0% found this document useful (0 votes)
88 views7 pages

Acronis #CyberFit Cloud Tech Associate Advanced Security With EDR 2023 Glossary

This document provides definitions for key cybersecurity terms: 1) It defines endpoint protection platform (EPP), endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) as different types of security solutions deployed on endpoints. 2) It describes a security operations center (SOC) as a centralized function that monitors and improves an organization's security posture through threat prevention, detection, analysis, and response. 3) It distinguishes the roles of security analysts and threat analysts, noting that security analysts focus on present threats while threat analysts proactively hunt for potential threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views7 pages

Acronis #CyberFit Cloud Tech Associate Advanced Security With EDR 2023 Glossary

This document provides definitions for key cybersecurity terms: 1) It defines endpoint protection platform (EPP), endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) as different types of security solutions deployed on endpoints. 2) It describes a security operations center (SOC) as a centralized function that monitors and improves an organization's security posture through threat prevention, detection, analysis, and response. 3) It distinguishes the roles of security analysts and threat analysts, noting that security analysts focus on present threats while threat analysts proactively hunt for potential threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Glossary

#CyberFit Academy
Glossary
Term Description

An endpoint protection platform (EPP) is a solution deployed on endpoint devices to prevent file-based malware
attacks, detect malicious activity and provide the investigation and remediation capabilities needed to respond to
dynamic security incidents and alerts.

Detection capabilities will vary, but advanced solutions will use multiple detection techniques, ranging from static
IOCs (signature-based detection) to behavioral analysis. Desirable EPP solutions are primarily cloud-managed,
allowing the continuous monitoring and collection of activity data, along with the ability to take remote remediation
Endpoint protection platform (EPP)
actions, whether the endpoint is on the corporate network or outside of the office. In addition, these solutions are
cloud-data-assisted, meaning the endpoint agent does not have to maintain a local database of all known IOCs, but
can check a cloud resource to find the latest verdicts on objects that it cannot classify.

Note: According to Gartner EDR and EPP tools are merging to address new threats. Leading vendors have created
holistic tools in a single portal. These platforms can displace existing endpoint toolsets with faster detection and
optional automated response.

Solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect
suspicious system behavior, provide contextual information, block malicious activity and provide remediation
suggestions to restore affected systems. EDR solutions must primarily provide the following four capabilities:
Endpoint Detection and Response (EDR)
▪ Detect security incidents
▪ Contain the incident at the endpoint
▪ Investigate security incidents
▪ Provide remediation guidance

#CyberFit Academy
Glossary
Term Description

The evolution of EDR, which optimizes threat detection, investigation, response, and hunting in real time. XDR unifies
security-relevant endpoint detections with telemetry from security and business tools such as network analysis and
Extended Detection and Response (XDR) visibility (NAV), email security, identity and access management, cloud security, and more. It is a cloud-native
platform built on big data infrastructure to provide security teams with flexibility, scalability, and opportunities for
automation.

Managed detection and response (MDR) is an outsourced service that provides organizations with threat hunting
services and responds to threats once they are discovered.
Managed Detection and Response (MDR)
It also involves a human element: Security providers provide their MDR customers access to their pool of security
researchers and engineers, who are responsible for monitoring networks, analyzing incidents, and responding to
security cases.

A Security Operation Center (SOC) is a centralized function within an organization employing people, processes,
and technology to continuously monitor and improve an organization's security posture while preventing, detecting,
analyzing, and responding to cybersecurity incidents.
Security Operations Center (SOC)
A SOC acts like the hub or central command post, taking in telemetry from across an organization's IT infrastructure,
including its networks, devices, appliances, and information stores, wherever those assets reside.

The security analyst is an expert in tracking down active threats in an environment and their efforts are primarily
Security analyst / SOC analyst focused on what's happening in the present. In traditional detection of threats, SOC analysts use a large quantity of
tools that will automatically generate alerts for investigation and mitigation.

A threat analyst specializes in monitoring and analyzing active as well as potential cyber security threats, while
Threat analyst gathering useful intelligence throughout time. In contrast with the security analysts who are mostly reactive, threat
analysis proactively hunt for threats.

#CyberFit Academy
Glossary
Term Description

An effect of uncertainty on or within information and technology. Cybersecurity risks relate to the loss of
confidentiality, integrity, or availability of information, data, or information (or control) systems and reflect the
Cyber risk
potential adverse impacts to organizational operations (i.e., mission, functions, image, or reputation) and assets,
individuals, other organizations, and the Nation.

Any circumstance or event with the potential to adversely impact organizational operations (including mission,
functions, image, or reputation), organizational assets, or individuals through an information system via
Cyber threat
unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the
potential for a threat-source to successfully exploit a particular information system vulnerability.

An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise
Attack
system integrity, availability, or confidentiality.

Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which
Compromise unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have
occurred.

The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence
Breach where: a person other than an authorized user accesses or potentially accesses sensitive information; or an
authorized user accesses sensitive information for another than authorized purpose.

Cyberattack which intruders use legitimate software and functions available in the system to perform malicious
Living-Off-The-Land Attack actions on it.

#CyberFit Academy
Glossary
Term Description

IOCs (Indicators of Compromise) IOCs are pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious
activity on a system or network.
These bread crumbs can help Service Providers to detect malicious activity early in an attack sequence
Let’s take an example:
• A publicly know malware that has been seen in the wild is identified by a specific hash, or connectivity to a
specific IP, or does a change in a specific registry key, etc. Such information you can find over internet while
researching any specific threat that you are interested in.
• All of these artefacts, are called indicators of compromise and any trace of them found on a system hints that a
workload is compromised and actions need to be taken.
Finding an IOC on an workload can mean either that an attack is preparing or that an attack has taken place

Event Occurrence or change of a particular set of circumstances within a system.

An event or series of events that actually or potentially jeopardizes the confidentiality, integrity, or availability of an
Incident information system or the information the system processes, stores, or transmits or that constitutes a violation or
imminent threat of violation of security policies, security procedures, or acceptable use policies.

A brief, usually human-readable, technical notification regarding current security-relevant issue such as
Alert
vulnerabilities, exploits, etc. Also known as an advisory, bulletin, or vulnerability note.

The MITRE ATT&CK™ framework is a comprehensive matrix of tactics and techniques used by threat hunters, red
teamers, and defenders to better classify attacks and assess an organization's risk.
MITRE ATT&CK framework
The aim of the framework is to improve post-compromise detection of adversaries in enterprises by illustrating the
actions an attacker may have taken.

#CyberFit Academy
Glossary
Term Description

NIST framework The National Institute of Standards and Technology (NIST) framework is a best market standard framework that
focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the
organization’s risk management processes.

More information: https://www.nist.gov/cyberframework

Incorrect flagging of something as malicious when it’s not. Analogy: Mistaking a real bank client for a robber and
False positive
discovering the truth after the guard catches him.

When a security system fails to identify a threat, something malicious is flagged as non-malicious.
False negative
(Analogy: Not understanding that someone was a robber until after they leave the bank with the money.)

Signature-based technologies – Having a predefined repository of static signatures (fingerprints/hashes) that


represent known threats. These threats are different from one another because of their unique coding. A threat is
detected by the technology creating signatures for each file and comparing with the database of known bad
signatures.
Detection types: Signature vs behavior vs intent
Behavior technologies – Concerned with looking at known bad behaviors but blind to the intent of the attackers.
Most of the time, they are associated with the techniques by which an attacker achieves it’s goal/intent.

Intent - Concerned with what is the objective of the attacker (regardless of the techniques used to achieve them)

#CyberFit Academy
Glossary
Term Description

Malware that is actively exploited in the wild, and therefore is part of antivirus databases. Can be detected with
Known malware
signature-based detection.

Unknown malware New, previously unseen form of malware. Can be detected only with behavioral heuristics.

Attacks that use continuous, sophisticated and highly evasive hacking techniques to gain unauthorized access to
Advanced Persistent Threats (APTs)
system and stay undetected for a prolonged period of time, with potentially destructive consequences

Malware that infiltrates the system through a zero-day vulnerability (a vulnerability that is exploitable, but the
Zero-day malware software vendor has not released a patch for it yet – the vulnerability can be known or unknown). Can be detected
with behavioral heuristics.

Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. It does not rely
Fileless attack on files and leaves no footprint, making it challenging to detect and remove. Can be detected with exploit
prevention.

Polymorphic malware A type of malware that constantly changes its identifiable features in order to evade detection

Obfuscation techniques entail making malware more complex by design in order to mask identifiable features and
Obfuscation technique
evade detection

An exploit kit or exploit pack is a type of toolkit cybercriminals use to attack vulnerabilities in systems so they can
Exploit kit
distribute malware or perform other malicious activities.

#CyberFit Academy

You might also like