Blue_Team_Fundamentals_Module_02
Blue_Team_Fundamentals_Module_02
Blue Team
Fundamentals
Module : 02 | INTRODUCTION TO CYBER OPERATIONS
INTRODUCTION TO
CYBER OPERATIONS
INTRODUCTION TO CYBER OPERATIONS
● Cyber operation is technically termed as Security
● General overview of SOC
Operations in an IT enterprise. whose act as a first
● Working behavior of SOC
line defenders of any cyber attacks. .
● Dedicated vs Virtual SOC
● Tool & Technology
● Cyber operations play a crucial role in collecting
● Incident Management & handling
intelligence through cyber espionage, monitoring
● First line of investigation
adversary activities, and analyzing digital
information.
General overview of
Security Operations
General overview of Security
Operations
Security operations is a critical aspect of an
organization's overall cybersecurity strategy. It helps
the organization to monitor, detect, response and
mitigating cyber threats effectively and efficiently.
Security Operations teams generally operate 24 hours a ● Security operations often collaborate with several
day, seven days a week. to ensures the continuous security teams, such as Threat Intelligence, Incident
monitoring and rapid response to security incidents. Response, and Forensics, to limit the threat, eliminate
the underlying cause, and restore affected systems
● Continuous monitoring, and data.
● Alert Investigation
● Determining and categorizing the nature of alert
Log Vs Event VS Incidents
" OR 1 = 1 -- - Apache2/access.log
● False positive occurs when a security tool ● False Negative: occurs when a security tool fails
incorrectly identifies a legit activit. this means to identifies a positive malicious instance.
the tool generates an false alarm for a legal
and legit process.
SOC Working : Phase 04
Dedicated vs SOCaaS
Security Operations
Dedicated Security Operation
Dedicated Security Operations
commonly referred to an
on-premise and dedicated
Security Operations Center (SOC)
setup. This typically involves a
centralized physical location
where security analysts and
professionals work together as a
cohesive team.
Common Challenges in Dedicated Security Operation
Dedicated Security Operations Centers (SOCs) face ● High Initial Setup Costs
Operations:
SOCaaS : SOC As A Service
Virtual Security Operations
model, also termed as SOC as a
Service the security team
generally operates remotely and
may not share a common
physical location. Many
organizations are providing these
service where they will be
responsible for monitoring
common logs and events.
Common Challenges in Virtual Security Operation
● Data Privacy and Compliance Despite these challenges, SOCaaS can be a viable solution for
● Communication and Collaboration many organizations, particularly those with resource constraints
● Resource Distribution and Access or evolving security needs. Organizations should carefully
● Integration with Existing Systems evaluate SOCaaS providers, establish clear expectations, and
Web Application
Firewall Proxy & VPN
Firewall
● Allow or deny individual packets of data without considering the ● Allow or deny by examining the individual packets, keep track of the
context of the entire communication session. state of active connections by maintaining a state table.
● Rule are been defined based on the source,destination,port and ● Rules are been defined based on the context based filtering decisions.
protocol
● No session state will be maintained ● Session will be maintained to track the state of connections,
● Stateless firewalls are generally faster because they don't maintain ● Stateful firewalls are compared to be slower that the stateless firewall
information about the state of connections but it will provide a higher level of security.
Stateful Firewall
Stateful firewall are been considered as a
bit more secure that the stateless firewall,
it generally examining the individual
packets and keep track of the state of
active connections by maintaining a state
table. by default the external to internal
communication are been denied by the
stateful firewall, in-addition Some stateful
firewalls can perform deep packet
inspection at the application layer, offering
more granular control over traffic
Web Application
Firewall | WAF
Web Application Firewall
Web Application Firewall based attacks are been more precise to
protect an enterprise web applications from various web based
attacks.
Generally web applications are been the most common target for
many adversaire to get and initial access to an organization
infrastructure. WAF is been one of the most recommended solution
to to prevent such activities.
Proxy are been generally categorised based on the characteristic and its behaviors
support@cyberwarfare.live
To know more about our offerings, please visit: https://cyberwarfare.live