2.1 - Enterprise Security Flashcards

1
Q

Define Configuration Management.

A

Configuration Management is the process of maintaining systems, such as computer hardware and software, in a desired state. This includes identifying and and documenting hardware and software settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define a Network Diagram.

A

A diagram of the physical wire and devices within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a Physical data center layout.

A

A diagram of the datacenter that gives the layout of the datacenter and can include physical rack locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a Device Diagram.

A

A diagram of the individual devices and individual cabling running to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Baseline Configuration.

A

A documented set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some examples of things that should have a standard naming convention within a network.

A

1) Devices
2) Networks (ports)
3) Domain names and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List some ways that data can be protected.

A

1) Encryption
2) Security Policies
3) Data permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define and explain Data Sovereignty.

A

Data that resides in a country is subject to the laws of that country (legal monitoring, court orders, etc.)

Laws may prohibit where data is stored. For example, data collected on EU citizens must be stored in the EU. GDPR (General Data Protection Regulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Data Masking.

A

Hiding some of the data (like hashing out most of a debit card on a receipt). It may only be hidden from view, but it may be still in storage.

Data masking can be done via substituting, shuffling, encrypting, masking out, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Data Encryption.

A

Encoding information into unreadable data. The original information is plaintext, and the encrypted form is ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Diffusion.

A

Changing one character of the input, and many characters change of the output.

If you change one character of plaintext, the whole ciphertext changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Data at-rest and how to protect it.

A

Data that is on a storage device.

The data can be encrypted or have permission assigned to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Data in-transit and how to protect it.

A

Data that is transmitted over the network.

Can protect it with transport encryption (TLS or IPSec) or Network-based protections (Firewall or IPS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Data in-use.

A

Data that is actively processing in memory (system RAM, CPU registers and cache). This data is always decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Tokenization.

A

Replacing sensitive data with a non-sensitive placeholder. The token and the data aren’t mathematically related.

This is common with credit card processing. It uses a temporary token during payment that isn’t useful if captured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Information Rights Management (IRM).

A

Controls how data is used. It restricts data access to unauthorized persons. Each user has their own set of rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Data Loss Prevention (DLP).

A

An approach to data security that implements a set of processes, procedures, and tools to prevent the loss, misuse, or accessed by unauthorized users.

18
Q

Define Endpoint DLP.

A

DLP that analyzes an attempts to prevent the loss of data stored on devices.

19
Q

Define Network DLP.

A

DLP that attempts to prevent the loss of data in motion.

20
Q

What does DLP protect if it is on a server?

A

Data at rest.

21
Q

What does DLP software do?

A

Classifies regulated, confidential, and business critical data and identifies violations of policies defined by organizations or within a predefined policy pack, typically drive by regulatory compliance such as HIPAA, PCI-DSS, or GDPR.

22
Q

Define Cloud-based DLP.

A

DLP that focuses on keeping communications between the end user and the cloud protected.

It might block custom defined data strings, manage access to URLs, or block viruses and malware.

23
Q

What are some ways that DLP might be used to protect email?

A

1) Check every email inbound and outbound
2) Inbound: Block keywords, identify imposters,
quarantine email messages
3) Outbound: Fake wire transfers, W-2 transmissions,
employee information

24
Q

How might security by affected by geographical changes?

A

1) There are legal implications
- Business regulations vary between states
- Passports for recovery sites out of the country
2) Offsite backup
- Organization-owned site or 3rd-party secure
facility
3) Offsite recovery
- Travel considerations for staff
- Hosted in site the scope of the disaster

25
Q

What documentation should an organization have in the event of an attack?

A

Incident response plan

  • Documentation
  • Identify and contain the attack
26
Q

What are the goals of response and recovery controls?

A

Limit the impact of the attacker in regards to data exfiltration and access to sensitive data.

27
Q

Define SSL/TLS Inspection.

A

A test that involves capturing TLS or SSL packets in order to ensure that the data is safe. Typically, this test is run between client and server.

28
Q

What is a Certificate authority in SSL/TLS, and what does it do?

A

An entity or organization that assigns certificates to web sites. The browser only trusts web sites with certificates.

It is up to the CA to verify the web site. The CA must sign the certificate for the encryption to work well.

29
Q

Define Hashing.

A

Representing data as a short string of text, a message digest. It is impossible to recover the original message from the hash. This is used to store passwords and confidential information. You will not get the same hash for the same text twice unless you have a hash collision (which is bad).

It is also used for digital signatures.

30
Q

Define API (Application Programming Interface).

A

An application that controls either software or hardware programmatically.

31
Q

What are some attacks that could affect an API?

A

1) On-path attack
- Intercept and modify API messages, replay API
commands
2) API Injection: inject data into an API message
3) DDoS: one bad API call can bring down a system

32
Q

List some ways that you can secure an API.

A

1) Authentication
- Limit API access to legitimate users, over secure
protocols
2) Authorization
- API should not allow extended access
- Each user has a limited role
- A read-only user should not be able to make
changes
3) WAF (Web Application Firewall)
- Apply rules to the API communication

33
Q

Define a Hot Site.

A

An exact replica of what is running in the production environment. Everything is already updated and ready to spill over. There is minimal downtime, but this is expensive.

34
Q

Define a Warm Site.

A

Between a hot and cold site. Hardware might already be ready, but the software and data will need to come over.

35
Q

Define a Cold Site.

A

There is no hardware in place. Data will have to be brought with you. Everything needs to be done, but this is the cheapest option.

36
Q

Define a Honeypot.

A

A system or a series of systems that is intended to attract attackers. This allows for recon into how an attacker might attack. There is a constant battle to trick the attacker into thinking that this is a real system.

37
Q

Define Honeynets.

A

A series of honeypots on a network.

38
Q

Define Honeyfiles.

A

Files that act as bait on a honeynet (ex. passwords.txt). An alert is sent if the file is accessed.

39
Q

Define Fake Telemetry.

A

The deliberate manipulation of telemetry data to mislead the AI system. If a machine that is being trained on how malware acts to stop malware based on actions, the attacker might send fake telemetry to make malicious malware look benign. Then, after the learning, they might send the malware.

40
Q

Define a DNS sinkhole.

A

A DNS that hands out incorrect IP addresses. An attacker can redirect users to malicious sites. It can, however, redirect known malicious domains to a benign IP address and watch for any users hitting that IP address.

This is often integrated into a firewall or an IPS.

Also known as a Blackhole DNS.

41
Q
A