Host-Based Analysis

¡Supera tus tareas y exámenes ahora con Quizwiz!

Security Log

A log that contains records of security related events including login/logout activity.

Threat Actor

A person or entity that is responsible for an event or incident that impacts or has potential to impact, the safety or security of another entity.

Application Blacklisting

Allows every program except those described on the blacklist to run. Makes sure known-bad software is prevented from being executed on a system.

AVAST

Antimalware software

Linux

Free, Difficult to use, Very Reliable, Strong Security

Tampered Disk Image

Image that was altered. Data, applications or systems were tampered.

Windows

Pricey, Very easy to use, Less reliable, weaker security.

Chain of Custody

A list of all people who came into possession of an item of evidence. If fail to mention this than unlikely you cannot use that evidence in court.

AVAST, AVG, CL, Kaspersky, Norton

Antivirus software

Indirect Evidence

Based on other evidence.

Corroborative Evidence

Evidence that supplements and strengthens already existing evidence. Based on theory.

Indicators of Attack

Known as IOAs, indicators that help to identify clues that an attack has taken or is taking place, such as unauthorized account privilege escalation, exfiltration of sensitive data, or requests for information from a compromised email account. Forensic evidence collected after a successful attack. Reactive Measure.

Application Whitelisting

List of applications that are authorized or allowed to run on the whitelist.

Host-Based Firewall

Software firewalls installed on a single host to monitor and control its incoming and outgoing network traffic.

Untampered Disk Image

Users must not be able to tamper with data, applications or system.

Sandboxing

A restricted, controlled execution environment that prevents potentially malicious software, such as a mobile code, from accessing any system resources except those for which the software is authorized.

Assets

Any items that have value to the organization. For example, software, personnel, processes.

Indicators of Compromise

Are suspicious or unusual behaviors or traffic that may indicate something wrong with a network or computer. Proactive measure. Describe and help to detect a methodology for performing an attack.

Host-Based Intrusion Detection

Monitors the characteristics of a single host and the events occurring within that host to identify and analyze suspicious activity. It does not actively stop threats as they happen.

Apache

Stores information about events that occurred on your Apache web server. Provides administrators with another type of log file called error logs.


Conjuntos de estudio relacionados

Financial Institutions Chapter 6

View Set

[Unit44] isn't, haven't, don't, etc. (negatives)

View Set

Sales Is About Asking Intelligent Questions and Treating Every Customer as an Individual

View Set

Chapter 53: Concepts of Care for Patients with Liver Problems

View Set