Indicators of Compromise - CompTIA Security+ SY0-701 - 2.4

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:37 AM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

Indicators of Compromise

Indicators of Compromise (IoC)

- An event that indicates an intrusion

- Confidence is key

- He's calling from inside the house

Indicators

- Unusal amount of network activity

- Change to file hash values

- Irrelegular international traffic

- Changes to DNS data

- Uncommon login patterns

- Spikes of read requests to certain files

2
New cards

Account Lockout

• Credentials are not working

- It wasn't you this time

• Exceeded login attempts

- Account is automatically locked

• Account was administratively disabled

- This would be a larger concern

• This may be part of a larger plan

- Attacker locks account

- Calls support line to reset the password

3
New cards

Concurrent session usage

• It's challenging to be two places at one time

- Laws of physics

• Multiple account logins from multiple locations

- Interactive access from a single user

- You don't have a clone

• This can be difficult to track down

- Multiple devices and desktops

- Automated processes

4
New cards

Blocked Content

• An attacker wants to stay as long as possible

- Your system has been unlocked

- Keep the doors and windows open

• There's probably a security patch available

- Time to play keep-away

• Blocked content

- Auto-update connections

- Links to security patches

- Third-party anti-malware sites

- Removal tools

5
New cards

Impossible travel

• Authentication logs can be telling

- Logon and logoff

• Login from Omaha, Nebraska, United States

- The company headquarters

• Three minutes later, a login from Melbourne, Australia

- Alarm bells should be ringing

• This should be easy to identify

- Log analysis and automation

6
New cards

Resource Consumption

Every attacker's action has an equal and opposite reaction

- Watch carefully for significant changes

File transfers use bandwidth

- An unusual spike at 3A,

Firewall logs show the outgoing transfer

- IP addresses, timeframes

Often the first real notification of an issue

- the attacker may have been here for months

7
New cards

Resouce inaccessibility

The server is down

- Not responding

Network disruption

- A cover for the actual exploit

Server outage

- Result of an exploit gone wrong

Encrypted data

- A potential ransomware attack begins

brute force attack

- Locks account access

8
New cards

Out-of-Cycle Logging

• Out-of-cycle - Occurs at an unexpected time

• Operating system patch logs

- Occurring outside of the normal patch day

- Keep that exploited system safe from other attackers!

• Firewall log activity

- Timestamps of every traffic flow

- Protocols and applications used

9
New cards

Missing logs

• Log information is evidence

- Attackers will try to cover their tracks by removing logs

• Information is everywhere

- Authentication logs

- File access logs

- Firewall logs

- Proxy logs

- Server logs

• The logs may be incriminating

- Missing logs are certainly suspicious

- Logs should be secured and monitored

10
New cards

Published/documented

• The entire attack and data exfiltration may go unnoticed

- It happens quite often

• Company data may be published online

• The attackers post a portion or all data

- This may be in conjunction with ransomware

• Raw data may be released without context

- Researchers will try to find the source