Information Technology /CompTIA Security+ (SY0-601): Monitoring & Auditing

CompTIA Security+ (SY0-601): Monitoring & Auditing

Information Technology20 CardsCreated about 2 months ago

This section explores different types of monitoring—signature-based, anomaly-based, and behavior-based—as well as essential concepts like baselining system performance and understanding how protocol analyzers operate in promiscuous versus non-promiscuous modes for traffic analysis.

Monitoring Types

Signature-based
Network traffic is analyzed for predetermined attack patterns

Anomaly-based
A baseline is established and any network traffic that is outside of the baseline is evaluated

Behavior-based
Activity is evaluated based on the previous behavior of applications, executables, and the operating system in comparison to the current activity of the system

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/20

Key Terms

Term
Definition

Monitoring Types

Signature-based
Network traffic is analyzed for predetermined attack patterns

Anomaly-based
A baseline is esta...

Baselining

Process of measuring changes in networking, hardware, software, and applications

Perfmon.exe = Windows Performance M...

Security Posture

Risk level to which a system or other technology element is exposed

Protocol Analyzers: Promiscuous Mode

Network adapter is able to capture all of the packets on the network, regardless of the destination MAC address of the frames carrying them

Protocol Analyzers: Non-promiscuous Mode

Network adapter can only capture the packets directly addressed to itself

SNMP: Agents

Software that is loaded on a managed device to redirect information to the network management system

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Monitoring Types

Signature-based
Network traffic is analyzed for predetermined attack patterns

Anomaly-based
A baseline is established and any network traffic that is outside of the baseline is evaluated

Behavior-based
Activity is evaluated based on the previous behavior of applications, executables, and the operating system in comparison to the current activity of the system

Baselining

Process of measuring changes in networking, hardware, software, and applications

Perfmon.exe = Windows Performance Monitor

Security Posture

Risk level to which a system or other technology element is exposed

Protocol Analyzers: Promiscuous Mode

Network adapter is able to capture all of the packets on the network, regardless of the destination MAC address of the frames carrying them

Protocol Analyzers: Non-promiscuous Mode

Network adapter can only capture the packets directly addressed to itself

SNMP: Agents

Software that is loaded on a managed device to redirect information to the network management system

NMS

Network Management System:

Software running on one or more servers to control the monitoring of network-attached devices and computers

SNMP Versions

SNMP v1/v2 are insecure due to the use of community strings to access a device

SNMP v3:
Version of SNMP that provides integrity, authentication, and encryption of the messages being sent over the network

Auditing

A technical assessment conducted on applications, systems, or networks

Auditing is a detective control
• Security logs
• ACLs
• User rights/permissions
• Group policies (GPOs)
• Vulnerability scans
• Written organizational policies
• Interviewing personnel

Software tools are also used to help conduct audits

Syslog

A standardized format used for computer message logging that allows for the separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them

SYSLOG uses port 514 over UDP

Log File Maintenance

Actions taken to ensure the proper creation and storage of a log file, such as the proper configuration, saving, back up, security, and encryption of the log files

Log files should be saved to a different partition or an external server

Overwrite Events

When a maximum log size is reached, the system can begin overwriting the oldest events in the log files to make room

Logs should be archived and backed up to ensure they are available when required

WORM

Write Once, Read Many:

Technology like a DVD-R that allows data to be written only once but read unlimited times

SIEM

Security Information & Events Management:
A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications

SIEM Tools

Splunk
ArcSight
ELK/Elastic Stack
QRadar
Graylog
AlienVault/OSSIM

Syslog Drawbacks

Since syslog relied on UDP, there can be delivery issues within congested networks

Basic security controls like encryption and authentication are not included by default within syslog

Newer Syslog Features

Due to security issues, newer syslog implementations added new features and capabilities
▪ Newer implementations can use port 1468 (TCP) for consistent delivery
▪ Newer implementations can use TLS to encrypt messages sent to servers
▪ Newer implementations can use MD-5 or SHA-1 for authentication and integrity
▪ Some newer implementations can use message filtering, automated log analysis, event response scripting, and alternate message formats

The newer version of the server is called syslog-ng or rsyslog

Syslog can refer to the protocol, the server, or the log entries themselves

SOAR

Security Orchestration, Automation, & Response:
A class of security tools that facilitates incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment

Primarily used for incident response

Next-Gen SIEM

A security information and event monitoring system with an integrated SOAR

Scans security/threat data
Analyze it with ML
Automate data enrichment
Provision new resources

SOAR: Playbook & Runbook

Playbook:
A checklist of actions to perform to detect and respond to a specific type of incident

Runbook:
An automated version of a playbook that leaves clearly defined interaction points for human analysis