography. Private key never leaves the device. Examples - YubiKey, Windows Hello, passkeys. The most secure MFA method.

29
New cards

Privileged Access Management (PAM)

Controls and monitors access to privileged accounts (admin, root). Features - just-in-time access, credential vaulting, session recording, approval workflows. Limits standing privilege.

30
New cards

Just-In-Time (JIT) Access

Privileged access granted only when needed and automatically revoked after a set time. Reduces risk from standing admin accounts. Part of PAM strategy.

31
New cards

SSO (Single Sign-On)

Authenticate once, access multiple applications. Improves user experience. Centralises authentication risk - SSO compromise affects all linked apps. Requires strong primary authentication.

32
New cards

Federation

Extending authentication trust across organisational boundaries. Example - logging into a third-party app using corporate credentials. Protocols - SAML, OAuth, OIDC.

33
New cards

SAML (Security Assertion Markup Language)

XML-based standard for exchanging authentication data between Identity Provider (IdP) and Service Provider (SP). Used for enterprise SSO and federated identity.

34
New cards

OAuth 2.0

Authorisation framework allowing third-party apps limited access to user accounts without exposing credentials. Used for - Sign in with Google. Delegates authorisation, not authentication.

35
New cards

OpenID Connect (OIDC)

Authentication layer built on top of OAuth 2.0. Provides authentication (who you are) while OAuth provides authorisation (what you can do). Used for modern SSO.

36
New cards

Incident Response Process

Preparation - Identification - Containment - Eradication - Recovery - Lessons Learned. (PICERL). Each phase has specific actions and must be documented.

37
New cards

Incident Response - Preparation

Developing IR plan, training team, establishing communication channels, acquiring tools, conducting tabletop exercises before an incident occurs.

38
New cards

Incident Response - Identification

Detecting and confirming an incident has occurred. Sources - SIEM alerts, user reports, threat intelligence. Determine scope and type of incident.

39
New cards

Incident Response - Containment

Limiting the spread and impact of the incident. Short-term - isolate affected systems. Long-term - patch vulnerabilities. Balance containment with preserving evidence.

40
New cards

Incident Response - Eradication

Removing the threat from the environment. Delete malware, close vulnerabilities, remove attacker persistence mechanisms. Verify threat is fully removed before recovery.

41
New cards

Incident Response - Recovery

Restoring systems to normal operation from clean backups. Verify systems are clean. Monitor closely for recurrence. May be gradual rollback of containment measures.

42
New cards

Incident Response - Lessons Learned

Post-incident review documenting what happened, what worked, what failed, and how to improve. Must occur promptly while details are fresh. Updates IR plan and controls.

43
New cards

Digital Forensics

Collection and analysis of digital evidence following proper procedures to maintain admissibility in legal proceedings. Must preserve evidence integrity using chain of custody.

44
New cards

Chain of Custody

Documentation tracking who had access to evidence, when, and what was done with it. Maintains evidence integrity. Breaks in chain of custody can make evidence inadmissible.

45
New cards

Order of Volatility

Priority for collecting digital evidence from most to least volatile. Registers/cache - RAM - Swap/page file - Hard disk - Remote logging - Archival media. Collect most volatile first as it disappears fastest.

46
New cards

Log Analysis

Reviewing system, application, and security logs to identify anomalies, trace attacks, and support investigations. Key logs - authentication logs, firewall logs, web server logs, system event logs.

47
New cards

Threat Hunting

Proactively searching for hidden threats that have evaded automated detection. Hypothesis-driven. Uses threat intelligence, analytics, and manual investigation. Assumes breach mentality.

48
New cards

Threat Intelligence

Information about current and emerging threats. Used to improve detection and defence. Sources - ISACs, vendor feeds, dark web monitoring, government agencies (CISA).

49
New cards

Sandboxing

Executing suspicious code in an isolated environment to observe behaviour without risk to production systems. Used for malware analysis and application testing.

50
New cards

Automation and Orchestration

Using scripts and tools to automate repetitive security tasks. Benefits - faster response, consistency, scalability, reduces human error. Risks - automated response may cause unintended consequences.

Explore top flashcards

flashcards
Niemiecki - 7.03
65
Updated 382d ago
0.0(0)
flashcards
Kapitel 2.2
52
Updated 1212d ago
0.0(0)
flashcards
Ap world unit 8 vocab
64
Updated 1082d ago
0.0(0)
flashcards
Human Evolution Unit 1
46
Updated 1132d ago
0.0(0)
flashcards
Executive Branch Zehe Test Prep
60
Updated 837d ago
0.0(0)
flashcards
exam 2 - id
48
Updated 168d ago
0.0(0)
flashcards
Niemiecki - 7.03
65
Updated 382d ago
0.0(0)
flashcards
Kapitel 2.2
52
Updated 1212d ago
0.0(0)
flashcards
Ap world unit 8 vocab
64
Updated 1082d ago
0.0(0)
flashcards
Human Evolution Unit 1
46
Updated 1132d ago
0.0(0)
flashcards
Executive Branch Zehe Test Prep
60
Updated 837d ago
0.0(0)
flashcards
exam 2 - id
48
Updated 168d ago
0.0(0)