3. Security Flashcards
OPSEC
Operations Security - Process you use to protect your information
Steps of OPSEC (5)
- Identification of critical info (identify the assets that would cause you the most harm if exposed)
- Analysis of threats (analyze any threats related to each critical info)
- Analysis of vulnerabilities (analyze the vulnerabilities int he protections you’ve put in place to secure your info assets. HOW YOU INTERACT W/ ASSETS)
- Assessment of risks (what issues you need to address in the rest of the ops sec process. RISK OCCURS WHEN YOU HAVE A MATCHING THREAT AND VULNERABILITY)
- Application of COUNTERMEASURES (when you construct countermeasures for a risk, you need to mitigate either the threat or the vulnerability at a min)
Laws of OPSEC - Kurt Haase (3)
- Know the threats “If you don’t know the threat, how do you know what to protect?”
- Know what to protect (determine critical info)
- Protect the information
Purple Dragon
Code study during the Vietnam War. Coined the term OPSEC
Competitive Intelligence
Conducting intelligence gathering and analysis to support business decisions
Competitive Counterintelligence
Managing info gathering activities directed at an organization
OpSEC Support Staff (IOSS)
Provide multiple agencies w/ a wide variety of security awareness and trainings
Social engineering attacks
manipulate people to gain info/access to facilities
HUMINT
Human Intelligence - gathered by talking to people, torture, tricking people w/ scams
OSINT
Open Source Intelligence - info collected from publicly available sources
Metadata
Data about data found in almost any file
Ex forensic tool: EnCase
EXIF data
Image/video file metadata
Shodan
Search engine of service banner which are metadata that the server sends back to the client.
Web based search engine that looks for info saved on internet connected devices.
FTP
File Transfer Protocol
GEOINT
Geospatial info from satellites
MASINT
Measurement and signature from sensors
RADINT
Radar info
TECHINT
Technical info about equipment, tech, and weapons
FININT
Financial info about financial dealings
CYBINT/DNINT
Cyber/Digital Network info from comp systems/networks
Pretexting
Social engineering attack that utilizes credible scenarios to lure people into disclosing sensitive info
Phishing
Social engineering technique that uses electronic communications to carry out an attack that is broad in nature
Tailgating
Following someone through an access control point
Malware
Application that makes unauthorized changes to a device
Clean desk policies
Sensitive info shouldn’t be left out/unattended
BCP - Business continuity planning
Plans put in place to ensure that critical business functions can continue in a state of emergency
DRP - Disaster recovery planning
Plans put in place to prepare for a potential disaster. What to do during and after.
Types of physical security controls (3)
Deterrent
Detective
Preventive
Magnetic Media
Use movement and magnetically sensitive material to record data
Ex: hard drives, tapes
Flash Media
Media that stores data on NONVOLATILE memory chips
Cheaper and faster
Optical Media
Ex: CD, DVDs
Fragile
RAID/RAID array
Redundant arrays of inexpensive disks - method of copying data to more than 1 storage device