4.2 behavioral approach

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

type of security involving thecapturing and analyzing communications between a user on a local network and a user on a remote network. Any behavioral changes indicate anomalies and potential threats.

behavior-based security

2
New cards

a behavior-based detection tool that lures attackers by appealing to their attack patterns. Once the attacker falls for the trick, the network administrator can log and analyze the data to build better defenses against the attacker. Think of how female intelligence operatives may use their beauty to recruit spies

honeypot

3
New cards

Cisco’s security architecture tool uses behavior-based detection to discover the attacker’s identity, the type of attack, where the attack originates from, and how the attack is taking place.

Ciscos Cyber Threat Defense Solution Architecture

4
New cards

technology used in conjunction with routers, firewalls, and switches to collect data flowing to a network, including the users and devices on the network. The information is sent to netflow collectors who analyze the data to establish baseline behaviors

netflow

5
New cards

assessing a system for vulnerabilities by exploiting systems, networks, people, processes, and code to improve an organization’s security posture.

penetration testing

6
New cards

what step in the pen testing process involves planning an attack by gathering information on a target’s system or network to exploit vulnerabilities. This step is also known as footprinting

step 1

7
New cards

which step of the pen testing process involves conducting active reconnaissance of a target’s system or network to identify vulnerabilities for exploitation

step 2

8
New cards

which step of the pen testing process involves gaining access to the system to collect network traffic by exploiting vulnerabilities

step 3

9
New cards

which step of the pen testing process involves maintaining undetected access to a target’s system or network to discover exploitable vulnerabilities and collect valuable data

step 4

10
New cards

what step in the pen testing process involves writing report

step 5 or the final step

11
New cards

another term for step 1 of the pen testing process

footprinting

12
New cards

the process of contiguously identifying and analyzing risks to mitigate the impact of threats and vulnerabilities

risk management

13
New cards

risks can be mitigated by assessing the blank vs the blank

impact of threat vs the cost of utilizing controls to mitigate it.

14
New cards

first step of the risk management process involves identifying threats that can increase risk and may include processes, products, and potential disruption

frame the risk

15
New cards

the second step of the risk management process involves assessing the severity of a threat through quantitative or qualitative analysis

assessing the risk

16
New cards

the third step of the risk management process involves developing an action plan to reduce the impact of risk and identifying where risk can be eliminated, mitigated, accepted, or transferred

respond to risk

17
New cards

fourth and final step of the risk management process involves continuously monitoring risks reduced through elimination, mitigation, acceptance, or transference.

monitor the risk