1.2 Summarize fundamental security concepts. Flashcards

1
Q

The CIA Triad

A

Combination of principles
– The fundamentals of security
– Sometimes referenced as the AIC Triad
* Confidentiality
– Prevent disclosure of information to
unauthorized individuals or systems
* Integrity
– Messages can’t be modified without detection
* Availability
– Systems and networks must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Certain information should only be known
to certain people
– Prevent unauthorized information disclosure
* Encryption
– Encode messages so only certain people
can read it
* Access controls
– Selectively restrict access to a resource
* Two-factor authentication
– Additional confirmation before information
is disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Data is stored and transferred as intended
– Any modification to the data would be identified
* Hashing
– Map data of an arbitrary length to data of a fixed length
* Digital signatures
– Mathematical scheme to verify the integrity of data
* Certificates
– Combine with a digital signature to verify an individual
* Non-repudiation
– Provides proof of integrity, can be asserted to be genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Availability
* Information is accessible to authorized users
– Always at your fingertips
* Redundancy
– Build services that will always be available
* Fault tolerance
– System will continue to run, even when a failure occurs
* Patching
– Stability
– Close security holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Non-repudiation

A

You can’t deny what you’ve said
– There’s no taking it back
* Sign a contract
– Your signature adds non-repudiation
– You really did sign the contract
– Others can see your signature
* Adds a different perspective for cryptography
– Proof of integrity
– Proof of origin, with high assurance of authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Proof of integrity

A

Verify data does not change
– The data remains accurate and consistent
* In cryptography, we use a hash
– Represent data as a short string of text
– A message digest, a fingerprint
* If the data changes, the hash changes
– If the person changes, you get a different fingerprint
* Doesn’t necessarily associate data with an individual
– Only tells you if the data has changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing the encyclopedia

A

Gutenberg Encyclopedia, Vol 1,
by Project Gutenberg (8.1 megabytes)
* Change one character somewhere in the file
– The hash changes
* If the hash is different, something has changed
– The data integrity has been compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Proof of origin

A

Prove the message was not changed
– Integrity
* Prove the source of the message
– Authentication
* Make sure the signature isn’t fake
– Non-repudiation
* Sign with the private key
– The message doesn’t need to be encrypted
– Nobody else can sign this (obviously)
* Verify with the public key
– Any change to the message will invalidate the signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA framework

A

Identification
– This is who you claim to be
– Usually your username
* Authentication
– Prove you are who you say you are
– Password and other authentication factors
* Authorization
– Based on your identification and authentication,
what access do you have?
* Accounting
– Resources used: Login time, data sent and
received, logout time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authenticating systems

A

You have to manage many devices
– Often devices that you’ll never physically see
* A system can’t type a password
– And you may not want to store one
* How can you truly authenticate a device?
– Put a digitally signed certificate on the device
* Other business processes rely on the certificate
– Access to the VPN from authorized devices
– Management software can validate the end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificate authentication

A

An organization has a trusted Certificate Authority (CA)
– Most organizations maintain their own CAs
* The organization creates a certificate for a device
– And digitally signs the certificate with the organization’s CA
* The certificate can now be included on a device as an
authentication factor
– The CA’s digital signature is used to validate the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorization models

A

The user or device has now authenticated
– To what do they now have access?
– Time to apply an authorization model
* Users and services -> data and applications
– Associating individual users to access rights
does not scale
* Put an authorization model in the middle
– Define by Roles, Organizations, Attributes, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

No authorization model

A

A simple relationship
– User -> Resource
* Some issues with this method
– Difficult to understand why an authorization may exist
– Does not scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using an authorization model

A

Add an abstraction
– Reduce complexity
– Create a clear relationship between the user
and the resource
* Administration is streamlined
– Easy to understand the authorizations
– Support any number of users or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gap Analysis

A

Where you are compared with where you want to be
– The “gap” between the two
* This may require extensive research
– There’s a lot to consider
* This can take weeks or months
– An extensive study with numerous participants
– Get ready for emails, data gathering, and technical
research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Choosing the framework

A

Work towards a known baseline
– This may be an internal set of goals
– Some organizations should use formal standards
* Determine the end goal
– NIST Special Publication 800-171 Revision 2,
– Protecting Controlled Unclassified Information in
– Nonfederal Systems and Organizations
* ISO/IEC 27001
– Information security management systems

17
Q

Evaluate people and processes

A

Get a baseline of employees
– Formal experience
– Current training
– Knowledge of security policies and procedures
* Examine the current processes
– Research existing IT systems
– Evaluate existing security policies

18
Q

Compare and contrast

A

The comparison
– Evaluate existing systems
* Identify weaknesses
– Along with the most effective processes
* A detailed analysis
– Examine broad security categories
– Break those into smaller segments

19
Q

The analysis and report

A

The final comparison
– Detailed baseline objectives
– A clear view of the current state
* Need a path to get from the current security to the goal
– This will almost certainly include time, money, and lots
of change control
* Time to create the gap analysis report
– A formal description of the current state
– Recommendations for meeting the baseline

20
Q

Zero trust

A

Many networks are relatively open on the inside
– Once you’re through the firewall, there are few
security controls
* Zero trust is a holistic approach to network security
– Covers every device, every process, every person
* Everything must be verified
– Nothing is inherently trusted
– Multi-factor authentication, encryption, system
permissions, additional firewalls, monitoring and
analytics, etc

21
Q

Planes of operation

A

Split the network into functional planes
– Applies to both physical, virtual, and cloud
components
* Data plane
– Process the frames, packets, and network data
– Processing, forwarding, trunking, encrypting, NAT
* Control plane
– Manages the actions of the data plane
– Define policies and rules
– Determines how packets should be forwarded
– Routing tables, session tables, NAT tables

22
Q

Controlling trust

A

Adaptive identity
– Consider the source and the requested resources
– Multiple risk indicators - relationship to the
organization, physical location, type of connection, IP

23
Q

Policy enforcement point

A

Subjects and systems
– End users, applications, non-human entities
* Policy enforcement point (PEP)
– The gatekeeper
* Allow, monitor, and terminate connections
– Can consist of multiple components working together

24
Q

Applying trust in the planes

A

Policy Decision Point
– There’s a process for making an authentication decision
* Policy Engine
– Evaluates each access decision based on policy and other
information sources
– Grant, deny, or revoke
* Policy Administrator
– Communicates with the Policy Enforcement Point
– Generates access tokens or credentials
– Tells the PEP to allow or disallow access address, etc.
– Make the authentication stronger, if needed
* Threat scope reduction
– Decrease the number of possible entry points
* Policy-driven access control
– Combine the adaptive identity with a predefined set of rules

25
Security zones
Security is more than a one-to-one relationship – Broad categorizations provide a security-related foundation * Where are you coming from and where are you going – Trusted, untrusted – Internal network, external network – VPN 1, VPN 5, VPN 11 – Marketing, IT, Accounting, Human Resources * Using the zones may be enough by itself to deny access – For example, Untrusted to Trusted zone traffic * Some zones are implicitly trusted – For example, Trusted to Internal zone traffic
26
Barricades / bollards
Prevent access - There are limits to the prevention * Channel people through a specific access point – Allow people, prevent cars and trucks * Identify safety concerns - And prevent injuries * Can be used to an extreme – Concrete barriers / bollards, moats
27
Access control vestibules
All doors normally unlocked – Opening one door causes others to lock * All doors normally locked – Unlocking one door prevents others from being unlocked * One door open / other locked – When one is open, the other cannot be unlocked * One at a time, controlled groups – Managed control through an area
28
Fencing
Build a perimeter - Usually very obvious – May not be what you’re looking for * Transparent/opaque - See through the fence (or not) * Robust - Difficult to cut the fence * Prevent climbing - Razor wire - Build it high
29
Video surveillance
CCTV (Closed circuit television) – Can replace physical guards * Camera features are important – Motion recognition can alarm and alert – Object detection can identify a license plate or face * Often many different cameras – Networked together and recorded over time
30
Guards and access badges
Security guard – Physical protection at the reception area of a facility – Validates identification of existing employees * Two-person integrity/control – Minimize exposure to an attack – No single person has access to a physical asset * Access badge – Picture, name, other details – Must be worn at all times - Electronically logged
31
Lighting
More light means more security – Attackers avoid the light - Easier to see when lit – Non IR cameras can see better * Specialized design – Consider overall light levels – Lighting angles may be important – Important for facial recognition – Avoid shadows and glare
32
Sensors
Infrared – Detects infrared radiation in both light and dark – Common in motion detectors * Pressure – Detects a change in force - Floor and window sensors * Microwave – Detects movement across large areas * Ultrasonic – Send ultrasonic signals, receive reflected sound waves – Detect motion, collision detection, etc.
33
Honeypots
Attract the bad guys - And trap them there * The “attacker” is probably a machine – Makes for interesting recon * Honeypots - Create a virtual world to explore * Many different options – Most are open source and available to download * Constant battle to discern the real from the fake
34
Honeynets
A real network includes more than a single device – Servers, workstations, routers, switches, firewalls * Honeynets – Build a larger deception network with one or more honeypots * More than one source of information
35
Honeyfiles
Attract the attackers with more honey – Create files with fake information – Something bright and shiny * Honeyfiles – Bait for the honeynet (passwords.txt) – Add many honeyfiles to file shares * An alert is sent if the file is accessed – A virtual bear trap
36
Honeytokens
Track the malicious actors – Add some traceable data to the honeynet – If the data is stolen, you’ll know where it came from * API credentials – Does not actually provide access – Notifications are sent when used * Fake email addresses – Add it to a contact list – Monitor the Internet to see who posts it * Many other honeytoken examples – Database records, browser cookies, web page pixels