2.3 Troubleshoot common security issues Flashcards

1
Q

Unencrypted credentials/cleartext

A
  • Ensure you are using secure protocols like Secure Shell (SSH)
  • Ensure that you are using SSL/TLS to secure communications with any compatible protocol (HTTP, email, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Logs and event anomalies

A

Automated alerts (via email, etc.) allow admins to identify and troubleshoot these issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Permission issues

A

Solution: A system of permission auditing that regularly reviews privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access violations

A

Logging intrusions or attempted intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certificate issues

A

The most common certificate issue is the client rejecting a server certificate.

  • Existing certificate: check the expiration date.
  • New certificate: check key usage settings. Or verify clients have correct chain of trust, they need root and intermediate CA certificates before a leaf certificate can be trusted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Misconfigured Firewall

A

This will become apparent due to users reporting failure in data traffic.
Troubleshoot:
- Try connecting from both sides of the firewall. If it connects from outside but not inside the firewall, this confirms the issue is the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Misconfigured Access points

A

Troubleshoot:

  • Ensure that wireless AP’s are implementing WPA/WPA2 with strong passphrase or enterprise authentication.
  • Ensure clients have correct passphrase or that AP’s communicate with RADIUS servers.
  • Ensure no other wireless signals are interfering with the AP’s transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Weak security configurations

A

When installing/configuring a device or software, you must use a security policy to determine the strongest possible configuration, not just leave it default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Personnel - Policy violation

A
  • Determine the policy that was violated
  • Bring it to the person’s attention
  • Suggest ways for the person to comply better in the future
  • To prevent reoccurrence, develop a training program.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Personnel - Insider threat

A
  • Conduct an exit interview and thoroughly offboard the terminated employee.
  • Employ personnel management tasks like mandatory vacation and job rotation to reduce the amount of power any one employee holds.
  • Regularly review and audit privileged users’ activities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personnel - Social engineering

A
  • Train users on how to spot social engineering attempts and mitigate their efforts.
  • Uphold the principle of least privilege to minimize the effects of a successful social engineering attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Personnel - Social media and personal email

A
  • Remind employee of the policy and how divulging too much information on social media can help attackers.
  • Technical control: implement data loss/leak prevention (DLP) solutions to prevent personnel from sending sensitive info to external user or websites.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unauthorized software

A

2 types of execution control:

  • Whitelist: nothing can run if it is not on the approved whitelist
  • Blacklist: anything not on the prohibited blacklist can run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Baseline deviation

A

Testing the actual configuration of clients and servers to ensure that they are patched and that their configuration settings match the baseline template.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

License compliance violation (availability and integrity)

A

Availability: the software vendor may suspend all licenses if the customer is found to be non-compliant.
Integrity: Unlicensed software exposes an organization to large fines and penalties.

Troubleshoot:

  • Identify unlicensed and unauthorized software. Audit devices
  • Don’t over-allocate seats compared to what their license agreement allows.
  • Prepare for vendor audits.
  • Ensure compliance with open source licensing terms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asset management

A
  • Ensure relevant assets are participating in a tracking system like barcodes or radio frequency IDs (RFIDs)
  • Tag newly acquired assets
  • Remove obsolete assets from system
  • Check assets for conflicting IDs
  • Check assets for inaccurate metadata
  • Update asset management software to fix any bugs or security issues
17
Q

Data exfiltration

A
Definition: unauthorized copying or retrieval of data from a system.
Troubleshoot:
- Encrypt data
- Create offsite backups
- Ensure access controls are implemented
- Restrict types of network channels