Reader small image

You're reading from  Security Monitoring with Wazuh

Product typeBook
Published inApr 2024
PublisherPackt
ISBN-139781837632152
Edition1st Edition
Right arrow
Author (1)
Rajneesh Gupta
Rajneesh Gupta
author image
Rajneesh Gupta

Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity." As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.
Read more about Rajneesh Gupta

Right arrow

Glossary

This chapter features a glossary of some of the important topics related to the Wazuh platform and its peripheral technologies. This chapter serves as a comprehensive guide to learning fundamentals of Wazuh’s technical landscape. Whether you are an experienced security professional or a newcomer to the security landscape, this chapter will provide you with a useful summary of Wazuh’s capabilities and its related concepts.

The glossary is covered in alphabetical order.

A

B

  • Brute-force attack: Brute-force attacks are a type of hacking technique where passwords, login credentials, and encryption keys are cracked through a process of trial and error. It is a straightforward yet effective strategy for getting unauthorized access to user accounts, company networks, and systems. Until they discover the right login details, the hacker attempts a variety of usernames and passwords, frequently testing a large range of combinations on a machine. To learn more, check out the following links:

C

  • CDB lists: CDB (Contant Database) lists in Wazuh are text files that can hold user lists, file hashes, IP addresses, and domain names. You can also store other things in them, such as network ports. You can use CDB lists to make “white” or “black” lists of users, files, IP addresses, or domain names. By searching to see whether their signatures are in a CDB list, they can also be used to find malicious files. To learn more, visit the following websites:
  • ClamAV: ClamAV is an open source antivirus software that can find and get rid of malware, viruses, and other online activities that are harmful to your system and database. It’s compatible with Windows, Linux, and Mac devices. To learn more, visit the...

D

E

F

G

  • GDPR compliance: The General Data Protection Regulation (GDPR) is a digital privacy legislation about digital privacy that tells businesses how to gather, use, and keep personal data about people who live in the European Union (EU). This law also controls the sending of personal data outside of the EU. By granting users (often referred to as data subjects) authority over the collection, sharing, and use of their personal data, GDPR compliance enhances privacy rights. To learn more, check out the following links:
  • GitHub: GitHub uses Git, an open source version control software, to allow multiple people to make changes to web pages at the same time. This makes it possible for teams to collaborate in real time while creating and editing the content for their websites. To learn more, check out the following...

H

I

J

  • JSON (JavaScript Object Notation): JSON is a simple text-based format for sending and storing info. When data is sent from a computer to a web page, JSON is often used. It is a data serialization format that enables consistent data transmission between many platforms, applications, and systems. To learn more, check out the following link:

K

L

M

  • Malware IOC (Indicators of Compromise): This is forensic data that shows that an attack has been executed in an organization’s network or endpoint. IOCs can be IP addresses, domains, hashes of malware files, and so on. An IOC can also include metadata about a file, such as author, the date of creation, and the file version. To learn more, check out the following links:
  • MITRE ATT&CK: A MITRE ATT&CK (MITRE Adversarial Tactics, Techniques, and Common Knowledge) is a framework that assists organizations in determining their security readiness and locating vulnerabilities in their defenses. The MITRE ATT&CK framework offers an exhaustive taxonomy of adversary techniques and tactics and is characterized by its level of specificity. It is built on observations...

N

O

  • OpenSearch: OpenSearch is an open source search engine and analytics suite, used for log analytics, website information search, and real-time application monitoring. OpenSearch is a fork of Elasticsearch and Kibana, launched in 2021. It is licensed under the Apache 2.0 license and is Lucene-based. OpenSearch provides functionality for searching using keywords, multiple languages, natural language, and synonyms. To learn more, check out the following links:
  • OSSEC: OSSEC is an open-source host-based intrusion detection system (HIDS) that’s compatible with multiple operating systems. It is a scalable program that checks logs, makes sure files are correct, keeps an eye on the Windows system, enforces policies centrally, finds rootkits, sends real-time alerts, and many more. To learn more...

P

  • PCI DSS compliance: PCI DSS (Payment Card Industry Data Security Standard) compliance is a set of requirements that talks about how an organization should store, process, or transmit credit card information to achieve a secure environment. It’s an international security standard that helps prevent fraud and data breaches while providing consumers with a baseline degree of protection. PCI DSS compliance is not a one-time activity; it’s a continuous process that involves assessing infrastructure that handles cardholder data, analyzing the system vulnerabilities, and remediating the exploitable vulnerabilities to secure the network.
  • To learn more, check out the following links:
  • PowerShell: Built on.NET, PowerShell is a task...

R

S

  • SCA Policy: In the Wazuh platform version 3.9.0, the SCA module was added. It offers unique tests that are applied to hardened systems. All platforms supported by Wazuh (Linux, macOS, Windows, Solaris, AIX, and HP-UX) can run the module. The SCA tool gives you a way to read and run configuration checks that are written in the YAML format. Also, having policies set up front makes it easier to follow rules such as HIPAA or PCI DSS, as well as guidelines such as those provided by the CIS (Center for Internet Security). To learn more, check out the following link:
  • SSH (Secure Shell): The SSH protocol is a protocol for securely sending remote commands to a computer over an unsecured network. SSH encrypts and verifies device connections using cryptography. To learn more, check out the following link:

T

  • Threat intelligence: Threat intelligence is data that is gathered, processed, and studied to figure out why a threat actor does what they do, who they attack, and how they do it. Threat intelligence lets us make faster, smarter data-based security decisions. It also changes the way threat actors act, from being reactive to being proactive, in the fight against them. To learn more, check out the following links:
  • Trust Services Criteria (TSC) compliance: The Assurance Services Executive Committee (ASEC) of the AICPA developed the Trust Services Criteria (TSC), which are standards for evaluating control objectives. These standards include measures for the safety, availability, processing integrity, privacy, and confidentiality of all of an...

V

  • Vulnerability: An information system vulnerability is a weakness or an opportunity that hackers can take advantage of to get into a computer system without consent. Vulnerabilities make systems less strong and allow hackers to attack them. To learn more, check out the link below:
  • Vulnerability Detector module: The Wazuh Vulnerability Detector module helps users find weaknesses in an operating system and apps that are installed on the endpoints that are monitored. The module works by integrating Wazuh natively with external vulnerability feeds from Microsoft, Amazon Linux Advisories Security (ALAS), Canonical, Debian, Red Hat, Arch Linux, and the National Vulnerability Database (NVD). To learn more, check out the following link:
  • Windows Defender: Windows Defender is a built-in antivirus...

Y

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Security Monitoring with Wazuh
Published in: Apr 2024Publisher: PacktISBN-13: 9781837632152
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Author (1)

author image
Rajneesh Gupta

Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity." As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.
Read more about Rajneesh Gupta