4.1 Flashcards
BYOD
bring your own device
cost effective for employers
drawback is less security control
COPE
coporate owned personally enabled
high intial investment
employees may have privacy concerns
CYOD
employees select devices from a company approved list
Data remnants
residual data left behind after deletion or erasure processes. in the cloud it may not be completely removed
virtualization
emulates servers each with its own OS within a virtual machine
containerization
lightweight alternative encapsulting apps within their OS environment
Hype 1 hypervisor
bare metal
runs directly on hardware
Type 2 hypervisor
hosted
operates within a standard OS
VM Escape
attackers break out of isolated VMs to access hypervisor
Live VM migration
attacker captures unencryped data between servers
Resource reuse
improper clearing of resources may expose sensitive data to
FaaS
developers write and deploy individual functions triggered by events (serverles)
IoT
internet of things
network of physical devices with sensors software and connectivity
Hub/Control system
central component connecting IoT devices to
ICS
industrial control system
DCS
distributed control system
used in control production systems within a single location
PCL
programmabe logic controllers
used to control specific processes such as assembly lines and facotires
SCADA
supervisory control and data acquisition systems
type of ICS used for controlling geographically dispersed industrial processes
Risks and vu,nerabilities of ICS and SCADA
unauthroized access
malware attacks
lack of updates because of running outdated software
physical threats
Embedded systems
specialized computing components designed for dedicate functions within larger devices
they integrate hardware and mechanical elemants
RTOS
real time operatin system
critical for time sensitive apps like flight navigation and medical equipment
vulnerabilities in embedded systems
hardware failure (harsh environments)
software bugs
outdated systems
wrappers IPsec
protect data during transfer by hiding interception points
way to protect embedded systems
firmware code control
manage low level software to maintin system integrity
OTA
over the air updates for embedded systems installed remotely
bluetooth
wireless technology for short distance data exchange
bluetooth vulnerabilities
insecure pairing
spoofing
on path attacks
Bluetooth attacks
bluejacking
bluesnarfing
bluebugging
bluesmack
blueborne
Bluejacking
sending unsolicited messages to a bluetooth device
often use for pranks and testing vulnerabilities
Bluesnarfing
unauthorized access to a device to steal information like contacts, call logs, and text messages
Bluebugging
allows attackers to take full control of a device’s bluetooth functions
make calls, send messages, or access the internet
Bluesmack
denail of service
blueborne
spreads through the air to infect devices without user interaction
Sideloading
installing apps from unofficial sources by bypassing the device’s default app store
jailbreaking/rooting
gives users escalted privileges on their devices
insecure mobile connection methods
using open wifi networks or pairing to unknown devices
MDM
mobile device management
includes patching, configuration management and best practice enforcement
Zero day vulnerabilities
discovered and exploited before vendor issues a patch
zero day exploit
attacks that target previously unknown vulnerabilities
zero day
refer to the vulnerability expolit or malware that exploits the vulnerability
Secure Baseline
standard set of security configurations and controls applied to systems networks or apps to ensure minimum level fo security
Wireless infrastructure security
placement of wireless access points impacts network performance and security
WAP
wireless access point, allows wireless devices to connect to a wire network using wifi standards
ESS
extended service set
multiple waps working together to provide seamless network coverage
wireless access point interference
occurs when multiple WAPS use the same channels or overlapping frequencies
Types of wireless access point interference
co channel
adjacent channel
Site survey
essential for planning and designing wireless networks
involves a site visit to test for radio frequency intererence and identify optimal WAP installation locations
heat maps
graphical representations of wireless coverage, signal strength, frequency utilization,
WEP
wired equivalent privacy
outdated encryption protocol
WPA3
wifi protected access 3
the most secure
utilizes AES for encryption
feature are
SAE
Enhanced Open
Updated cryotographic protocols
management frame protection
SAE
simultaneous authentication of equals
replaces the 4 way handshake with a diffie hellman key
protects against offline dictionary attacks
Enhanced Open
aka opportunistic wireless encryption
provides individualized data encryption even in open networks
protects people in open wifi scenarios
Managment frame protection
ensures integrity of network management traffic
prevents eavesdropping, forging and tampering with management frames
AAA protocols
important for centralized user authentication and access control
Examples of AAA protocols
RADIUS
TACACS+
RADIUS
remote authentication dial in user service
offers authentication, authorization and accounting services
widely used for secure access to network resources
TACACS+
terminal access controller access control system plus
separates authentication, authorization and accounting functions
more granular control
Authentication protocols
used to verify user identity and controk network access
EAP
extensible authentication protocol
authentication frameowkr supporting multiple methods
PEAP
protected extensible authentication protocol
encapsulates EAP within an encrypted TLS tunnel
EAP-TTLS
extensible authentication protocol tunneled transport layer security
extends tls support accross platforms
EAP-FAST
T (Extensible Authentication Protocol-Flexible Authentication via Secure
Tunneling)
● Developed by Cisco Systems for secure re-authentication
Cookies
small data pieces stored by web browsers
Secure cookies
transmitted over https
SAST
Statis code analysis
reviewing and examining a source code before running the program
identifies issues like buffer overflows, sql injection and xss
DAST
dynamic code analysis
analyzed app while running
Fuzzing
inputs random data
to provoke crashes and exceptionsstr
stress testing
evaluates system stability under extreme conditions