All Flashcards
What is TOTP?
Time Based One Time Password Algorithm
What is WPA2 and what does it use?
WiFi Protected Access 2. Uses CCMP.
What is CCMP and what does it use?
Counter Mode Cipher Block Chaining Message Authentication Code Protocol. Uses AES and MIC with CBC-MAC. Used in WPA2.
What is AES?
Advanced Encryption Standard.
What is WPS and why is it bad?
WiFi Protected Setup. It uses a PIN which makes brute force easy. It was designed for easy device connections.
MAC (address)
Media Access Control
MAC (with respect to authentication)
Message Authentication Code
What is MAC (with respect to access) and what does it do?
Mandatory Access Control. The OS controls who gets access based on security levels, GPO, etc.
What is DAC and what does it do?
Discretionary Access Control. The owner controls who has access.
What is ABAC and what does it do?
Attribute Based Access Control. Control is based on user attributes.
What is MIC?
Message Integrity Check.
What is CBC and describe it?
Cipher Block Chaining. Easy to implement. Each plaintext block is XORed with the previous ciphertext block.
What is PSK?
Pre-shared key.
What is typosquatting?
Changing the URL to a similar (but wrong) one.
What is prepending?
Adding an extra letter to the beginning of a URL to send you somewhere else.
What is pretexting?
Making up a situation to get information.
What is pharming?
Redirect a real website to a bogus site.
What is Vishing?
Voice phishing.
What is Smishing?
SMS phishing.
What is WAF?
Web Application Firewall.
What is a rainbow table?
Optimized prebuilt set of hashes.
What is disassociation?
Disassociate a device from WiFi.
What is DNS poisoning?
Modify the DNS server to direct web traffic, often done by modifying the host file which takes precedence over DNS queries.
What is reconstitution?
A plan to fix everything starting with the most important stuff. Can take many months.
What are precursors?
Early warning signs.
What is DLP?
Data Loss Prevention.
What is SIEM?
Security Information and Event Management.
What is IPS?
Intrusion Protection System.
What is IDS?
Intrusion Detection System.
What is CASB?
Cloud Access Security Broker.
What is Data Masking?
Data obfuscation, hiding some of the original data.
What is a DNS Sinkhole?
A DNS that hands out incorrect IP addresses.
What is COPE?
Corporate Owned Personally Enabled (device).
What is a blockchain?
Distributed ledger, everyone maintains the ledger.
What is Transference?
Risk management strategy, buy some insurance.
What is TTL and what is it?
Time to live. The amount of time or hops that a packet is set to exist inside a network before being discarded by the router.
What is key escrow?
Someone else holds the decryption keys.
What is 802.1X?
IEEE standard for port based nac (PNAC).
What is IEEE?
Institute of Electrical and Electronic Engineers.
What is TACACS+.
Terminal Access Controller Access Control System.
What is LDAP and LDAPS, what ports and protocols does each use, including the security protocol for LDAPS?
Lightweight Directory Access Protocol and Lightweight Directory Access Protocol Secure. LDAP uses TCP port 389 and LDAPS uses TCP port 636. LDAPS uses SSL for encryption.
Low Down All Pine on port 389. Lax Digs And Proper Six on ya port 636.
What is Kerberos?
Network authentication protocol. Authenticate once.
What is IPsec and what does it do?
Internet Protocol Security. It is a group of protocols for securing connections between devices. IPsec helps keep data sent over public networks in a secure manner. It is often used to set up VPNs and it works by encrypting IP packets along with authenticating the source where the packets came from.
What is SSL, what does it do, and what port does it use?
Secure Sockets Layer. A standard for securing an internet connection by encrypting data sent between a website and browser. Uses TCP port 443.
What is TLS and what port does it use?
An updated and more secure version of SSL. Still commonly referred to as SSL. Uses TCP port 443.
What is HTTPS, what does it do, and what port does it use?
Hypertext Transfer Protocol Secure. The secure version of HTTP. Uses TLS, formerly known as SSL. Uses two keys, a public and private key. The private key is controlled by the owner of a website and is kept private, and lives on a web server and is used to decrypt the information of the public key. The public key is available to everyone who wants to interact with the server in a secure way. Information that’s encrypted by the public key can only be decrypted by the private key. Uses TCP port 443.
What is a stateful firewall?
A firewall that remembers the state of the session, and everything within a valid flow is allowed.
What is a Faraday cage?
A cage that blocks EMF. It is a mesh of conductive material that cancels the EMF effect on the interior, similar to how a microwave door blocks microwaves.
What is MSP?
Managed Service Provider. Can also be a cloud service provider, but not all cloud service providers are MSPs.
What is CMS?
Content Management System. Secure the access to data and protect it from outsiders.
What is MCM?
Mobile Content Management.
What is HSM?
Hardware Security Module. Common with MicroSD cards.
What is TPM?
Trusted Platform Module. A specification for cryptographic functions. Comes with unique keys burned in. Persistent memory for burned in keys. Versatile memory for storage keys and hardware information. Password protected. Cryptographic processor, random number generator.
What is UEFI?
Unified Extensible Firmware Interface.
What is XSS and the two types?
Cross-site Scripting. An exploitation in which information with one site is shared with another. Can be persistent (think sharing malicious social media link, everyone gets the payload) or non-persistent (aka reflected) (think using a search box to run a script).
What is ARO?
Annualized Rate of Occurrence. How likely is a risk to happen in a year?
What is SLE?
Single Loss Expectancy. How much monetary loss from a single event. I.e. how much money is lost from a single laptop theft?
What is ALE?
Annualized Loss Expectancy. ARO x SLE. How much expected loss in a year?
What is RTO?
Recovery Time Objective. Time to recover to a specific point. I.e. must be back to X% level of service within Y amount of time.
What is RPO?
Recovery Point Objective. How much data loss is acceptable?
What is CSRF?
Cross Site Request Forgery. AKA C-SRF (sea surf). The website trusts your browser and requests are made without your consent or knowledge.
What is SQL injection?
Add your own commands to an application’s SQL query, like through a text box submission.
What is PCI DSS?
Payment Card Industry Data Security Standard.
What is SSL Stripping/ HTTP Downgrade?
Combines on-path attack with a downgrade attack. Attacker must sit in the middle of the conversation and modifies the data between the victim and web server.
What is RAT and what does it do?
Remote Access Trojan? Backdoor, allows for admin control.
What is a worm?
Takes advantage of a vulnerability and installs malware that includes a remote access backdoor.
What is SIMS?
Standard for Information Security Management Systems.
What is PIMS?
Privacy Information Management System.
What does ISO/ IEC 27001 describe?
Standard for Information Management Security (SIMS).
What does ISO/ IEC 27002 describe?
Code of practice for information security controls.
What does ISO/ IEC 27701 describe?
Privacy Information Management Systems.
What does ISO 31000 describe?
International standards for risk management practices.
What is GDPR?
General Data Privacy Regulation. Used by European Union.
What is CSA?
Cloud Security Alliance.
What is CCM?
Cloud Controls Matrix. Cloud-specific security controls. Controls are mapped to standards, best practices, and regulations.
What is SMTP and SMTPS, what do they do, and what ports do they use?
Simple Mail Transfer Protocol and Simple Mail Transfer Protocol Secure. Used by clients to deliver email to a server. Also used by servers to forward mail to their final destination. SMTP uses TCP port 25 and SMTPS uses TCP port 587.
Send Mail To Persons over 25 but under 587. We can send between 25 and 587 emails per day.
What is S/MIME and what does it do?
Secure/ Multipurpose Inter Mail Extensions. Uses public key encryption and digital signing of mail content.
The mime needs extensions because he can’t speak on his own.
What is IMAP and IMAPS, what do they do, and what ports do they use?
Internet Message Access Protocol and Internet Message Access Protocol Secure. Retrieves email from a server. IMAP uses TCP port 143 and IMAPS uses TCP port 993.
What is CASB and what does it do?
Cloud Access Security Broker. Security policies in the cloud. Implemented as client software, local security appliances, or cloud based security solutions.
What is WEP?
Wired Equivalent Privacy. Not good.
What is EAP and what is it?
Extensible Authentication Protocol. An authentication framework. Integrates with 802.1X.
What is 802.1X?
An IEEE standard for port based network access control (PNAC). Uses a centralized authentication server and all users can use their normal credentials to authenticate to an 802.1X network.
What is PEAP, who developed it, and what does it do?
Protected Extensible Authentication Protocol. Protected EAP. Created by Cisco, Microsoft, and RSA Security. It encapsulates EAP in a TLS tunnel.
What is EAP-TLS?
EAP Transport Layer Security. Strong security that requires a digital certificate on the AS (authentication server) and all other devices.
EAP! I forgot the digital certificate on the AS!
What is AS?
Authentication Server.
What is EAP-TTLS?
EAP Tunneled Transport Layer Security. Supports other authentication protocols in a TLS tunnel. Requires a digital certificate on the AS. Does not require a certificate on every device. Builds a TLS tunnel using this digital certificate. Use any authentication method inside the TLS tunnel, including other EAPs, MS-CHAPv2, and anything else.
You can send anything in a tunnel.
What is EAP-MSCHAPv2?
Extensible Authentication Protocol - Microsoft Challenge Handshake Authentication Protocol version 2. Uses user account credentials in ADDS (Active Directory Domain Services) to authenticate wireless access clients instead of using smart cards or user and computer certificates for client authentication.
What is EAP-FAST?
EAP Flexible Authentication via Secure Tunneling. AS and supplicant share a protected access credential (PAC), aka shared secret.
What is PAC?
Protected Access Credential.
What is RADIUS and what does it do?
Remote Authentication Dial-In User Service. Centralized Authentication.
What is SOAR?
Security Orchestration, Automation, and Response.
What is PKI and what is it?
Public Key Infrastructure. Policies, procedures, hardware, software, people. Digital certificates: create, distribute, manage, store, revoke.
What is UTM and what is it?
Unified Threat Management. All-in-once security appliance.
What is RTOS and what is it?
Real Time Operating System. An OS with a deterministic processing schedule. Used in environments where a large number of events, mostly external to the computer system, must be accepted and processed in a short time or within certain deadlines. such applications are industrial control, telephone switching equipment, flight control, and real-time simulations.
What is SoC and what is it?
System on a Chip. Multiple components running on a single chip.
What is SED?
Self-Encrypting Drive.
What is MAC (with respect to authentication)?
Message Authentication Code.
What is MAC (with respect to access) and what does it do?
Mandatory Access Control. The OS controls the access through GPOs, etc.
What is CASB?
Cloud Access Security Broker. Can be used to apply security policies to cloud based implementations. Two common functions of a CASB are visibility into application use and data security policy use. Also verification of compliance with formal standards and the monitoring and identification of threats.
What is MSP?
Managed Service Provider. Can be a cloud service provider, but not all cloud service providers are MSPs.
What is FDE?
Full Disk Encryption.
What is SRTP, what does it do, what encryption standard does it commonly use, and what port does it use, what layer does it work on?
Secure Real-Time Transport Protocol. Used for secure VoIP. Commonly uses AES for confidentiality. Uses port 5061. Application layer protocol.
What is passive foot printing?
Learning as much as possible about a company from open sources.
What protocol does HTTPS and FTPS use?
TLS.
What is FTP and FTPS and what ports do they use?
File Transfer Protocol and File Transfer Protocol Secure. FTP uses TCP port 20 for data and TCP port 21 for control. FTPS uses TCP port 990 for control and TCP port 989 for data.
What is SSH, what does it do, and what port does it use?
Secure Shell. Used for secure remote connections. Uses TCP port 22.
What is DNSSEC?
DNS Security Extensions. Does not provide any confidentiality of data.
What is an incremental backup?
Backs up only the files that have been changed since the last incremental backup. For example, if you do a full backup on Monday, then an incremental backup on Tuesday and Wednesday, you will need to perform three restores. Monday, then whatever changed on Tuesday, then whatever changed on Wednesday.
What is a differential backup?
Backs up only the files that have been changed since the last full backup. For example, if you do a full backup on Monday, then an incremental backup on Tuesday and Wednesday, you will need to perform two restores. Monday, then Wednesday.
What is Trusted Boot?
This portion of the startup process verifies the OS kernel signature and starts the ELAM process.
What is ELAM?
Early Launch Anti-Malware.
ELAM backwards is MALE. Males are the early form of malware.
What is Measured Boot?
Occurs after the Trusted Boot process and verifies that nothing on the computer has been changed by malicious software or other processes.
What is Secure Boot?
A UEFI BIOS boot feature that checks the digital signature of the bootloader. The Trusted Boot Process occurs after the Secure Boot has completed.
What is POST?
Power On Self Test. Hardware check performed prior to booting an operating system.
What is SHA256 and what are some applications?
Secure Hash Algorithm with a message digest of 256 bits. Digital signature verification, password hashing, SSL handshakes in browsers, verifies a file was not corrupted during a file transfer.
What is integrity measurement?
Designed to check for the secure baseline of firewall settings, patch levels, and OS versions, and any other security components associated with the application.
What is a data custodian?
A person who manages access rights and sets security controls on the data.
What is a data processor?
A person who manages the operational use of the data but not the rights and permissions.
What is a data owner?
A person who makes business decisions regarding the data. Usually a higher level executive.
What is a privacy officer.
A person who sets privacy policies and implements privacy processes and procedures.
What is HSM?
Hardware Security Module. A high end cryptographic hardware appliance that can securely store keys and certificates for all devices.
What is PAP?
Password Authentication Protocol.
What is MS-CHAP?
Microsoft Challenge Handshake Protocol. An encrypted challenge is sent over the network. It is a three-way handshake. Challenege-response continues periodically. Commonly uses PPTP (Point to Point Tunneling Protocol). Don’t use it, it’s bad. Security issues with DES.
What is DES?
Data Encryption Standard. Don’t use it, has security issues.
What is PPTP?
Point to Point Tunneling Protocol.
What is IPsec?
Internet Protocol Security. Security for OSI layer 3. Authentication and encryption for every packet. Features confidentiality and integrity, anti-replay. Two core protocols combined, AH and ESP.
What is AH and what does it do?
Authentication Header. Provides data integrity, origin authentication, replay attack prevention, keyed-hash mechanism. No confidentiality or encryption.
What is ESP and what does it do?
Encapsulating Security Payload. Provides confidentiality through encryption, limited traffic flow confidentiality, data integrity, and anti-replay protection.
What is CBC and what does it do?
Cipher Block Chaining. Each plaintext block is XORed with the previous ciphertext block.
What is a message digest?
A message digest is a fixed size numeric representation of the contents of a message, computed by a hash function.
What is hashing?
The process of transforming any given key or a string of characters into another value, i.e. a message digest.
What is salt and what does it defeat?
Random data fed as an additional input to a one-way function that hashes data. It defeats rainbow tables.
What is CTR and what does it do?
Counter. Block cipher mode / acts like a stream cipher. Encrypts successive values of a “counter”. Plaintext can be any size, since it’s part of the XOR i.e., 8 bits
at a time (streaming) instead of a 128-bit block.
What is GCM and what does it do?
Galois/ Counter Mode. Encryption with authentication. Very efficient encryption and authentication. Minimum latency and operation overhead. Commonly used in packetized data.
Galois was very fast and very efficient when it came to encrypting and authenticating.
What is SMS?
Short Message Service. Text messages.
What is MMS?
Multimedia Messaging Service. Like expanded text messages.
What is CSR?
Certificate Signing Request.