CySA+ Chapter 17 Slide Handouts

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Common Symptoms of Compromise

Chapter 17

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Episode 17.01
Network Symptoms

Objective: 4.3 Given an incident, analyze potential indicators of compromise.


• Network-related
- Bandwidth consumption
- Beaconing
- Irregular peer-to-peer communication
- Rogue device on the network
- Scan/sweep
- Unusual traffic spike
- Common protocol over non-standard port

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Diagnose Symptoms

• What are processes doing?

• Unauthorized system usage


Application
• Connections

Host • Processes & applications

• Unusual bandwidth changes

Network
• Unusual traffic

• Unusual connections

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Network-Related Symptoms
• Bandwidth consumption
• Traffic spikes
• Traffic irregularities

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Bandwidth Consumption

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Network-Related Symptoms
• Beaconing
• Peer-to-peer communications
• Rogue devices
• Scan sweeps

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Scan Sweep

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Episode 17.02
Host Symptoms

Objective: 4.3 Given an incident, analyze potential indicators of compromise.


• Host-related
- Processor consumption
- Memory consumption
- Drive capacity consumption
- Unauthorized software
- Malicious process
- Unauthorized change
- Unauthorized privilege
- Data exfiltration
- Abnormal OS process behavior
- File system change or anomaly
- Registry change or anomaly
- Unauthorized scheduled task

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Host-Related Symptoms
• Memory consumption
• Disk consumption
• Processor consumption
• Unauthorized applications or processes
• Unauthorized privileges
• Data exfiltration

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Windows Task Manager

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
macOS Activity Monitor

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Episode 17.03
Application Symptoms

Objective: 4.3 Given an incident, analyze potential indicators of compromise.


• Application-related
- Anomalous activity
- Introduction of new accounts
- Unexpected output
- Unexpected outbound communication
- Service interruption
- Application log

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Application-Related Symptoms
• Anomalous activity
• Unexpected error messages
• Out of memory alerts
• Unexpected outbound transmissions

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Little Snitch

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon
Windows Firewall

CompTIA CySA+ Cybersecurity Analyst (CS0-002)


with Brent Chapman and Michael Solomon

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy