701 Flashcards
Secuirty
Term
Definition
Domain 1: General Security Concepts
Security Controls
Technical: Security controls implemented through technology (e.g.
firewalls
Physical: Physical barriers and controls to protect resources (e.g.
locks
Deterrent: Controls that discourage violations (e.g.
warning signs).
Compensating: Alternative controls that compensate for weaknesses (e.g.
increased monitoring).
CIA Triad:
Confidentiality: Ensuring that information is accessible only to those authorized.
Availability: Ensuring that information is accessible when needed.
Non-repudiation: Ensuring that a party cannot deny the authenticity of their signature or actions.
Authentication: Verifying the identity of a user or system.
Authorization: Granting permissions to authenticated users or systems.
Authenticating people/systems: Methods used to verify identities (e.g.
passwords
Control Plane: Manages the flow of data to enforce policies.
Data Plane: Carries the actual data or application traffic.
Bollards: Physical barriers to prevent vehicle access.
Access control vestibule: Small
Video surveillance: Monitoring using cameras.
Security guard: Human security personnel.
Lighting: Use of light to deter or detect unauthorized access.
Sensors: Devices to detect movement
Honeypot: Decoy systems to attract attackers.
Honeynet: Network of honeypots.
Honeytoken: Decoy data used to detect unauthorized access.
Cryptographic Solutions
Public key: Key used to encrypt data
known to everyone.
Encryption: Converting data into a coded form.
Full-disk: Encrypting all data on a disk.
File: Encrypting individual files.
Volume: Encrypting a specific volume.
Record: Encrypting individual records.
Transport/communication: Encrypting data in transit.
Symmetric: Encryption using a single key for both encryption and decryption.
Key exchange: Method of securely exchanging encryption keys.
Key length: Length of the encryption key.
Tools:
HSM (Hardware Security Module): Device for managing cryptographic keys.
Key management system: Software for managing encryption keys.
Obfuscation:
Steganography: Hiding data within other data.
Data masking: Obscuring data to protect sensitive information.
Hashing: Converting data into a fixed-size string of characters.
Digital Signatures: Cryptographic signatures to verify authenticity.
Key Stretching: Techniques to strengthen keys.
Certificates: Digital certificates used for authentication.
Certificate authorities: Entities that issue certificates.
OCSP (Online Certificate Status Protocol): Protocol for checking certificate status.
Self-signed: Certificates signed by the entity itself.
Root of trust: Base level of trust in a security model.
CSR (Certificate Signing Request): Request for a digital certificate.
Change Management
Business Processes:
Ownership: Responsibility for changes.
Stakeholders: Parties affected by changes.
Test results: Outcomes of testing changes.
Backout plan: Plan for reverting changes if needed.
SOP (Standard Operating Procedure): Established procedures for tasks.
Technical Implications:
Restricted activities: Actions that are limited.
Downtime: Period when systems are unavailable.
Application restart: Restarting applications.
Legacy applications: Older software systems.
Documentation:
Updating diagrams: Keeping architectural diagrams current.
Version Control: Managing changes to documents or code.
Domain 2: Threats
Threat Actors:
Nation-state: Government-sponsored attackers.
Hacktivist: Activists using hacking.
Insider threat: Internal personnel posing a threat.
Shadow IT: Unapproved IT systems or devices.
Attributes:
Resources/funding: Financial and material support.
Level of sophistication/capability: Skills and techniques.
Data exfiltration: Stealing data.
Espionage: Spying activities.
Blackmail: Forcing action through threats.
Financial gain: Monetary benefits.
Ethical: Driven by moral principles.
Revenge: Retaliation motives.
War: Conflict motives.
Threat Vectors and Attack Surfaces
Image-based: Attacks hidden in images.
File-based: Attacks in files.
Removable device: Attacks via USB drives.
Vulnerable software (Client-based vs. agentless): Exploiting software weaknesses.
Unsecure networks (Wireless
Wired
Supply chain (MSPs
Vendors
Application:
Memory injection: Injecting malicious code into memory.
Race conditions (TOC/TOU): Exploiting timing issues.
Malicious update: Compromised software updates.
Web-based:
SQLi (SQL Injection): Injecting SQL commands.
Hardware:
Firmware: Vulnerabilities
Hardware:
Firmware: Vulnerabilities in the firmware of devices.
Network:
DNS poisoning: Corrupting DNS cache to redirect traffic.
DDoS (Distributed Denial of Service): Overloading a service with excessive traffic.
Cloud: