House of Common Techniques
My Greatest Asset
So Much Room for Activities
!!!!!!!!!!!!!
We're more secure than your dad
100

This establishes what normal operations look like, should be compared against to understand if something is happening on your network or system

What is a Baseline?

100

The idea that a product or service or data set belongs to someone in particular with an organization

What is Ownership?

100

These are automated tools that look for known weaknesses in security on services and devices present on your network

What are Vulnerability Scanners?

100

This is the term for collecting logs from multiple sources on a network

What is Log Aggregation?

100

This enforces security policies to a network by inspecting devices that attempt to connect beyond their MAC address and will block devices that do not meet security requirements

What is Network Access Control NAC?

200

We disable unused ports, use VLAN segments, and port security on these devices to do this? (2 part answer)

What is Switch Hardening?

200

This involves identifying devices, services, and software within an environment, used to detect unknown assets within a network

What is Enumeration?

200

This may involve running an application in a sandbox to test how an application is running in real-time and see what it is doing and how it reacts to inputs while looking at it's code

What is Dynamic Code Analysis?

200

This protocol defines standards for the format and exchange of security information and automate vulnerability management, compliance checking, and policy enforcement

What is SCAP Security Content Automation Protocol?

200

These tools focus on detecting, investigating, and responding to threats on an end point and then can be linked together to get a broader view of threats to your network (2 tools for the answer)

What is Endpoint/Extended Detection and Response EDR/XDR?

300

We put these into separate network segments due to the security risks they pose due to being cheaper, weaker devices, even though they are becoming commonplace in all parts of life

What is Internet of Things?

300

You do this to data when you are disposing or reusing a device, this term covers any type of removal effort short of destroying the device completely

What is Sanitization?

300

This activity simulates an attack on a network or resource to help understand the potential damage a real attack could do and help inform decisions to better prevent future attacks

What is Penetration Testing?

300

This type of tool collects logs from end points and devices to give you a single-pane-of-glass view of your network's health, only shows statuses and alerts, does not take any actions itself

What is a SIEM Security Information and Event Management system?

300

This allows organizations to leverage the authentication and identity structures of other organizations to provide authentication services to them, think using a "Log In with Google" button to login to another website

What is Federation?

400

You do one of these to understand the radio environment of your site, generates a heat map when done

What is a Site Survey?

400

Considered the BEST way to guarantee the destruction of data on a device

What is Fire?

400

This kind of program encourages outside developers and users to discover and turn in flaws found in hardware and software to their manufacturer's, often with a monetary reward included as an incentive

What is a Bug Bounty Program?

400

This system monitors network devices and send notifications about events occurring on the network using traps

What is Simple Network Management Protocol SNMP?

400

This system restricts authorizations from strict policies defined by a central authority, which users cannot change

What is a MAC Mandatory Access Control?

500

This involves running applications in an isolated environment to analyze it's behavior and validate that it functions as expected

What is Sandboxing?

500

These are issued when a device is destroyed securely, required for some regulatory compliance depending on the nature of the device and data held on it

What is Certification?

500

This is the term for what a company determines is an acceptable loss in time, money, reputation, or other resources before mitigating factors must be applied

What is Risk Tolerance?

500

These system monitor and control the movement of sensitive data across networks and devices by inspecting and applying an allow/deny list to the content that it can read 

What is a Data Loss Prevention DLP system?

500

This is the biggest security benefit to automation

What is Reaction Time?

M
e
n
u