pt.25

Cards (52)

  • A forensic artifact is an unintentional trace of an attacker's activity that can be identified on a host or network.
  • Forensic artifacts are valuable digital evidence in cybersecurity and digital forensics investigations, as they can provide insights into an attacker's actions and help in reconstructing the timeline of events during a security incident.
  • Hashing involves generating a unique hash value (a fixed-size string of characters) based on the content of digital evidence.
  • By comparing the hash value of the original evidence to the hash value of the potentially tampered evidence, investigators can determine whether the evidence has been altered.
  • Metadata is data that provides information about other data.
  • In the context of digital evidence, metadata can include information such as timestamps, file properties, and other attributes.
  • E-discovery (Electronic Discovery) is the process of identifying, collecting, preserving, and producing electronically stored information in response to a legal request.
  • Non-repudiation is the ability to prove that a message has not been altered or deleted. And describes the ability to prove that a message has not been altered or deleted.
  • Category of managerial security controls is physical security, technical security, and administrative security.
  • Administrative controls is the use of administrative controls to prevent or reduce the risk of a security incident. Focused on managing the day-to-day activities of an organization. Risk management. Involve the oversight of the organization's activities to ensure that they are carried out in accordance with the organization's policies and procedures.
  • Operation security controls are designed to protect the organization from threats and vulnerabilities. Focused on the physical security of the organization and its assets.
  • Configuration management is the process of managing the configuration of a system or software to ensure that it is in a known and acceptable state.
  • Data backups are used to protect data from accidental or malicious damage, loss or theft.
  • Security Awareness programs are designed to educate users about security threats and how to protect themselves. It also trains employees to recognize and report security incidents.
  • Technical Managerial controls focus on the technical aspects of the business, such as the production process, the quality of the product, and the efficiency of the operations.
  • Technical security controls are implemented to manage and mitigate security risks by protecting systems and data.
  • Technical controls are often referred to as logical security controls because they involve the use of technology to enforce security policies.
  • Technical controls are automated and executed by computer systems to enforce security measures.
  • Encryption protocols are used to secure data in transit and at rest.
  • Firewall ACLs (Access Control Lists) are used to control access to a network by defining which IP addresses are allowed to access a network.
  • Authentication Protocols are used to verify the identity of the user and the device.
  • System Hardening involves the use of security controls to reduce the impact of a security incident. This includes securing computer systems, networks, and software to reduce vulnerabilities and make them less susceptible to attacks.
  • Separation of duties is a policy that requires that different people perform different tasks in a business, reducing the possibility of fraud.
  • Preventive security controls are measures put in place to proactively prevent security incidents and protect assets from potential threats.
  • Detective security controls involve monitoring and detecting security events or anomalies within an organization's IT infrastructure.
  • Corrective security controls aim to mitigate the effects of security incidents once they have occurred.
  • Log monitoring is the process of monitoring the log files of a system to detect and respond to problems.
  • Security audits are performed to ensure that the security controls are in place and working properly.
  • IDS (Intrusion Detection System) is a software program that monitors network traffic for suspicious activity.
  • IPS (Intrusion Prevention System) is similar to IDS but can also take action against detected intrusions, such as blocking access to specific IP addresses.
  • Backing up data and having a system recovery plan in place allows an organization to restore its systems and data in the event of a security incident or data loss.
  • Having an alternate site or a disaster recovery location where essential business operations can continue in case of a disruption or security incident.
  • Fire suppression systems are designed to control or extinguish fires in data centers or critical infrastructure to prevent damage to equipment and data.
  • Deterrent Security Controls are designed to deter, deny, or delay an attacker from gaining access to a system.
  • Warning signs indicating the presence of security measures, such as surveillance cameras or alarms, to deter potential intruders.
  • Adequate lighting in and around a facility to discourage unauthorized access or suspicious activities.
  • Displaying banners or messages during the login process to remind users of security policies and legal restrictions, acting as a deterrent against unauthorized actions.
  • Compensating Security Controls are used to reduce the risk of a security breach.
  • Sandboxing is a technique that isolates a program from the rest of the operating system and prevents it from accessing the rest of the system
  • A backup power system is a power source that is used to provide power to the building in the event of a power outage