2.1 Flashcards

1
Q

Configuration management

A

Document os, patches, app updates, network modifications, new app instances etc

Identify and document settings

Rebuild these in instances if disasters occur

Use diagrams for networks and even physical wires

Ip schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protecting data

A

So many locations so sec policies and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data sovereighty

A

Laws per country depending on where the data resides like the gdpr in eu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data masking

A

Or obfuscation that hides data info lime receipts showing ***

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Diffusion

A

Change one character of input and make characters change in encryption output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data at rest

A

On a file on storage device like ssd, flash drivez

Need whole disk encryption, data base encryption or file folder level encryption

Then apply permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data in transit or motion

A

Going between switches, routers and devices,

need firewall or IPS to protect

Transport level encryption with transport level security (TLS) or IPsec (internet sec protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data in use

A

In system ram, cpu registers and cache

Usually decrypted cause in use

Hackers can pick decrypted data from ram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tokenization

A

Replacing sensitive data with a non-sensitive placeholder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information rights management

A

Prevents certain function in doc like copy, paste, edit, screenshots etc and only allowing with permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data loss prevention

A

Examining all data in use, in motion and at rest

Can block access To certain hardware like usb storage

There are also cloud based dlp, that observes traffic and restricts based on rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Managing security

A

Geographical considerations such as legal concerns when needing to do things in another country like passports and third parties and backups

Response and recovery to know next steps and document all from beginning to end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ssl/tls inspection

A

Secure sockets layer, transport layer to block incoming or outgoing info

Uses trusted CAs certificate authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ssl/tls proxy

A

Firewall ssl decrypt and internal CA

User has internal CA certs

Hello gets sent to server, intercepted by firewall and sents as proxy
To server, server sends back to firewall, and firewall creates new internal CA with internal encryption internally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Api

A

Application programming interface needs control software and set it up securely because usually logins go through api

Hackers use on path attack to listen and learn the api and insert their own data using api injection

Can use web app firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Site resiliency

A

Always have back ups, synchronized, the ability to change locations if disaster occurs

Therefore need process and procedures to move back and forth.

There are hot sites (exactly the same), warm sites (mix of both, some equipment) and cold sites (room with racks but no equipment, data or apps)

17
Q

Honey pots

A

Attract bad guys and trap them there, a virtual world thats fake like a vm that trapped scammers

The more honeypots it becomes a honeynet

Inside are honey files that act as bait (passwords.txt) then we receive an alert

18
Q

Fake telemetry

A

Train data with machine learning, to show what bad data is what malware is so identification is easier. Fake telemetry can fake that the malware is good

19
Q

Dns sinkholes

A

Dns that hands out incorrect ip address
Best for intel gathering to configure a sinkhole for whoever tries to find a certain site and goes with IPS