CompTIA CySA+
1 Threat Management
1-1 Threat Landscape
1-1 1 Identifying Threat Actors
1-1 2 Understanding Threat Vectors
1-1 3 Threat Intelligence Sources
1-1 4 Threat Intelligence Lifecycle
1-2 Threat Hunting
1-2 1 Threat Hunting Concepts
1-2 2 Threat Hunting Techniques
1-2 3 Threat Hunting Tools
1-3 Threat Modeling
1-3 1 Threat Modeling Concepts
1-3 2 Threat Modeling Techniques
1-3 3 Threat Modeling Tools
1-4 Threat Mitigation
1-4 1 Threat Mitigation Strategies
1-4 2 Threat Mitigation Techniques
1-4 3 Threat Mitigation Tools
2 Vulnerability Management
2-1 Vulnerability Identification
2-1 1 Vulnerability Scanning
2-1 2 Vulnerability Assessment
2-1 3 Vulnerability Identification Tools
2-2 Vulnerability Analysis
2-2 1 Vulnerability Analysis Techniques
2-2 2 Vulnerability Analysis Tools
2-3 Vulnerability Prioritization
2-3 1 Vulnerability Prioritization Techniques
2-3 2 Vulnerability Prioritization Tools
2-4 Vulnerability Remediation
2-4 1 Vulnerability Remediation Techniques
2-4 2 Vulnerability Remediation Tools
3 Cyber Incident Response
3-1 Incident Response Planning
3-1 1 Incident Response Plan Development
3-1 2 Incident Response Team Roles
3-1 3 Incident Response Plan Testing
3-2 Incident Detection
3-2 1 Incident Detection Techniques
3-2 2 Incident Detection Tools
3-3 Incident Analysis
3-3 1 Incident Analysis Techniques
3-3 2 Incident Analysis Tools
3-4 Incident Response
3-4 1 Incident Response Techniques
3-4 2 Incident Response Tools
3-5 Incident Recovery
3-5 1 Incident Recovery Techniques
3-5 2 Incident Recovery Tools
4 Security Architecture and Tool Sets
4-1 Security Controls
4-1 1 Security Control Types
4-1 2 Security Control Implementation
4-1 3 Security Control Monitoring
4-2 Security Tools
4-2 1 Security Tool Categories
4-2 2 Security Tool Implementation
4-2 3 Security Tool Monitoring
4-3 Security Architecture
4-3 1 Security Architecture Concepts
4-3 2 Security Architecture Design
4-3 3 Security Architecture Implementation
5 Compliance and Assessment
5-1 Compliance Requirements
5-1 1 Compliance Standards
5-1 2 Compliance Audits
5-1 3 Compliance Reporting
5-2 Assessment Techniques
5-2 1 Assessment Methodologies
5-2 2 Assessment Tools
5-2 3 Assessment Reporting
5-3 Risk Management
5-3 1 Risk Management Concepts
5-3 2 Risk Management Techniques
5-3 3 Risk Management Tools
6 Software Development Security
6-1 Secure Coding Practices
6-1 1 Secure Coding Principles
6-1 2 Secure Coding Techniques
6-1 3 Secure Coding Tools
6-2 Software Development Lifecycle
6-2 1 SDLC Phases
6-2 2 SDLC Security Practices
6-2 3 SDLC Security Tools
6-3 Software Testing
6-3 1 Software Testing Techniques
6-3 2 Software Testing Tools
6-3 3 Software Testing Security
7 Security Operations
7-1 Security Operations Concepts
7-1 1 Security Operations Roles
7-1 2 Security Operations Processes
7-1 3 Security Operations Tools
7-2 Security Monitoring
7-2 1 Security Monitoring Techniques
7-2 2 Security Monitoring Tools
7-3 Security Incident Management
7-3 1 Incident Management Techniques
7-3 2 Incident Management Tools
7-4 Security Awareness Training
7-4 1 Security Awareness Training Concepts
7-4 2 Security Awareness Training Techniques
7-4 3 Security Awareness Training Tools
Incident Detection Explained

Incident Detection Explained

Incident detection is a critical phase in the cyber incident response process, involving the identification of security breaches or anomalies in an organization's systems. Effective incident detection helps organizations respond quickly to minimize damage and recover efficiently. Here are the key concepts related to incident detection:

1. Monitoring and Logging

Monitoring and logging involve continuously observing system activities and recording them for analysis. This includes collecting data from various sources such as network traffic, system logs, and application logs. For example, a Security Information and Event Management (SIEM) system can monitor network traffic for unusual patterns that might indicate a security breach.

2. Anomaly Detection

Anomaly detection focuses on identifying behaviors or activities that deviate from the norm. This can include unusual login attempts, unexpected data transfers, or abnormal system resource usage. For instance, if a user typically accesses the system from a specific location and suddenly logs in from a different country, this could be flagged as an anomaly.

3. Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) are tools that monitor network traffic and system activities for signs of malicious behavior. IDS can be either network-based, which monitors traffic across the entire network, or host-based, which focuses on individual systems. For example, a network-based IDS might detect a Distributed Denial of Service (DDoS) attack by observing a sudden increase in traffic to a particular server.

4. Threat Intelligence

Threat intelligence involves gathering and analyzing information about potential threats to anticipate and detect incidents. This includes data from external sources such as threat feeds, security advisories, and threat actor profiles. For example, if a new malware variant is detected in the wild, threat intelligence can help identify systems within the organization that might be at risk.

Examples and Analogies

Consider a hospital as an example of an organization that needs to detect incidents. Monitoring and logging would involve continuously observing activities such as patient data access and network traffic. Anomaly detection might flag unusual behavior, such as a doctor accessing patient records outside their usual working hours. An Intrusion Detection System (IDS) could detect unauthorized access attempts to the hospital's network. Threat intelligence would help the hospital anticipate and prepare for emerging threats, such as a new ransomware variant targeting healthcare systems.

Incident detection is akin to having a security guard in a building. Just as a security guard monitors activities and alerts authorities to suspicious behavior, incident detection systems continuously monitor and alert organizations to potential security breaches.