1.7 Techniques in Security Assessments
Threat Hunting
Fusing the data = collect data from different sources such as logs and sensors, network information, internet events, and intrusion detection - external sources - threat feeds, governmental alerts, social media - correlate with big data analytics for predictive analysis and user behavior analytics
Vulnerability Scans
Port scan - gather information on the server and see which ports are open - identify systems - gather as much information as you can about the system
Usually performed from outside and inside (attacker vs insider threat)
Scan types - non-intrusive scans, you just gather information and not try to exploit a vulnerability - intrusive scans, you try out the vulnerabilities to see if they work - non-credentialed scans, the scanner can't login to the remote device - credentialed scan, you are a normal user within a system, it emulates an insider attack
Dealing with false positives - a vulnerability is identified that doesn't really exist - false positive - a vulnerability exists but you didn't detect it - false negative (riskier than false positive)
Security Information and Event Management (SIEM)
Collect information anything on the network - logging of security events and information - real-time information - log aggregation and long-term storage - forensics analysis
Syslog allows to send logs from different diverse devices to different systems - central log collector
SIEM data - server authentication attemps | VPN connection | firewall session logs | outbound traffic flows | network utilization | packet captures, network packets
Analyzing data - big data analytics, analyze large data stores - detect insider threats | identify targeted attacks - sentiment analysis
SOAR - security orchestration, automation, and response - automating routines and time intensive activities - streamline and automate incident response and threat management SOAR platforms and solutions are designed to help security teams effectively manage the growing volume of security alerts and incidents while reducing response times and improving overall security posture.
Last updated
Was this helpful?