This non-encrypted protocol can be used to remotely administer network devices. (Although it shouldn't)
What is Telnet?
OR
What is Port 23?
A globally accessible knowledge base of adversary tactics and techniques based on real-world observations.
What is the MITRE ATT&CK Framework
This control type would involve Log forwarders, SIEMs, IDS, Cameras, Security guards, and motion sensors.
What are detective controls?
Defined as the ability, skill level, and resources a malicious actor possesses to plan and execute a cyberattack.
What is adversary capability?
This device is designed to provide you with a line of defense at the networks boundary to control the type of traffic that can enter and leave the network. (Usually through the use of ACLs)
What is a firewall?
What is HTTP?
OR
What is Port 80?
An interpretive residual sign that an asset or network has been successfully attacked.
What is IoC?
This control type would involve Gates, Fences, IPS solutions, and Security guards.
What are physical controls
Gathering intelligence via publicly available information and tools for aggregating and searching said information.
What is OSINT
A method of circumventing DDoS attacks. It involves routing malicious packets to an interface that is attached to monitoring tools to gather information.
What is Sinkholing?
OR What are sinkholes?
What is Port 53?
OR
What is DNS?
The Fourth Phase of the Lockheed martin Kill chain.
What is Exploitation?
This control type would involve Firewalls, Encryption, IDS solutions, SIEM solutions, and ACLs.
What are technical controls?
This represents all of the points within your network that an attacker could interact with, once inside of the network boundary, in order to potentially compromise it.
What is total attack surface?
A documented record of a network's normal behavior, traffic patterns, configurations, and performance under typical conditions.
What is a baseline?
This protocol is used to create standardized logging messages, allowing software and other devices to send event logs to a central server for collection and analysis.
What is Syslog?
OR
What is port 514?
One of the four core features of the Diamond Model of Intrusion Analysis.
What is Adversary?
Infrastructure?
Capability?
Victim?
An IPS would fall under these two categories.
What are Technical and preventative controls?
the probability that an attack will be realised.
Threat likelihood.
This open source GUI tool displays information of packets within its "panes" packets can be selected for further investigation and stream following.
What is wireshark?
What is FTPS?
OR
What is port 990?
The final three phases of the Kill chain.
What is:
Installation, Command and Control, Action on objectives?
(Must be all three)
This is a dedicated port on a switch that takes a mirrored copy of network traffic from within the switch to be sent to a destination.
What is a SPAN?
This threat hunting model involves utilizing threat research done before and attack is realized in order to discover whether there is evidence of TTPs present within a system or network
Proactive threat hunting
What is DGA?