Architecture and Design Flashcards

1
Q

The only constant is change
- Operating systems, patches, application updates, network modifications, new application instances, etc.

Identify and document hardware and software settings
- Manage the security when changes occur

Rebuild those systems if a disaster occurs
- Documentation and processes will be critical

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network diagrams - Document the physical wire and device

Physical data center layout - Can include physical rack locations

Device diagrams - Individual cabling

A

Diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The security of an application environment should be well defined
- All application instances must follow this
- Firewall settings, patch levels, OS file versions
- May require constant updates

Integrity measurements check for the secure baseline
- These should be performed often
- Check against well-documented baselines
- Failure requires an immediate correction

A

Baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Create a standard
- Needs to be easily understood by everyone

Devices
- Asset tag names and numbers
- Computer names - location or region
- Serial numbers

Networks - Port labeling

Domain configurations
- User account names
- Standard email addresses

A

Standard naming conventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IP address plan or model
- Consistent addressing for network devices
- Helps avoid duplicate UP addressing

Locations
- Number of subnets, hosts per subnet

IP ranges
- Different sites have a different subnet
- 10.1.x.x/24, 10.2.x.x/24, 10.3.x.x/24

Reserved addresses
- Users, printers, routers/default gateways

A

IP schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data that resides in a country is subject to the laws of that country
- Legal monitoring, court orders, etc

Laws may prohibit where data is stored
- GDPR (General Data Protection Regulation)
- Data collected on EU citizens must be stored in the EU
- A complex mesh of technology and legalities

Where is your data stored?
- Your compliance laws may prohibit moving data out of the country

A

Data sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data obfuscation
- Hide some of the original data

Protects PII
- and other sensitive data

May only be hidden from view
- The data may still be intact in storage
- Control the view based on permissions

Many different techniques
- Substituting, shuffling, encrypting, masking out, etc.

A

Data masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encode information into unreadable data
- Original information is plaintext, encrypted form is ciphertext

This is a two-way street
- Convert between one and the other
- If you have the proper key

Confusion
- The encrypted data is drastically different than the plaintext

Diffusion
- Change one character of the input, and many characters change of the output

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The data is on a storage device
- Hard drive, SSD, flash drive, etc

Encrypt the data
- Whole disk encryption
- Database encryption
- File or folder-level encryption

Apply permissions
- Access control lists
- Only authorized users can access the data

A

Data at-rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data transmitted over the network
- Also called data in-motion

Not much protection as it travels
- Many different switches, routers, devices

Network, based protection
- Firewall, IPS

Provide transport encryption
- TLS (Transport Layer Security)
- IPsec (Internet Protocol Security)

A

Data in-transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data is actively processing in memory
- System RAM, CPU registers and cache

The data is almost always decrypted
- Otherwise, you can’t do anything with it

The attackers can pick the decrypted information
- A very attractive option

A

Data in-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replace sensitive data with a non-sensitive placeholder

Common with credit card processing
- Use a temporary token during payment
- An attacker capturing the card numbers can’t use them later

This isn’t encryption or hashing
- The original data and token aren’t mathematically related
- No encryption overhead

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control how data is used
- Microsoft Office documents, email messages, PDFs

Restrict data access to unauthorized persons
- Prevent copy and paste
- Control screenshots
- Manage printing
- Restrict editing

Each user has their own set of rights
- Attackers have limited options

A

Information Rights Management (IRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where’s your data?
- Social Security numbers, credit card numbers, medical records

Stop the data before the attackers get it
- Data “leakage”

So many sources, so many destinations
- Often requires multiple solutions in different places

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On your computer
- Data in use
- Endpoint DLP

On your network
- Data in motion

On your server
- Data at rest

A

Data Loss Prevention (DLP) systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Legal implications
- Business regulations vary between states
- For a recovery site outside of the country, personnel must have a passport and be able to clear immigration
- Refer to your legal team

Offsite backup
- Organization-owned site or 3rd-party secure facility

Offsite recovery
- Hosted in a different location, outside the scope of the disaster

Travel considerations for support staff and employees

A

Geographical considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Incident response and recovery has become commonplace
- Attacks are frequent and complex

Incident response plan should be established
- Documentation is critical
- Identify the attack
- Contain the attack

Limit the impact of an attacker
- Limit data exfiltration
- Limit access to sensitive data

A

Response and recovery controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Commonly used to examine outgoing SSL/TLS
- Secure Sockets Layer/Transport Layer Security

SSL/TLS relies on trust
- Without trust, none of this works

Your browser contains a list of trusted CAs

Your browser doesn’t trust a website unless a CA has signed the web server’s encryption certificate
- The website pays some money to the CA for this

The CA has ostensible performed some checks
- Validated against the DNS record, phone call, etc.

Your browser checks the web server’s certificate
- If it’s signed by a trusted CA, the encryption works seamlessly

A

SSL/TLS Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Represent data as a short string of text
- A message digest

One-way trip
- Impossible to recover the original message from the digest
- Used to store passwords/confidentiality

Verify a downloaded document is the same as the original
- Integrity

Can be a digital signature
- Authentication, non-repudiation, and integrity

Will not have a collision (hopefully)
- Different messages will not have the same hash

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Control software or hardware programmatically

Secure and harden the login page

On-path attack
- Intercept and modify API messages, replay API commands

API injection
- Inject data into an API message

DDoS
- One bad API call can bring down a system

A

API considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Recovery site is prepped
- Data is synchronized

A disaster is called
- Business processes failover to the alternate processing site

Problem is addressed
- This can take hours, weeks, or longer

Revert back to the primary location
- This process must be documented for both directions

A

Site resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A exact replica
- Duplicate everything

Stocked with hardware
- Constantly updated
- You buy two of everything

Applications and software are constantly updated
- Automated replication

Flip a switch and everything moves
- This may be quite a few switches

A

Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

No hardware
- Empty building

No data
- Bring it with you

No people
- Bus in your team

A

Cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Somewhere between a hot and cold site
- Just enough to get going

Big room with rack space
- You bring the hardware

Hardware is ready and waiting
- You bring the software and data

A

Warm site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Attract the bad guys
- And trap them there

The “attacker” is probably a machine
- Makes for interesting recon

Create a virtual world to explore

Constant battle to discern the real from the fake

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

More than one honeypot on a network

More than one source of information

A

Honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Bait for the honeynet

An alert is sent if the file is accessed

A virtual bear trap

A

Honeyfiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Machine learning
- Interpret big data to identify the invisible

Train the machine with actual data
- Learn how malware looks and acts
- Stop malware based on actions instead of signatures

Send the machine learning model fake telemetry
- Make malicious malware look benign

A

Fake telemetry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Sometimes called Hardware as a Service (HaaS)
- Outsource your equipment

You’re still responsible for the management
- And for the security

Your data is out there, but more within your control

Web server providers

A

Infrastructure as a service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

No servers, no software, no maintenance team, no HVAC
- Someone else handles the platform, you handle the development

You don’t have direct control of the data, people, or infrastructure
- Trained security professionals are watching your stuff
- Choose carefully

Put the building blocks together
- Develop your app from what’s available on the platform
- SalesForce.com

A

Platform as a service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

On-demand software
- No local installation
- Why manage your own email distribution or payroll?

Central management of data and applications
- Your data is out there

A complete application offering
- No development work required
- Google Mail

A

Software as a service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A broad description of all cloud models
- Use any combination of the cloud

Services delivered over the internet
- Not locally hosted or managed

Flexible consumption model
- No large upfront costs or ongoing licensing

IT becomes more of an operational model
- And less of a cost-center model
- Any IT function can be changed into a service

A

Anything as a service (XaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Provide cloud services
- SaaS, PaaS, IaaS, etc

Charge a flat fee or based on use
- More data, more cost

You still manage your processes
- Internal staff
- Development team
- Operational support

A

Cloud service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

UPDATE

A

Managed service providers (MSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Firewall management

Patch management, security audits

Emergency resonse

A

Managed Security Service Provider (MSSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Your applications are on local hardware

Your servers are in your data center in your building

A

On-premise cloud model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Your servers are not in your building

They may not be even running on your hardware

Usually a specialized computing environment

A

Off-premise cloud model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Available to everyone over the internet

A

Public cloud deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Several organizations share the same resources

A

Community cloud deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Your own virtualized local data center

A

Private cloud deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A mix of public and private

A

Hybrid cloud model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Over 30 billion IoT devices on the internet
- Devices with very specific functions
- A huge amount of data

Process application data on an edge server
- Close to the user

Often process data on the device itself
- No latency, no network requirement
- Increased speed and performance
- Process where the data is, instead of processing in the cloud

A

Edge computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A cloud that’s close to your data
- (Cloud + IoT - Fog Computing)

A distributed cloud architecture - extends the cloud

Distribute the data and processing
- Immediate data stays local - No latency
- Local decisions made from local data
- No bandwidth requirements
- Private data never leaves - Minimizes security concerns
- Long-term analysis can occur in the cloud - Internet only when required

A

Fog computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Basic application usage
- Applications actually run on a remove server
- Virtual Desktop Infrastructure (VDI)
- Desktop as a Service (DaaS)
- Local device is a keyboard, mouse, and screen

Minimal operating system on the client
- No huge memory or CPU needs

Network connectivity
- Big network requirement
- Everything happens across the wire

A

Thin client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Run many different operating systems on the same hardware

Each application instance has its own operating system
- Adds overhead and complexity
- Virtualization is relatively expensive

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Contains everything you need to run an application
- Code and dependencies
- A standardized unit of software

An isolated process in a sandbox
- Self-contained
- Apps can’t interact with each other

Container image
- A standard for portability
- Lightweight, uses the host kernal
- Secure separations between applications

A

Application containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Monolithic applications
- One big application that does everything

Application contains all decision making processes
- User interface
- Business logic
- Data input and output

Code challenges
- Large codebase
- Change control challenges

APIs
- API is the glue for the microservices
- Work together to act as the application

Scalable
- Scale just the microservices you need

Resilient
- Outages are contained

Security and compliance
- Containment is built-in

A

Microservices/APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Function as a Service
- Applications are separated into individual, autonomous functions
- Remove the operating system from the equation

Developer still creates the server-side logic
- runs in a stateless compute container

May be event triggered and ephemeral
- May only run for one event

Managed by a third-party
- All OS security concerns are at the third-party

A

Serverless architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Virtual Private Cloud
- A pool of resources created in the public cloud

Common to create many VPCs
- Many different application clouds

Connect VPCs with this
- And users to VPCs
- A “cloud router”

Now make it secure
- VPCs are commonly on different IP subnets
- Connecting through the cloud is often through a VPN

A

Transit gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Assigning permissions to cloud resources
- Not the easiest task
- Everything is in constant motion

Specify which resources can be provisioned (Azure)
- Create a service in a specific region, deny all others

Specify the resource and what actions are permitted (Amazon)
- Allow access to an API gateway from an IP address range

Explicitly list the users who can access the resource (Amazon)
- Userlist is associated with the resource

A

Resource policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Many different service providers
- The natural result of multi-sourcing

Every provider works differently
- Different tools and processes

Provides a single business-facing IT organization

An evolving set of processes and procedures

A

Service Integration and Management (SIAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Describe as infrastructure
- Define servers, network, and applications as code

Modify the infrastructure and create versions
- The same way you version application code

Use the description (code) to build other application instances
- Build it the same way every time based on the code

An important concept for cloud computing
- Build a perfect version every time

A

Infrastructure as code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Networking devices have two functional planes of operation
- Control plane, data plane

Directly programmable
- Configuration is different than forwarding

Agile - Changes can be made dynamically

Centrally managed - Global view, single pane of glass

Programmatically configured
- No human intervention

Open standards/vendor neutral
- A standard interface to the network

A

Software Defined Networking (SDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

You must see the traffic to secure the data
- React and respond

Dynamic deployments include security and network visibility devices
- Next-generation firewalls, web application firewalls
- SIEM

Data is encapsulated and encrypted
- VXLAN and SSL/TLS

New technologies change what you can see
- Infrastructure as code, microservices

Security devices monitor application traffic
- Provides visibility to traffic flows

Visibility expands as the application instances expand
- Real-time metrics across all traffic flows

Application flows can be controlled via API
- Identify and react to threats

A

Software Defined Visibility (SDV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Click a button
- You’ve built a server
- Or multiple servers, networks, and firewalls

It becomes almost too easy to build instances
- this can get out of hand very quickly

The virtual machines are sprawled everywhere
- You aren’t sure which VMs are related to which applications
- It becomes extremely difficult to deprovision

Formal process and detailed documentation
- You should have information on every virtual object

A

VM sprawl avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

The virtual machine is self-contained
- There’s no way out - Or is there?

Virtual machine escape
- Break out of the VM and interact with the host operating system or hardware

Once you escape the VM, you have great control
- Control the host and control other guest VMs

This would be a huge exploit
- Full control of the virtual world

A

VM escape protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Secure environment

Writing code

Developers test in their sandboxes

A

Development environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Still in the development stage

All of the pieces are put together

Functional tests

Does it work?

A

Test environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Verifies features are working as expected

Verifies new functionality

Verifies old errors don’t reappear

A

Quality Assurance (QA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Almost ready to roll it out

Works and feels exactly like the production environment

Working with a copy of production data

Runs performance tests

Test usability and features

A

Staging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Application is live

Rolled out to the user community

Challenging step
- Impacts the users

Logistical challenges
- New servers
- New software
- Restart or interrupt of service

A

Production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Deploy an application
- Web server, database server, middle server, user workstation configuration, certificate updates, etc

Application software security
- Operating system, application

Network security
- Secure VLAN, internal access, external access

Software deployed to workstations
- Check executes for malicious code, verify security posture of the workstation

A

Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

The ability to increase the workload in a given infrastructure

Build an application instance that can handle

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Increase or decrease available resources as the workload changes

Deploy multiple application instances to handle

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Dismantling and removing an application instance
- All good things

Security deprovisioning is important
- Don’t leave open holes, don’t close important ones

Firewall policies must be reverted
- If the application is gone, so is the access

What happens to the data?
- Don’t leave information out there

A

Deprovisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A balance between time and quality
- Programming with security in mind is often secondary

Testing, testing, testing
- The Quality Assurrance (QA) process

Vulnerabilities will eventually be found
- And exploited

A

Secure coding concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

SQL databases
- Client sends detailed requests for data

Client requests can be complex
- And sometimes modified by the user
- This would not be good

These limit the client interactions
- That’s it. No modifications to the query are possible.

A

Stored Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Make something normally understandable very difficult to understand

Take perfectly readable code and turn it into nonsense
- The developer keeps the readable code and gives you the chicken scratch
- Both sets of code perform exactly the same way

Helps prevent the search for security holes
- Makes it more difficult to figure out what’s happening- But not impossible

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Use old code to build new applications
- Copy and paste

If this has security vulnerabilities, reusing the code spreads it to other applications
- Making this much more difficult for everyone

A

Code reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Calculations are made, code is executed, results are tallied

The results aren’t used anywhere else in the application

All code is an opportunity for a security problem
- Make sure your code is as alive as possible

A

Dead code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

All checks occur on the server

Helps protect against malicious users

Attackers may not be even using your interface

A

Server-side validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

The end-user’s app makes the validation decisions

Can filter legitimate input from genuine users

May provide additional speed to the user

A

Client-side validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

As a developer, you must be mindful of how memory is used
- Many opportunities to build vulnerable code

Never trust data input
- Malicious users can attempt to circumvent your code

Buffer overflows are a huge security risk
- Make sure your data matches your buffer sizes

Some built-in functions are insecure
- Use best practices when designing your code

A

Memory management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Your programming language does everything - Almost

Third-party libraries and software development kits
- Extend the functionality of a programming language

Security risk
- Application code written by someone else
- Might be secure. Might not be secure.
- Extensive testing is required

Balancing act - Application features vs. unknown code base

A

Third-party libraries and SDKs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

So much sensitive data
- Credit card numbers, social security numbers, medical information, address details, email information

How is the application handling the data?
- No encryption when stored
- No encryption across the network
- Displaying information on the screen

All input and output processes are important
- Check them all for data exposure

A

Data exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Create a file, make a change, make another change, and another change
- Track those changes, revert back to previous version

Commonly used in software development
- But also in operating systems, wiki software, and cloud-based file storage

Useful for security
- Compare versions over time
- Identify modifications to important files
- A security challenge
- Historical information can be a security risk

A

Version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Alternative compiler paths would result in different binary each time
- Each compiled application would be a little bit different
- But functionality the same

An attack against different binaries would only be successful on a fraction of the users
- An attacker wouldn’t know what exploit to use
- Make the game much harder to win

A

Software diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Plan for change
- Implement automatically

Automated courses of action
- Many problems can be predicted
- Have a set of automated responses

Continuous monitoring
- Check for a particular event, and then react

Configuration validation
- Cloud-based technologies allow for constant change
- Automatically validate a configuration before going live
- Perform ongoing automated checks

A

Automation and scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Code is constantly written
- And merged into the central repository many times a day

So many chances for security problems
- Security should be a concern from the beginning

Basic set of security checks during development
- Documented security baselines as the bare minimum

Large-scale security analysis during the testing phase
- Significant problems will have already been covered

A

Continuous Integration (CI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Keep all of an organization’s usernames and passwords in a single database
- Also contains computers, printers, and other devices

Large distributed database
- Constantly replicated

All authentication requests reference this directory
- Each user only needs one set of credentials
- One username and password for all services

Access via Kerberos or LDAP

A

Directory services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Provide network access to others
- Not just employees - Partners, suppliers, customers, etc
- Provides SSO and more

Third-parties can establish network this
- Authenticate and authorize between the two organizations
- Login with your Facebook credentials

The third-parties must establish a trust relationship
- And the degree of the trust

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Prove the hardware is really yours
- A system you can trust

Easy when it’s just your computer
- More difficult when there are 1,000

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Device provides an operational report to a verification server

Encrypted and digitally signed with the TPM

An IMEI or other unique hardware component can be included in the report

A

Remote attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Text messaging
- Includes more than text these days

Login factor can be sent via SMS to a predefined phone number
- Provide username and password
- Phone receives an SMS
- Input the SMS code into a login form

Security issues exist
- Phone number can be reassigned to a different phone
- SMS messages can be intercepted

A

Short message service (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Similar process to a SMS notification
- Authentication factor is pushed to a specialized app
- Usually on a mobile device

Security challenges
- Applications can be vulnerable
- Some push apps send in the clear

Still more secure than SMS
- Multiple factors are better than one factor

A

Push notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Pseudo-random token generators
- A useful authentication factor

Carry around a physical hardware token generator

Use software-based token generator on your phone
- Powerful and convenient

A

Authentication apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Use a secret key and the time of day
- No incremental counter

Secret key is configured ahead of time
- Timestamps are synchronized via NTP

Timestamp usually increments every 30 seconds
- Put it your username, password, and TOTP code

One of the more common OTP methods
- Used in Google, Facebook, Microsoft, etc

A

Time-based One-Time Password algorithm (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

One time password
- Use them once, and never again
- Once a session, once each authentication attempt

A

Hashed One-Time password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A voice call provides the toke
- The computer is talking to you
- “Your code is 1-6-2-5-1-7”

Similar disadvantages to SMS
- Phone call can be intercepted or forwarded
- Phone number can be added to another phone

A

Phone call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Authentication factors that don’t change
- You just have to remember

Personal Identification Number (PIN)
- Your secret numbers

Can also be alphanumeric
- A password or passphrase

A

Static codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Integrated circuit card - Contact or contactless

Common on credit cards - Also used for access control

Must have physical card to provide digital access
- A digital certificate

Multiple factors
- Use the card with a PIN or fingerprint

A

Smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Fingerprint scanner
- Phones, laptops, door access

Retinal scanner
- Unique capillary structure in the back of the eye

Iris scanner
- Texture, color

Voice recognition
- Talk for access

Facial recognition
- Shape of the face and features

Gait analysis
- Identify a person based on how they walk
- Many unique measurements

Veins
- Vascular scanners
- Match the blood vessels visible from the surface of the skin

A

Biometric factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Likelihood that an unauthorized user will be accepted
- Not sensitive enough

A

False acceptance rate (FAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Likelihood than an authorized user will be rejected
- Too sensitive

A

False rejection rate (FRR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Defines the overall accuracy of a biometric system
- The rate at which FAR and FRR are equal
- Adjust sensitivity to equalize both values

A

Crossover error rate (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

This is who you claim to be
- Usually your username

A

Identification (AAA framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Prove you are who you say you are
- Password and other factors

A

Authentication (AAA framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Based on your identity and authentication, what access do you have?

A

Authorization (AAA framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Resources used: Login time, data sent and received, logout time

A

Accounting (AAA framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Third-party can manage the platform
- Centralized platform
- Automation options with API integrations
- May include additional options (for a cost)

A

Cloud-based security authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Internal monitoring and management
- Need internal expertise
- External access must be granted or managed

A

On-premise authentication

102
Q

Password
- Secret word/phrase, string of characters
- Very common authentication factor

PIN
- Personal identification number
- Not typically contains anywhere on a smart or ATM card

Pattern
- Complete a series of patterns
- Only you know the right format

A

Something you know

103
Q

Smart card
- Integrates with devices
- May require a PIN

USB token - Certificate is on the USB device

Hardware or software tokens
- Generates pseudo-random authentication codes

Your phone - SMS a code to your phone

A

Something you have

104
Q

Biometric authentication
- Fingerprint, iris scan, voice print

Usually stores a mathematical representation of your biometric
- Your actual fingerprint isn’t usually saved

Difficult to change
- You can change your password
- You can’t change your fingerprint

Used in very specific situations
- Not foolproof

A

Something you are

105
Q

Provide a factor based on your location
- The transaction only completes if you are in a particular geography

IP address
- Not perfect, but can help provide more info
- Works with IPv4, but not so much with IPv6

Mobile device location services
- Geolocation to a very specific are
- Must be in a location that can receive GPS information or near an identified mobile or 802.11 network
- Still not a perfect identifier of location

A

Somewhere you are

106
Q

A personal way of doing things
- You’re special

Handwriting analysis
- Signature comparison
- Writing technique

Very similar to biometrics
- Close to something you are

A

Something you can do

107
Q

A unique trait, personal to you

Gait analysis - the way you walk

Typing analysis - the way you hit the enter key too hard

A

Something you exhibit

108
Q

A social factor

It’s not what you know…

Web of trust

Digital signature

A

Someone you know

109
Q

Duplicate parts of the system
- If a part fails, the redundant part can be used

Maintain time
- The organization continues to function

No hardware failure
- Servers keep running

No software failure
- Services always available

No system failure
- Network performing optimally

A

Redundancy

110
Q

Bad things can happen in a local area
- Hurricanes, tornadoes, flooding

Disperse technologies to different geographies
- Use multiple data centers
- In different locations

Data centers might be part of the normal operations

May be part of a disaster recovery center

A

Geographic dispersal

111
Q

Multipath I/O (Input/Output)
- Especially useful for network-based storage subsystems
- Multiple Fibre Channel interfaces with multiple switches

RAID - Redundant Array of Independent Disks

Multiple drives create redundancy
- Many different designs and implementations

A

Disk redundancy

112
Q

Striping without parity

High performance, no fault tolerance

A

RAID 0

113
Q

Mirroring

Duplicates data for fault tolerance, but requires twice the disk space

A

RAID 1

114
Q

Striping with parity

Fault tolerant, only requires an additional disk for redundancy

A

RAID 5

115
Q

Multiple RAID types

Combine RAID methods to increase redundancy

A

RAID 0+1, etc

116
Q

Some servers are active - Others are on standby

If an active server fails, the passive server takes its place

A

Load balancing

117
Q

Load Balancing/Fail Over (LBFO)
- Aggregate bandwidth, redundant paths
- Becomes more important in the virtual world

Multiple network adapters
- Looks like a single adapter
- Integrate with switches

NICs talk to each other
- Usually multicast instead of broadcast
- Fails over when a NIC doesn’t respond

A

NIC teaming

118
Q

Short-term backup power from blackouts, brownouts, surges

Features
- Auto shutdown, battery capacity, outlets, phone line suppression

A

UPS - Uninterruptible Power Supply

119
Q

Long-term power backup
- Fuel storage required

Power an entire building
- Some power outlets may be marked as generator-powered

It may take a few minutes to get the generator up to speed
- Use a battery UPS while the generator is starting

A

Generators

120
Q

Redundancy
- Internal server power supplies
- External power circuits

Each power supply can handle 100% of the load
- Would normally run at 50% of the load

Hot-swappable
- Replace a faulty power supply without powering down

A

Dual-power supplies

121
Q

Provide multiple power outlets
- Usually in a rack

Often include monitoring and control
- Manage power capacity
- Enable or disable individual outlets

A

Power distribution units (PDUs)

122
Q

Share data between different devices
- If one device fails, you can still work with the data
- VERY fast recovery times compared to traditional backups

A

SAN replication

123
Q

Specialized high-performance network of storage devices

A

Storage area network (SANs)

124
Q

Create a state of data based on a point in time

Copy that state to other SANs

Type of backup primarily used to capture the entire operating system
image including all applications and data

Commonly used with virtualized systems

A

SAN snapshot backup

125
Q

Maintain one VM, replicate to all others

The virtual machine is really just one big file

Consistent service offering
- Maintain copies anywhere in the world

Recover from a replicated copy
- Provides a backup if needed

Efficient copying
- Only replicates the data that has changed

A

VM replication

126
Q

Speed
- Local devices are connected over very fast networks
- Cloud connections are almost always slower

Money
- Purchasing your own storage is an expensive capital investment
- Clouds costs have a low entry point and can scale

Security
- Local data is private
- Data stored in the cloud requires additional security controls

A

On premises vs cloud redundancy

127
Q

Everything backed up

A

Full backup

128
Q

All files changed since the last incremental backup

Full backup is taken first

Subsequent backups contain data changed since the last full back up and last incremental backup
- These are usually smaller than the full backup

A restoration requires the full backup and all of these backups

A

Incremental backup

129
Q

All files changed since the last full backup

Full backup is taken first

Subsequent backups contain data changed since the last full backup
- These usually grow larger as data is changed

A restoration requires the full backup and the last one of these

A

Differential backup

130
Q

Magnetic tape
- Sequential storage
- 100 GB to multiple terabytes per cartridge
- Easy to ship and store

Disk
- Faster than magnetic tape - Deduplicate and compress

Copy
- A useful strategy
- May not include versioning - May need to keep offsite

A

Backup media

131
Q

Connected to a shared storage device across the network
- File level access

Storage devices that connect directly to your organization’s network

Often implement RAID arrays to ensure high availability

A

Network Attached Storage (NAS)

132
Q

Looks and feels like a local storage device

Block-level access

Very efficient reading and writing

A

Storage Area Network (SAN)

133
Q

Backup to a remote device in the cloud

Support many devices

May be limited by bandwidth

A

Cloud backup

134
Q

Capture an exactly replica of everything on a storage device

Restore everything on a partition, including operating system files and user documents

A

Image backup

135
Q

Backup to local devices

Fast and secure

Must be protected and maintained

Often requires offsite storage for disaster recovery

A

Offline backup

136
Q

Remote network-connected third-party

Encrypted

Accessible from anywhere

Speed is limited by network bandwidth

A

Online backup

137
Q

The cloud is always in motion
- Application instances are constantly built and torn down

Snapshots can capture the current configuration and data
- Preserve the complete state of a device, or just the configuration

Revert to known state
- Fall back to a previous snapshot

Rollback to known configuration
- Don’t modify the data, but use a previous configuration

Live boot media
- Run the operating system from removable media - very portable!

A

Non-persistence

138
Q

Redundancy doesn’t always been available
- May need to be powered on manually

Always on, always available

May include many different components working together
- Active/Active can provide scalability advantages

Higher availability almost always means higher costs
- There’s always another contingency you could add
- Upgraded power, high-quality server components, etc

A

High availability (HA)

139
Q

Certain components may need to be restored first

Databases should be restored before the application

A

Application-specific restoration

140
Q

Incremental backups restore the full backup, then all subsequent incremental backups

Differential backups restore the full backup, then the last differential backup

A

Backup-specific restoration

141
Q

A zero-day OS vulnerability can cause significant outages

Multiple security devices

A

Technology Resiliency

142
Q

A single vendor can become a disadvantage

No options during annual renewals

A bad support team may not be able to resolve problems in a timely manner

A

Vendor Resiliency

143
Q

All cryptography is temporary

Diverse certificate authorities can provide additional protection

A

Cryptographic Resiliency

144
Q

Administrative controls

Physical controls

Technical controls

Combine them together

Defense in depth

A

Controls Resiliency

145
Q

Hardware and software designed for a specific function
- Or to operate as part of a larger system

Is built with only this task in mind
- Can be optimized for size and/or cost

Common examples
- Traffic light controllers
- Digital watches
- Medical imaging systems

Not usually a fully capable computer
- Low cost, purpose-built

Adds additional constraints
- May have limited or missing features
- Upgradability limitations
- Limits in communication options

An ongoing trade off
- Low cost systems - Unique management challenges

A

Embedded systems

146
Q

Multiple components running on a single chip
- Common with embedded systems

Small form-factor
- External interface support
- Cache memory, flash memory
- Usually lower power consumption

Security considerations are important
- Difficult to upgrade hardware
- Limited off-the-shelf security options

A

SoC (System on a Chip)

147
Q

An integrated circuit that can be configured after manufacturing
- Array of logic books
- Programmed in the field

A problem doesn’t require a hardware replacement
- Reprogram the FPGA

Common in infrastructure
- Firewall logic
- Routers

A

Field-programmable gate array (FPGA)

148
Q

Large-scale, multi-site Industrial Control Systems (ICS)

PC manages equipment
- Power generation, refining, manufacturing equipment
- Facilities, industrial, energy, logistics

Distributed control systems
- Real-time information
- System control

Requires extensive segmentation

A

SCADA/ICS

149
Q

Sensors - Heating and cooling, lighting

Smart devices - Home automation, video doorbells

Wearable technology - Watches, health monitors

Facility automation - Temperature, air quality, lighting

Weak defaults
- Manufacturers are not security professionals

A

Internet of Things (IOT)

150
Q

Instead of analog phone line or the POTS

A relatively complex embedded system
- Can be relatively important

Each device is a computer
- Separate boot process
- Individual configurations
- Different capabilities and functionalities

A

VoIP

151
Q

Heating, ventilation, and Air Conditioning
- Thermodynamics, fluid mechanics, and heat transfer

A complex science
- Not something you can properly design yourself
- Must be integrated into the fire system

PC manages equipment
- Makes cooling and heating decisions for workspaces and data centers

Traditionally not built with security in mind
- Difficult to recover from an infrastructure DoS

A

HVAC

152
Q

Flying vehicle
- No pilot on board

May be manually controlled from the ground
- Often with some autonomy
- Set it and forget it

Extensive commercial and non-commercial use
- May require federal licenses
- Security and fail-safes are required

Quickly cover large areas
- More than just one building

More than physical security
- Site surveys, damage assessments

On-board sensors
- Motion detection
- Thermal sensors

Video evidence
- High resolution video capture

A

Drones

153
Q

All-in-one or multifunction devices (MFD)
- Everything you need in one single device

No longer a simple printer
- Very sophisticated firmware

Some images are stored locally on the device
- Can be retrieved externally

Logs are stored on the device
- Contain communication and fax details

A

Multi-Function Printers

154
Q

An operating system with a deterministic processing schedule
- No time to wait for other processes
- Industrial equipment, automobiles
- Military environments

Extremely sensitive to security issues
- Non-trivial systems
- Need to always be available
- Difficult to know what type of security is in place

A

RTOS (Real-Time Operating System)

155
Q

Video/audio surveillance
- Embedded systems in the cameras and the monitoring stations

Secure the security system
- Restrict access from others - Prevent a denial of service

Physically difficult to replace cameras
- Accessible independently over the network
- May allow for firmware upgrades

A

Surveillance systems

156
Q

Fifth generation cellular networking
- Launched worldwide in 2020

Significant performance improvements
- At higher frequencies
- Eventually 10 gigabits per second
- Slower speeds from 100-900 Mbit/s

Significant IoT impact
- Bandwidth becomes less of a constraint
- Larger data transfers
- Faster monitoring and notification
- Additional cloud processing

A

5G

157
Q

A universal integrated circuit card

Used to provide information to a cellular network provider - Phones, tablets, embedded systems

Contains mobile devices
- IMSI (international Mobile Subscriber Identity)
- Authentication information, contact information

Important to manage
- Many embedded systems, many SM cards

A

Subscriber Identity module (SIM)

158
Q

Communicate analog signals over a narrow range of frequencies
- Over a longer distance - Conserve the frequency use

Many IOT devices can communicate over long distances
- SCADA equipment - Sensors in oil fields

A

Narrowband

159
Q

Generally a single cable with a digital signal
- Can be fiber or copper

The communication signal uses all of the bandwidth
- Utilization is either 0% or 100%

Bidirectional communication
- But not at the same time using the same wire/fiber

Ethernet standard - 100BASE-TX, 1000BASE-T, 10GBASE-T

A

Baseband

160
Q

Internet of Things networking
- Open standard - IEEE 802.15.4 PAN

Alternative to WiFi and Bluetooth
- Longer distances than Bluetooth
- Less power consumption than WiFi

Mesh network of all these devices in your home
- Light switch communicates to light bulbs
- Tell Amazon Echo to lock the door

Uses the ISM band
- Industrial, Scientific, and Medical
- 900 MHz and 2.4 GHz frequencies in the US

A

Zigbee

161
Q

May not have access to a main power source
- Batteries may need to be replaced and maintained

A

Power Constraint (Embedded Systems)

162
Q

Low-power CUs are limited in speed
- Cost and heat considerations

A

Compute Constraint (Embedded Systems)

163
Q

May not have the option for a wired link

May be in the middle of a field

Wireless is the limiting factor

A

Network Constraint (Embedded Systems)

164
Q

Limited hardware options

Difficult to change or modify cryptography features

A

Crypto Constraint (Embedded Systems)

165
Q

Some IoT devices have no field-upgradable options

Upgrade options may be limited or difficult to install

A

Inability to Patch Constraint (Embedded Systems)

166
Q

Security features are often an afterthought
- Limited options, no multi-factor, limited integration with existing directory services

A

Authentication Constraint (Embedded Systems)

167
Q

Purpose-built - usually does one thing very well

May not provide much additional functionality

A

Range Constraint (Embedded Systems)

168
Q

Single-purpose functionality comes at a low cost

Low cost may affect product quality

A

Cost Constraint (Embedded Systems)

169
Q

Limited access to the hardware and software

Difficult to very the security posture

A

Implied trust Constraint (Embedded Systems)

170
Q

Prevent access
- There are limits to the prevention

Channel people through a specific access point
- And keep out other things
- Allow people, prevent cars and trucks

Identify safety concerns
- And prevent injuries

Can be used to an extreme
- Concrete barriers
- Moats

A

Barricades / Bollards

171
Q

All doors normally unlocked
- Opening one door causes others to lock

All doors normally locked
- Unlocking one door prevents others from being unlocked

One open door / other locked
- When one is open, the other cannot be unlocked

One at a time, controlled groups
- Managed control through an area

A

Access control vestibules

172
Q

Circuit-based
- Circuit is opened or closed
- Door, window, fence
- Useful on the perimeter

Motion detection
- Radio reflection or passive infrared
- Useful in areas not often in use

Duress
- Triggered by a person - The big red button

A

Alarms

173
Q

Clear and specific instructions
- Keep people away from restricted areas
- Consider visitors

Consider personal safety
- Fire exits
- Warning signs
- Chemicals
- Construction
- Medical resources

Informational
- In case of emergency, call this number

A

Signs

174
Q

CCTV (Closed Circuit television)
- Can replace physical guards

Camera features are important
- Motion recognition can alarm and alert when something moves
- Object detection can identify a license plate or person’s face

Often many different cameras
- Networked together and recorded over time

A

Video surveillance

175
Q

Conceal an important facility in plain sight
- Blends in to the local environment

Protect a data center
- No business signs
- No visual clues
- Surround it with a water feature
- Install a guard gate
- Planters out front are bollards

A

Industrial camouflage

176
Q

Physical protection at the reception area of a facility

Validates identification of existing employees

Provides guest access

A

Security guard

177
Q

Two-person integrity/control
- Minimize exposure to an attack
- No single person has access to a physical asset

A

Two person integrity/control

178
Q

Biometric authentication
- Fingerprint, retina, voiceprint

Usually stores a mathematical representation of your biometric
- Your actual fingerprint isn’t usually saved

Difficult to change
- You can change your password
- You can’t change your fingerprint

Used in very specific situations
- Not foolproof

A

Biometrics

179
Q

Conventional - Lock and key

Deadbolt - Physical bolt

Electronic - Keyless, PIN

Token-based
- RFID badge, magnetic swipe card, or key fob

Biometric - Hands, fingers, or retina

Multi-factor - Smart card and PIN

A

Door access controls

180
Q

Temporary security
- Connect your hardware to something solid

Cable works almost anywhere
- Useful when mobile

Most devices have a standard connector
- Reinforced notch

Not designed for long-term protection
- Those cables are pretty thin

A

Cable locks

181
Q

Don’t connect to unknown USB interfaces
- Even if you need a quick charge
- Prevent “juice jacking”

Allow the voltage, reject the data

Use your power adapter
- Avoid the issue entirely

A

USB data blocker

182
Q

More light means more security
- Attackers avoid the light
- Easier to see when lit
- Non IR cameras can see better

Specialized design
- Consider overall light levels
- Lighting angels may be important
- Facial recognition
- Avoid shadows and glare

A

Proper lighting

183
Q

Build a perimeter
- Usually very obvious
- May not be what you’re looking for

Transparent or opaque
- See through the fence (or not)

Robust
- Difficult to cut the fence

Prevent climbing
- Razor wire
- Build it high

A

Fencing

184
Q

Electronics require unique responses to fire
- Water is generally a bad thing

Detection
- smoke detector, flame detector, heat detector

Suppress with water
- Where appropriate

Suppress with chemicals
- Halon - No longer manufactured
- Destroys ozone
- Commonly replaces with Dupont FM-200

A

Fire suppression

185
Q

Motion detection
- Identify movement in an area

Noise detection
- Recognize an increase in sound

Proximity reader
- Commonly used with electronic door locks
- Combined with an access card

Moisture detection
- Useful to identify water leaks

Temperature
- Monitor changes over time

A

Sensors

186
Q

Mesh of conductive material
- The cage cancels the electromagnetic field’s effect on the interior
- The window of a microwave oven

Not a comprehensive solution
- Not all signal types are blocked
- Some signal types are not blocked at all

Can restrict access to mobile networks
- Some very specific contingencies would need to be in place for emergency calls

A

Faraday cage

187
Q

Formerly known as a demilitarized zone (DMZ)
- An additional layer of security between the internet and you
- Public access to public resources

A

Screened subnet

188
Q

Protected Distribution System (PDS)
- A physically secure cable network

Protect your cables and fibers
- All of your data flows through these conduits

Prevent cable and fiber taps
- Direct taps and inductive taps

Prevent cable and fiber cuts
- A physical denial of service (DoS)

Hardened protected distribution system
- Sealed metal conduit, periodic visual inspection

A

Protected cable distribution

189
Q

Physically secure the data
- As important as the digital security

An important part of a security policy
- Not a question to leave unanswered

Secure active operations
- Prevent physical access to the systems

Secure offline data
- Backups are an important security concern

A

Secure areas

190
Q

Physical separation between networks
- Secure network and insecure network
- Separate customer infrastructures

Most environments are shared
- Shared routers, switches, firewalls
- Some of these are virtualized

Specialized networks require air gaps
- Stock market networks
- Power systems/SCADA
- Airplanes
- Nuclear power plant operations

A

Air gap

191
Q

A secure reinforced room

Store backup media

Protect from disaster or theft

Often onsite

A

Vault

192
Q

Similar to a vault, but smaller

Less expensive to implement

Space is limited - install at more locations

A

Safe

193
Q

Data centers
- Lots and lots of equipment
- This equipment generates heat

Optimize cooling
- Keep components at optimal temperatures

Conserve energy
- Data centers are usually very large rooms
- Focus the cooling
- Lower energy costs

A

Hot and cold aisles

194
Q

Disposal becomes a legal issue
- Some information must not be destroyed
- Consider offsite storage

You don’t want critical information in the trash
- People really do dumpster dive
- Recycling can be a security concern
- Physically destroy the media

Reuse the storage media
- Sanitize the media for reuse
- Ensure nothing is left behind

A

Data destruction and media sanitization

195
Q

Shredder / pulverizer
- Heavy machinery, complete destruction

Drill / Hammer
- Quick and easy - Platters, all the way through

Electromagnetic (degaussing)
- Removing the magnetic field
- Destroys the drive data and renders the drive unusable

Incineration - Fire hot

A

Physical destruction

196
Q

The algorithm used to encrypt and/or decrypt

A

cipher

197
Q

Add the key to the cipher to encrypt

Larger keys are generally more secure

Some encryption methods use one key
- Some use more than one key
- Every method is a bit different

A weak key is a weak key
- By itself, it’s not very secure

Make a weak key stronger by performing multiple processes
- Hash a password. Hash the hash of the password. Continue
- Key stretching, key strengthening

Brute force attack would require reversing each of those hashes
- The attacker has to spend much more time, even though the key is small

There’s very little that isn’t known about the cryptographic process
- The algorithm is usually a known entity
- The only thing you don’t know is the key

Key determines the output
- Encrypted data
- Hash value
- Digital signature

Keep your key private
- It’s the only thing protecting your data

A

Cryptographic keys

198
Q

Already built for your application
- No additional programming involved

A

Key stretching libraries

199
Q

Powerful cryptography has traditionally required strength
- A powerful CPU and lots of time

Internet of Things (IoT) devices have limited power
- Both watts and CPU

New standards are being created
- National Institute of Standards and Technology (NIST) leading the effort
- Provide powerful encryption
- Include integrity features
- Keep costs low

A

Lightweight cryptography

200
Q

Encrypted data is difficult to work with
- Decrypt the data
- Perform a function
- Encrypt the answer

Perform calculations of data while it’s encrypted

Perform the work directly on the encrypted data

The decrypted data can only be viewed with a private key

Many advantages
- Securely store data in the cloud
- Perform research on data without viewing the data

A

Homomorphic encryption (HE)

201
Q

A single, shared key
- Encrypt with the key
- Decrypt with the same key
- If it gets out, you’ll need another key

Secret key algorithm
- A shared secret

Doesn’t scale very well
- Can be challenging to distribute

Very fast to use
- Less overhead than asymmetric encryption
- Often combined with asymmetric encryption

A

Symmetric encryption

202
Q

Public key cryptography
- Two (or more) mathematically related keys

Private key - Keep this private

Public key - Anyone can see this key - Give it away

The private key is the only key that can decrypt data encrypted with the public key
- You can’t derive the private key from the public key

Everyone can have the public key
- Only Alice has the private key

A

Asymmetric encryption

203
Q

Need large integers composed of two or more large prime factors

Instead of numbers, use curves
- Use smaller keys than non-ECC asymmetric encryption
- Smaller storage and transmission requirements
- Perfect for mobile devices

A

Elliptical curve cryptography (ECC)

204
Q

Represent data as a short string of text - A message digest

One-way trip
- Impossible to recover the original message from the digest
- Used to store passwords / confidentiality

Verify a downloaded document is the same as the original
- Integrity

Can be a digital certificate
- Authentication, non-repudiation, and integrity

Will not have a collision (hopefully)
- Different messages will not have the same hash

A

Hashes

205
Q

Verify a downloaded file
- Hashes may be provided on the download site
- Compare the downloaded file hash with the posted hash value

Password storage
- Instead of storing the password, store a salted hash
- Compare hashes during the authentication process
- Nobody ever knows your actual password

A

Practical hashing

206
Q

Random data added to a password when hashing

Every user gets a random of these
- Commonly stored with the password

Rainbow tables won’t work with these hashes
- Additional random values added to the original password

This slows down the brute force process
- It doesn’t completely stop the reverse engineering

Each user gets a different random hash
- The same password creates a different hash

A

Salting

207
Q

Prove the message was not changed
- Integrity

Prove the source of the message
- Authentication

Make sure the signature isn’t fake
- Non-repudiation

Sign with the private key
- The message doesn’t need to be encrypted
- Nobody else can design this

Verify with the public key
- Any change in the message will invalidate the signature

A

Digital signature

208
Q

Larger keys tend to be more secure
- Prevent brute-force attacks
- Attackers can try every possible key combination

Symmetric encryption
- 128-bit or larger symmetric keys are common
- These numbers get larger as time goes on

Asymmetric encryption
- Complex calculations of prime numbers
- Larger keys than symmetric encryptions
- Common to see key lengths of 3,072 bits or larger

A

Key strength

209
Q

A logistical challenge

Out-of-band key exchange
- Don’t send the symmetric key over the ‘net’
- Telephone, courier, in-person, etc

In-band key exchange
- It’s on the network
- Protect the key with additional encryption
- Use asymmetric encryption to deliver a symmetric key

A

Key exchange

210
Q

Use public and private key cryptography to create a symmetric key
- Math is powerful

A

Symmetric key from asymmetric keys

211
Q

Change the method of key exchange
- Don’t use the server’s private RSA key

Elliptic curve or Diffie-Hellman ephemeral
- The session keys aren’t kept around

Can’t decrypt with the private key server
- Every session uses a different private key for the exchange

Requires more computing power
- Not all servers choose to use this

The browser must support this
- Check your SSL/TLS information for details

A

Perfect Forward Secrecy (PFS)

212
Q

Hide information inside of an image

Message is invisible
- But it’s really there

The covertext
- The container document or file

A

Steganography

213
Q

Modify the digital audio file

Interlace a secret message within the audio

Similar technique to image steganography

A

Audio steganography

214
Q

A sequence of images

Use image steganography on a larger scale

Manage the signal to noise ratio

Potentially transfer much more information

A

Video steganography

215
Q

Computers based on quantum physics
- This is not an upgrade to your existing computer
- This is a new computing technology

Classical mechanics
- Smaller form of information is a bit
- Bits are zeros and ones

Quantum mechanics
- Smallest form of information is a qubit
- Bits are zeros, ones, and any combination in-between, at the same time
- This is called quantum superposition

Search quickly through large databases
- Index everything at the same time

Simulate the quantum world
- Medical advances, weather prediction, astrophysics, and much more

A

Quantum computing

216
Q

Breaks our existing encryption mechanisms
- Quickly factor large prime numbers

This would cause significant issues
- None of the existing cryptography could be trusted
- No financial transactions would be safe
- No data would be private

Peter Shor invented Shor’s algorithm in 1994
- Given an integer N, find its prime factors
- Traditional computers would take longer than the lifetime of the universe
- Shor’s algorithm would theoretically by much, much faster

  • Time for updated cryptography
  • Not vulnerable to quantum computer based attacks
A

Post-quantum cryptography

217
Q

Protection against eavesdropping using quantum cryptography
- Quantum Key Distribution (QKD)

Create unbreakable encryption
- Send a random stream of qubits (the keys) across a quantum network channel

Both sides can verify the key
- If it’s identical, the key was not viewed during transmission

An attacker eavesdropping on the communication would modify the data stream
- That attacker would have to violate quantum physics

A

Quantum communication

218
Q

Encryption is done one bit or byte at a time
- High speed, low hardware complexity

Used with symmetric encryption
- Not commonly used with asymmetric encryption

The starting state should never be the same twice
- Key is often combined with an initialization vector (IV)

A

Stream ciphers

219
Q

Encrypt fixed-length groups
- Often 64-bit or 128-bit blocks
- Pad added to short blocks
- Each block is encrypted or decrypted independently

Symmetric encryption

A

Block ciphers

220
Q

A popular mode of operation - Relatively easy to implement

Each plaintext block is XORed with the previous ciphertext block
- Adds additional randomization
- Use an initialization vector for the first block

A

Cipher Block Chaining (CBC)

221
Q

Block cipher mode / acts like a stream cipher
- Encrypts successive values of a “counter”

Plaintext can be any size, since it’s part of the XOR, 8 bits at a time (streaming) instead of a 128-bit block

A

Counter (CTR)

222
Q

Encryption with authentication
- Authentication is part of the block mode
- Combines Counter Mode with Galois authentication

Minimum latency, minimum operation overhead
- Very efficient encryption and authentication

Commonly used in packetized data
- Network traffic security (wireless, IPsec)
- SSH, TLS

A

Galois/Counter Mode (GCM)

223
Q

A distributed ledger
- Keep track of transactions

Everyone on this network maintains the ledger
- Records and replicates to anyone and everyone

Many practical applications
- Payment processing
- Digital identification
- Supply chain monitoring
- Digital voting

Steps:
1. A transaction is requested. The transaction could be any digital transaction from transferring Botcoins, medical records, data backups, to transferring house title information
2. The transaction is sent to every computer, or not, in a decentralized network to be verified
3. The verified transaction is added to a new block of data containing other recently verified transactions
4. A secure code, called a Hash, is calculated from the previous blocks of transaction data in this. The hash is assed to the new block of verified transactions
5. The block is added to the end of this which is then updated to all nodes in the network for security. The transaction is complete
6. If any blocks are altered, its hash and all following hashes in the chain are automatically recalculated. The altered chain will no longer match the chains stored by the rest of the network, and will be rejected

A

Blockchain

224
Q

Mobile devices, portable systems

Smaller symmetric key sizes

Use elliptic curve cryptography (ECC) for asymmetric encryption

A

Low power devices

225
Q

Fast computation time
- Symmetric encryption, smaller key sizes

A

Low latency

226
Q

Larger key sizes

Encryption algorithm quality

Hashing provides data integrity

A

High resiliency

227
Q

Secrecy and privacy

Encryption (file-level, drive-level, email)

A

Confidentiality use case

228
Q

Prevent modification of data

Validate the contents with hashes

File downloads, password storage

A

Integrity use case

229
Q

Modern malware

Encryption data hides the active malware code

Decryption occurs during execution

A

Obfuscation use case

230
Q

Password hashing

Protect the original password

Add salt to randomize the stored password hash

A

Authentication use case

231
Q

Confirm the authenticity of data

Digital signature provides both integrity and non-repudiation

A

Non-Repudiation

232
Q

Cryptography adds overhead

A system needs CPU, CPU needs power

More involved encryption increases the load

A

Speed

233
Q

Typical block ciphers don’t increase the size of encrypted data

AES block size is 128 bits/16 bytes

Encrypting 8 bytes would potentially double the storage size

A

Size (Cryptography limitation)

234
Q

Larger keys are generally more difficult to brute force

The weak IV in RC4 resulted in the WEP security issues

A

Weak keys (Cryptography limitation)

235
Q

Encryption and hashing takes time

Larger files take longer

Asymmetric is slower than symmetric

A

Time (Cryptography limitation)

236
Q

A specific cryptographic technology can becomes less secure over time

Smaller keys are easier to brute force, larger keys take longer to process

Key retirement is a good best practice

A

Longevity (Cryptography limitation)

237
Q

Random numbers are critical for secure cryptography

Hardware random number generators can be predictable

A passphrase needs to be appropriately random

A

Predictability and entropy

238
Q

Reusing the same key reduces complexity

Less cost and effort to recertify keys

Less administrative overhead

If the key is compromised, everything using that key is at risk

IoT devices often have keys embedded in the firmware

A

Key reuse (Cryptography limitation)

239
Q

IoT devices have limited CPU, memory, and power

Real-time applications can’t delay

Difficult to maintain and update security components

A

Resource vs. security constraints (Cryptography limitation)

240
Q

Rolls out tested changes into production automatically as soon as they have been tested

Automatically pushing a developer’s changes from the repository to the live environment where customers can use them

A

Continuous Deployment (CD)

241
Q

Ensures that software is released effectively when requested

Entails that an operations team can deploy a developer’s changes to a live production environment after they have been automatically checked for bugs and submitted to a repository

A

Continuous Delivery

242
Q

Provides a regularly updated list of proactive controls that are useful to review not only as a set of useful best practices, but also as a way to see how web application security threats change from year to year

A

Open Web Application Security Project (OWASP)

243
Q

Single board computers, which means they they have all the features of a computer system on a single board, including network connectivity, storage, video output, input, CPU, and memory

Capable computational platform that can run a variety of operating systems, including Linux and Windows

More likely to be found used for personal development or small-scale custom use rather than in broader deployment

A

Raspberry Pi

244
Q

Belong to a class of computer known as the microcontroller

Include a lower-power CPU with a small amount of memory and storage, and they provide input and output capabilities

Do not have a wireless or wired network built into them, thus reducing their attack surface because they lack direct physical access

A

Arduinos

245
Q

Remind authorized personnel that they are in a secure area and that others who are not authorized should not be permitted to enter and should be reported if they are seen

Serve as a deterrent controls

Can prevent those who might casually violate the rules this show

A

Signage

246
Q

Monitoring

Rounds / Periodic checks

An emerging technology

A

Robot sentries

247
Q

Measured in the amount of processing time required to defeat the cryptosystem

A

Key length

248
Q

A technique that is used to mitigate a weaker key by increasing the time
needed to crack it

WPA, WPA2, PGP, bcrypt, and other algorithms utilize this

A

Key stretching

249
Q

A cryptographic key that is generated for each execution of a key
establishment process

These keys are short-lived and used in the key exchange for WPA3
to create perfect forward secrecy

A

Ephemeral

250
Q

A record-keeping system that maintains participants’ identities in secure
and anonymous form, their respective cryptocurrency balances, and a
record book of all the genuine transactions executed between network
participants

A permissioned blockchain is used for business transactions and
promotes new levels of trust and transparency using
this

A

Public ledger