1. General Security Concepts Flashcards

1
Q

1.1 Control Categories

A

Technical: firewall, encryption, etc.
Operational: backup and recovery plans, change management
Managerial: Policies, training and awareness, IRP
Physical: locks, guards, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.1 Control Types

A

Preventative: firewalls, encryption
Deterrent: training, warning signs
Detective: IDS, logs
Corrective: backup and recovery, IRP
Compensating: new, stronger methods such as MFA
Directive: Security policies, SOPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.1 Operational vs. Managerial control categories

A

managerial is policies and training, operational is changes in daily operating procedures such as recovery plans, audits, and change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.2 AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.2 Gap analysis

A

evaluate current posture against standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.2 Gap analysis steps

A
  1. establish a baseline
  2. identify gaps
  3. analyze cause
  4. develop an action plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.2 Zero-trust control plane vs data plane

A

Control plane are policies and configurations such as RBAC, reducing threat scope, and adaptive identity of users

Data plane: technologies such as firewall and network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.2 PEP vs. PDP

A

PEP is the gatekeeper (inline network) and communicates with PDP

PDP is made up of the Policy Administrator and Policy Engine, not inline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.2 Physical security sensors

A

infrared, pressure, microwave, ultrasonic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.2 Deception and disruption technology

A

Honeypot, Honeynet, Honeyfile, Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.3 what is ownership in change management?

A

refers to who delegates responsibilities for change, not necessarily who does the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.3 Technical implications of change management

A

Restricted activities such as configuration settings, downtime, service restarts, legacy applications, dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.4 CA vs RA

A

RA is an intermediary between users and CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.4 OCSP (relates to certificates)

A

Online Certificate Status Protocol, internet protocol to determine cert revocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1.4 Self-signed certificate

A

Can still verify the source because of the key pair usage, but the source is not necessarily trusted by the CA. Used in internal networks for development and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1.4 CSR

A

Certificate Signing Request, block of code to request cert from CA

17
Q

1.4 CRL

A

Certificate Revocation List

18
Q

1.4 Key Escrow

A

keys stored with a third party

19
Q

1.4 AES key length

A

128, 192, 256

20
Q

1.4 RSA key length

A

2048, 4096

21
Q

1.4 TPM

A

Trusted Platform Module, security chip that provides tamper resistance for cryptographic activity

22
Q

1.4 Secure Enclave

A

Area within CPU that is an isolated environment. runs things like Face ID.

23
Q

1.4 HSM

A

Hardware Security Module, dedicated hardware device for managing digital keys

24
Q

1.4 KMS

A

Key Management System, framework for managing key lifecycle

25
Q

1.4 Data Masking

A

Obscures data by altering values, static (copy of data) and dynamic (altered as it is accessed in real time)

26
Q

1.4 Tokenization

A

replaces sensitive data with non-sensitive, like card number tokens

27
Q

1.4 Key Stretching

A

running data through an algorithm multiple times

28
Q

1.4 How are digital signatures produced?

A

a hash is created and then encrypted with private key. People use public key to decrypt, and then hash their message to compare to the original hash.

29
Q

1.4 Blockchain

A

A digital ledger or record of transactions. It is immutable. Used for things like cryptocurrency

30
Q

1.4 ECB

A

Electronic Code Block, one of the AES encryption modes.

Plaintext is divided into blocks of fixed sizes and encrypts each block using the same key.

31
Q

1.4 CBC

A

Cipher Block Chaining, one of the AES encryption modes

A block is salted with random characters from the previous block’s ciphertext. Identical plaintext block won’t produce identical ciphertext blocks.

32
Q

1.4 CFB

A

Cipher FeedBack, one of the AES encryption modes

A block cipher is turned into a stream cipher by encrypting individual characters instead of blocks. Previous ciphertext characters are used to produce the encryption.

33
Q

1.4 OFB

A

Output Feedback, one of the AES encryption modes.

Stream cipher, encrypts a previous ciphertext segment and XORs it with the plain text to produce the cipher.

34
Q

1.4 CTR

A

Counter Mode, one of the AES encryption modes

transforms block cipher into a stream cipher, encrypts a counter value concatenated with a nonce, and then combines with plaintext to produce ciphertext