Additional Info Flashcards
Port 20 and 21
FTP, File Transfer Protocol
22
ssh, secure shell
23
telnet
25
SMTP, Simple Mail Transport Protocol
53
DNS
69
TFTP, Trivial File Transfer Protocol
80
HTTP, HyperText Transfer Protocol
110
POP3
124
NTP, Network Time Protocol
143
IMAP, Internet Message Access Protocol (version 4)
161
SNMP, Simple Network Management Protocol
3389
RDP, Remote Desktop Protocol
RC-4, AES, 3DES are examples of what type of Cryptography? Symmetric or Asymmetric
Symmetric
RC-4 is a certain type of Symmetric Cryptography. What type?
Stream
What encryption algorithm is the default standard for most applications?
AES
The process of hashing a message, encrypting the hash with the senders private key, the receiver decrypting it with the sender’s public key and then hashing the message to make sure the hashes match is called what?
A digital signature.
Formula to determine the amount of keys needed for Asymmetric crypto
2N
Formula to determine the amount of keys needed for Symmetric crypto
(N*(N-1))/2
Six common Asymmetric algorithms that might be on the test. (Everything else is Symmetric)
DSA, RSA, ECC (Eliptical Curve) EL Gamal, Diffie Hellman, Knapsack
MD-5 Hashing Algorithm length
128 bit
SHA-1 Hashing Algorithm length
160 bit
SHA-256 Hashing Algorithm length
256 bit
A digital signature gives you integrity and authentication which equals non repudiation. What does it not give you?
Privacy of the message is not protected by a digital signature.
Digital Certs follow which standard
X.509 v.4 standard
Two ways to check and see if a certificate has been revoked
CRL or OCSP (Online Certificate Status Protocol)
government standard hash functions developed by the National Institute of Standards and Technology (NIST) and specif ed in an official governmentpublication—the Secure Hash Standard (SHS), also known as Federal Information Processing Standard (FIPS) 180
SHA-1 and SHA-2
Name the four variants of SHA-2
SHA-256, SHA-512, SHA-224, SHA-384
What part of IPSec provides integrity, authenticity and non repudiation
AH (Authentication Header) through the use of an ICV (Integrity Check Value)
What part of IPSec provides Confidentiality
ESP (Encapsulating Security Payload). If you need confidentiality then you must use ESP.
IPSec on it’s own does not provide security. It only provides encapsulation. What sub protocols of IPSec provide the security?
AH (Authentication Header), ESP (Encapsulating Security Payload) and IKE (Internet Key Exchange)
ISO 15408 uses protection profiles and security targets. It is also commonly called what?
Common Criteria
In the Block Cipher method called _______, the relationship between the plaintext and key are so complicated that the attacker can’t alter the plaintext in an attempt to determine the key used to encrypt the plaintext.
Confusion
This occurs when a change in the plain text results in multiple changes spread throughout the ciphertext.
Diffusion
MTBF
Mean Time Between Failure
MTTR
Mean Time To Recover
MTD
Max Tolerable Downtime
RPO
Recovery Point Objective - How current should data be
Least privilege is about rights and what you can do. Need to know is about data and knowledge.
Least privilege is you don’t get to change date and time on a system. Need to know is you don’t get to access finance data with finance info.
Likelihood that a threat will exploit a vulnerability
Risk
This has the potential to harm an asset
Threat
A weakness or lack of a safeguard
Vulnerability
An instance of a compromise
Exploit
In DBMS this refers to transactions being all or nothing.
Atomicity
In DBMS this property ensures that any transaction will bring the database from one valid state to another. Any data written to the database must be valid according to all defined rules, including but not limited to constraints, cascades, triggers, and any combination thereof.
Consistency
In DBMS this property ensures that the concurrent execution of transactions results in a system state that would be obtained if transactions were executed serially, i.e. one after the other. This is the main goal of concurrency control.
Isolation
Name the 3 main Risk Assessment methodologies.
OCTAVE, FRAP and NIST 800-30
Risk management Guide for Information Technology Systems
NIST 800-30
The four main concepts of the Risk Management Process
Risk Assessment, Risk Analysis, Risk Mitigation and Manage Risk
COBIT, COSO, ITIL and ISO 27000 Series are all examples of what?
Security Governance Frameworks
COBIT and COSO both focus on goals for security
If we see anything related to IT security goals then they are talking about COBIT or COSO
For ITIL need to remember ‘IT Service Management’
IT Service Management = ITIL
For OCTAVE remember Self directed risk evaluation
Self directed = OCTAVE
This security governance framework describes how Establishment Implementation, Control and improvement of the ISMS (information security management system)
ISO 27001
This security governance framework provides practical advice for how to implement security controls. It uses 10 domains to address ISMS.
ISO 27002
What is the purpose of Knowledge Transfer and/or User Training
To modify employee behavior. That is the ultimate goal. To raise security awareness could also be an option.
The safety and welfare of society and the common good, duty to our principles, and to each other, requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
ISC2 Code of Ethics Preamble
ISC2 Code of Ethics Canons
Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Act honorably, honestly, justly, responsibly, and legally.
Provide diligent and competent service to principles.
Advance and protect the profession.
What is the length of a copyright?
the lifetime of the author plus 70 years for individuals. 75 years from the start of copyright for corporations.
Patent are for inventors. What are the length of patents?
20 years from cradle to grave (idea starts the 20 year time)
What is the main international organization run by the UN that deals with Intellectual property
WIPO (World Intellectual Property Organization)
Which Export law restricts exporting cryptographic software?
WASSENAAR Agreement
What 3 entities does HIPAA apply to?
Health Insurers, Health Providers and Health care clearing houses (claim processing agencies)
This specific law requires financial agencies to better protect customer’s PII
GLBA (Gramm-Leach-Bliley)
Name the four phases of Business Continuity planning
Project scope and planning
Business impact assessment
continuity planning
Approval and implementation
The following activities happen during which phase of the BCP: obtain senior management’s support, secure funding and resource allocation and select members of the bcp team
Project scope and planning
Name the 5 types of tests that can be performed in BCP.
Checklist test, Structured Walk-Through Test, Simulation Test, Parallel Test, and Full-Interruption Test
What phase of the BCP do we indentify and prioritize all business functions based on criticality. During this phase we create quantitative and qualitative values to address the impact on the organization.
Business impact assessment or analysis
Recovery Point objective vs Recovery Time Objective
Recovery point refers to data; recover data to a certain point in time. Recovery time refers to recovering hardware or software; how long will it take to rebuild a server.
T or F? When a BCP plan is updated original copies are retrieved and destroyed
True
IP header protocol field 6
TCP
IP header protocol field 1
ICMP
IP header protocol field 17
UDP