πStudy Focus | Domain 7: Security Operations
π Domain 7: Security Operations
π Flashcard Topics (Sequence-Heavy, Forensics-Focused, Operational Traps)
π¨ Incident Response (IR)
π Incident Response Lifecycle (NIST 800-61)
-
Preparation → Detection → Analysis → Containment → Eradication → Recovery → Lessons Learned
𧬠Order of Volatility (OOV)
-
1. CPU registers → 2. RAM → 3. Disk → 4. Remote logs/archives
π Chain of Custody
-
Formal documentation of who handled evidence and when
π§ͺ Forensics Basics
-
Imaging = Bit-for-bit copy of a drive
-
Hashing (MD5/SHA) = Ensures forensic integrity
-
Write Blocker = Prevents data modification during acquisition
-
Time Offset = Accounts for time zone in log analysis
π§― Disaster Recovery & Business Continuity
π Key Recovery Metrics
-
RTO (Recovery Time Objective) = Max time to restore
-
RPO (Recovery Point Objective) = Max data loss tolerated
π ️ BCP vs DRP
-
BCP = Ensures business continues
-
DRP = IT system restoration after a disaster
πΌ Personnel Security
-
Separation of Duties = Prevents fraud; no one person controls all parts
-
Job Rotation = Reduces risk, detects fraud
-
Mandatory Vacations = Detects long-running schemes
π¦ Backup Types & Strategies
-
Full = All files
-
Incremental = Since last backup of any type
-
Differential = Since last full backup
-
Grandfather-Father-Son = 3-level rotation strategy
π§° Monitoring and Detection
π SIEM (Security Info & Event Mgmt)
-
Correlates logs across systems for threat detection
π§ Honeypot vs Honeynet
-
Honeypot = Decoy system
-
Honeynet = Group of honeypots
π DLP (Data Loss Prevention)
-
Detects/prevents data exfiltration (email, USB, cloud)
𧨠Malware and Threat Types
-
Rootkit = Hides itself at OS level
-
Logic Bomb = Malicious code triggered by event/date
-
Trojan = Malware disguised as legit software
-
Polymorphic Malware = Changes its code to evade detection
π« Physical Security Controls
-
Mantrap = Two-door access control
-
Faraday Cage = Blocks electromagnetic signals
-
CCTV = Provides deterrence + evidence
-
Guards = Active deterrence; reactive capability
π‘ Media & E-Waste Handling
-
Degaussing = Demagnetize tape or disk
-
Shredding = Physical destruction of paper/data
-
Burning/Incineration = Final destruction
-
Pulverizing = Crush physical media (e.g., hard drives)
𧬠Configuration and Change Management
-
Configuration Management = Maintain consistent, secure system settings
-
Change Control = Approval, testing, rollback before deployment
Domain 7 can feel like common sense — but the test twists it with procedural nuance. Drill sequence-based concepts and forensic processes hard.
Comments
Post a Comment