CompTIA Security+ (SY0-601): Monitoring & Auditing
This section explores different types of monitoring—signature-based, anomaly-based, and behavior-based—as well as essential concepts like baselining system performance and understanding how protocol analyzers operate in promiscuous versus non-promiscuous modes for traffic analysis.
Monitoring Types
Signature-based
Network traffic is analyzed for predetermined attack patterns
Anomaly-based
A baseline is established and any network traffic that is outside of the baseline is evaluated
Behavior-based
Activity is evaluated based on the previous behavior of applications, executables, and the operating system in comparison to the current activity of the system
Key Terms
Monitoring Types
Signature-based
Network traffic is analyzed for predetermined attack patterns
Anomaly-based
A baseline is esta...
Baselining
Process of measuring changes in networking, hardware, software, and applications
Perfmon.exe = Windows Performance M...
Security Posture
Risk level to which a system or other technology element is exposed
Protocol Analyzers: Promiscuous Mode
Network adapter is able to capture all of the packets on the network, regardless of the destination MAC address of the frames carrying them
Protocol Analyzers: Non-promiscuous Mode
Network adapter can only capture the packets directly addressed to itself
SNMP: Agents
Software that is loaded on a managed device to redirect information to the network management system
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Monitoring Types | Signature-based Anomaly-based Behavior-based |
Baselining | Process of measuring changes in networking, hardware, software, and applications Perfmon.exe = Windows Performance Monitor |
Security Posture | Risk level to which a system or other technology element is exposed |
Protocol Analyzers: Promiscuous Mode | Network adapter is able to capture all of the packets on the network, regardless of the destination MAC address of the frames carrying them |
Protocol Analyzers: Non-promiscuous Mode | Network adapter can only capture the packets directly addressed to itself |
SNMP: Agents | Software that is loaded on a managed device to redirect information to the network management system |
NMS | Network Management System: Software running on one or more servers to control the monitoring of network-attached devices and computers |
SNMP Versions | SNMP v1/v2 are insecure due to the use of community strings to access a device SNMP v3: |
Auditing | A technical assessment conducted on applications, systems, or networks
Software tools are also used to help conduct audits |
Syslog | A standardized format used for computer message logging that allows for the separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them SYSLOG uses port 514 over UDP |
Log File Maintenance | Actions taken to ensure the proper creation and storage of a log file, such as the proper configuration, saving, back up, security, and encryption of the log files Log files should be saved to a different partition or an external server |
Overwrite Events | When a maximum log size is reached, the system can begin overwriting the oldest events in the log files to make room Logs should be archived and backed up to ensure they are available when required |
WORM | Write Once, Read Many: Technology like a DVD-R that allows data to be written only once but read unlimited times |
SIEM | Security Information & Events Management: |
SIEM Tools |
|
Syslog Drawbacks | Since syslog relied on UDP, there can be delivery issues within congested networks Basic security controls like encryption and authentication are not included by default within syslog |
Newer Syslog Features | Due to security issues, newer syslog implementations added new features and capabilities The newer version of the server is called syslog-ng or rsyslog Syslog can refer to the protocol, the server, or the log entries themselves |
SOAR |
Primarily used for incident response |
Next-Gen SIEM | A security information and event monitoring system with an integrated SOAR Scans security/threat data |
SOAR: Playbook & Runbook | Playbook: Runbook: |