5 Security Operations Flashcards

1
Q

an encryption algorithm is a

A

complex mathematical formula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an encryption key is the

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The decryption algorithm and decryption key

A

reverse the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protecting data at rest (stored) - 3 main areas

A

1 file encryption
2 disk encryption
3 device encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protecting data in transit (moving over a network) - 4 main areas

A

1 HTTPS
2 email
3 mobile applications
4 VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 main categories of encryption algorithms

A

symmetric and asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric Encryption uses

A
  • AES (Advanced Encryption Standard) algorithm
  • encrypt and decrypt with the same (shared) key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Encryption uses

A
  • RSA (Rivest-Shamir-Adleman) algorithm
  • asymmetric algorithms use different keys for encryption and decryption (must be from the same pair)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hash Functions (Message Digests) are

A
  • one-way functions that transform a variable-length input into a unique, fixed-length output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Common Hash Functions (6)

A

1 MD5 (Message Digest 5)
2 SHA 1 (Secure Hash Algorithm)
3 SHA 2
4 SHA 3
5 RIPEMD (Race Integrity Primitives Evaluation Message Digest)
6 HMAC (Hash-based Message Authentication Code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SHA 1

A
  • 160-bit hash value
  • no longer secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SHA 2

A
  • produce different lengths (including 224, 256, 384, and 512 bit)
  • some vulnerabilities but still widely used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SHA 3

A
  • uses Keccak algorithm to produce a hash of any desired length
  • length is set by the person computing the hash, so is still fixed length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RIPEMD

A
  • alternative to SHA (due to trust issues with the US gov - SHA)
  • 4 variants - 128 (no longer secure), 160 (widely used - bit coin transactions), 256, and 320 bit)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HMAC

A
  • combines symmetric cryptography with hashes to provide authentication and integrity for messages (protects against packet loss/tampering)
  • sender uses a secret key (shared) a hash function (agreed upon)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Lifecycle (6)

A

1 Create
2 Store
3 Use
4 Share
5 Archive
6 Destroy

17
Q

Data Sanitization Techniques (3)

A

1 Clearing (overwrite)
2 Purging (cryptographic functions,
degaussing)
3 Destroying

18
Q
A
19
Q

Military data classifications (4)

A

1 top secret
2 secret
3 confidential
4 unclassified

20
Q

Business data classifications (4)

A

1 highly sensitive
2 sensitive
3 internal
4 public

21
Q

3 different types of information classification by external groups

A

1 PII
- information traceable to a specific person
2 PHI (HIPAA)
- medical records
3 PCI (Payment Card Information)
- numbers

22
Q

Logs (3 objectives from analyzing them)

A

1 Accountability (identity attribution)
- who caused the event?
- specific person, IP address, geographic area, etc

2 Traceability
- can help uncover all related events (path through distributed systems)

3 Auditability
- provide clear documentation of the event

23
Q

SIEM (Security Information and Event Management) - 2 major functions

A

1 central, secure collection point for logs
2 apply AI to correlate all the log entries
- detect patterns of potential malicious activity

24
Q

Social Engineering 6 approaches

A

1 Authority
2 Intimidation
3 Consensus/Social Proof
4 Scarcity
5 Urgency
6 Familiarity

25
Q

Phishing

A
  • purpose is to elicit sensitive info
  • often used in the reconnaissance phase of a larger attack
  • credential harvesting/re-use (tricked into providing username and password at low-risk site - people often use the same credentials across many sites)
26
Q

Spear Phishing

A
  • targeted small audience
  • uses common lingo
  • invoice scams
27
Q

Whaling/Whale Phishing

A
  • targets senior leadership
  • sending fake court documents (subpoena threatening lawsuit)
28
Q

Pharming

A
  • begin with phishing and direct to a fake website
  • may use typo squatting to make the URL seem very similar
    Variation: DNS poisoning - redirects to the fake site without the phishing
29
Q

Vishing

A
  • voice phishing
  • might pose as the help desk asking for credentials
30
Q

Smishing

A
  • SMS
  • often use spoofing
31
Q

Security and Awareness Training
2 important components

A

1Security Training
- imparts detailed knowledge
2 Security Awareness
- reminds employees about their learning

32
Q

Security Training Methods (4)

A

1 instruction in on-site classes
2 integration with existing programs (orientation, etc)
3 education through online computer-based training providers
4 participation in vendor-provided classroom training

33
Q
A