1.0 General Security Concepts Flashcards

1
Q

What do technical controls entail?

A

File storage policies, Block instead of patch, backup recovery, system logs, splash screen (login page), firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do Managerial controls entail?

A

People policies like on-boarding, threat of demotion, Login reports, reporting issues, seperation of duties, compliance politices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do Operational controls entail?

A

Awareness programs for IT security, using people to set controls, guard shack, security policy training, require multiple security staff, contact authorities, property patrols, reception desk, guard shack

PEOPLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do Physical controls entail?

A

Locks, warning signs, Fire extinguishers, power generators authorized personel signs, badge readers

PHYSICAL THINGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the CIA traid?

A

Availability, Integrity, Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does non-repudiation mean?

A

Way to prove that the person who sent a piece of data says who they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is proof of integrity and how to validate this?

A

Prove that the data is the same from when its sent. No tampering involved.

  • Hashing algoirhtms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is proof of origin and how to validate this?

A

Proof that the person who sent it is actually them

  • Private public keys
  • Certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a CA? and what does it do?

A

CA is a certificate authority that give sout certificates. They do the signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is a CA verified?

A

By a root CA that allows these CAs to create tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Best model for allowing multiple people to access certain files/data?

A

Role based access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Gap Analysis?

A

Comparing where you are now to where you want to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two planes for zero trust?

A

Data Plane and Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does data plane differ from control plane?

A

Data plane is the one actually moving the data while the control plane focuses on rules/policies for how that data is transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two frameworks for gap analysis and what is the goal of frameworks here?

A

ISO/IEC 27001 and NIST special publication 800-171 revision

Goal is to establish a baseline of where your company is at for different levels of security, CIA traid etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does ISO/IEC 270001 and NIST differ?

A

ISO/IEC 270001 focuses on information security management systems while NIST special publication 800-171 revision focus on protecting controlled unclassified information in nonfederal systems and organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Honeypots, honeynets, honey files, honey tokens

A

Honeypots - Delicious files or data for attackers
Honeynets - Bunch of honeypots that look like an actual system or as real as we can get
Honeyfiles - files that contain fake information
Honeytokens - ways to track this piece of data if a hacker gets it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In change management such as patching or updating, what are some key ideas to think about before updating?

A

Only the owner can update and must make sure everything/everyone is on the same page and working
- Have a backout plan
- Maybe first test in a sandbox
- make sure a approval for all changes is given prior

18
Q

In technical change management, what are some key ideas here?

A

Allow and deny lists
- Downtime annoucement
- Restart annoucement
- Legacy Applications
- Dependices - what depends on what if you do update
- Documentation of policies

19
Q

What is symmetric encryption and what is it good for?

A

A single shared key, you decrypt and encrypt with it.

Good for small limited uses

20
Q

What is asymmetric encryption and what is it good for?

A

A public-private key system where the public key is seen by everyone while the private key is only available for one person.

Encrypt with public keys but only the private key can decrypt it

21
Q

Key escrow

A

Someone else holds your decryption keys, third trusted parties

22
Q

If you wanted to transport data through the internet safely, what would you use?

A

HTTPS, VPN

23
Q

What do client based VPNs use?

24
Q

What do site to site VPN use?

A

IPsec

a suite of protocols that provides security for IP network communications by authenticating and encrypting data packets, commonly used in VPNs to create secure, encrypted tunnels for data transmission.

25
Q

Which encryption algo is best, AES or DES?

A

AES

Because its more secure, more widly accepted in modern systems, and faster/stronger

26
Q

What is key stretching?

A

Hashing multiple times, hashing the hash

Makes it harader to brute force

27
Q

What are the two types of key exchange?

A

Out of band and in band key exchange

Basically in person or over the internet

28
Q

If we do in band what would we need to add to ensure safety?

A

Protect key with additional encyprtion like a short timed encrypt decrypt key pair

Temp public private key

29
Q

What is a symmetric key?

A

A symmetric key is a single key used for both encryption and decryption in cryptography. Both the sender and receiver must share this same secret key.

Example: AES (Advanced Encryption Standard) is a symmetric key algorithm.

30
Q

What are some encryption technologies in our computers?

A

Trusted Platform Module (TPM) and Hardware Security Module (HSM)

31
Q

What is the difference between TPM and HSM?

A

TPM (trusted platform module) is usually a little piece of hardware attached to your computer’s hardware that stores keys and protects the device incase stolen

HSM (Hardware security module) is used for more large scale cryptographic keys, has redundant power, keybackup and secure storage

32
Q

What is Obfuscation?

A

Opposite of abstraction, making things harder

33
Q

What is steganography?

A

Hide information in an image

34
Q

What is Data Obfuscation?

A

Making data harder to decypher
- Like adding ** to a credit card

35
Q

What are tokenization for security?

A

replace sensitive data with a token
- used in credit card transactions (tokens the transfer of that transaction then decyphers it once delivered)

36
Q

What is a Raindbow Table and how does it relate to salting?

A

Rainbow table is how to unhash all passwords, you salt each password hash so that the password is different compared to what is on the rainbow table

37
Q

What is the standard format for certs?

38
Q

What does a cert contain?

A

A lot of data about itself like signature algo used, the issuer, extensions and more

39
Q

What is a root of trust?

A

The piece of hardware/software that we can 100% trust on to be correct that then can allow other hardware/software to be trusted

40
Q

What are wildcard certs?

A

Certs that cover a wide range of domains

Usually shown by *.example.com

Will cover domains with example.com at the end

41
Q

What is key/cert revocation and why can it be a problem?

A

List of certs/keys that are no longer good
Can be a problem because the list/file that contains all of these revoked lists are HUGE

42
Q

How to get around the issue of huge revocation lists?

A

OCSP stapling

Basically, when you send a file/data you attach the OCSP staple that says “hey, this is already validated”

43
Q

What is created when you want to create a cert?

A

a CSR (certificate signing request)
The CA will sign and give it back