architecture and design Flashcards

1
Q

What is data masking?

A

data masking refers to a technique used to protect sensitive or confidential information by partially or fully concealing certain portions of the data. The purpose of data masking is to preserve the usability of the data for testing, development, or analysis purposes while ensuring that sensitive information is not exposed to unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Partial Masking

A

This is replacing part of the data value, such as replacing every number in a credit card number with “X” except the last four digits. This is useful when you don’t need full access to the entire data value, but unlike encrypted data, it is impossible to unmask. Prevent unauthorized users from viewing personal data. Block spam bots from gaining access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dynamic Masking

A

dynamic data masking is a data anonymization technique that limits sensitive data exposure by masking it for all non-authorized users or even QA and development teams that needs data to test.

Dynamic data masking allows data teams to specify the type and extent of sensitive data non-authorized users can access.

Dynamic data masking (DDM) aims to replace sensitive data in transit leaving the original at-rest data intact and unaltered.

Unlike SDM, DDM applies masking techniques at query-time, and does not involve moving, copying, or separating the data from its original source. This helps teams avoid any confusion and silos around data copies that have been scrubbed and masked for different reasons. It also remains updated and “live,” which is critical for analytics.

Since DDM is not tied to where the data is copied or stored, it is often considered to be the most widely-applicable type of masking. It also easily scales to more complex policy scenarios and use cases, making compliance much easier to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

A

Encryption is the process of converting plaintext data into ciphertext using an algorithm and a cryptographic key. The ciphertext can only be decrypted and read by individuals or systems with the appropriate decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At rest

A

the term “at rest” refers to the state of data when it is not actively being used or transmitted. Data at rest is typically stored on physical or digital media, such as hard drives, solid-state drives, magnetic tapes, or any other storage device. The concept of data at rest is important in the context of information security, and securing data at rest is a key aspect of safeguarding sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data in transit/motion?

A

refers to the state of data when it is actively being transmitted or moved from one location to another. Data in transit is in motion, traveling over a network or communication channel between two or more devices.

Securing data in transit is crucial to maintaining the confidentiality and integrity of information as it traverses networks. This can include data transferred over the internet, intranets, extranets, or any other network infrastructure.

Unsecured data in transit is susceptible to various forms of attacks, such as man-in-the-middle attacks. One of the primary methods for securing data in transit is the use of encryption.

The use of secure communication protocols, such as HTTPS (Hypertext Transfer Protocol Secure) for web traffic or VPN (Virtual Private Network) connections, enhances the security of data in transit. These protocols incorporate encryption and authentication mechanisms. TLS/SSL: Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communication over a computer network. They are widely used to secure data in transit, especially in web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Signatures

A

A type of electronic signature that encrypts the document.

Digital signatures can be used to verify the authenticity and integrity of data in transit. A digital signature ensures that the data has not been altered during transmission and that it originates from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tokenization

A

replaces a sensitive data element, for example, a bank account number, with a non-sensitive substitute, known as a token. The token is a randomized data string that has no essential or exploitable value or meaning.

When a retailer or merchant processes a customer’s credit card, the PAN is replaced with a token. 1111-2222-3333-4444 is substituted by alternatives such as Gb&t23d%kl0U. The merchant may use the token ID to maintain client records; for example, Gb&t23:%kl0U is associated with Jane Doe. The token subsequently goes to the payment processor, who de-tokenizes the ID and verifies the payment. The notation for Gb&t23d%kl0U is 1111-2222-3333-4444. The token is solely readable by the payment processor; it has no value to anybody else. Additionally, the token may only be used with that specific merchant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rights management

A

In the context of the Security+ exam, “rights management” typically refers to Digital Rights Management (DRM) or Information Rights Management (IRM). Digital Rights Management is a broader term used to control access to digital content, whereas Information Rights Management is more specific to securing and controlling access to documents and sensitive information within organizations.Encryption is often a key component of rights management. It ensures that even if unauthorized access occurs, the content remains unreadable without the proper decryption keys. This is crucial for protecting sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DRM

A

DRM is commonly used to protect digital media, such as music, videos, e-books, and software. It helps prevent unauthorized copying, distribution, and use of copyrighted materials. Apple’s iTunes store uses DRM to limit how many devices customers can use to listen to songs. Audio files that users download from iTunes include data about their purchase and usage of songs. This prevents the files from being accessed on unauthorized devices. Apple also protects the content in its iBooks store with FairPlay technology, which ensures books can only be read on iOS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does IRM applies to?

A

Unlike traditional Digital Rights Management (DRM) that applies to mass-produced media like songs and movies, IRM applies to documents, spreadsheets, and presentations created by individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Geographical consideration

A

Giographical consideration refer to factors and practices related to the physical locations and environments in which information technology (IT) systems and assets are deployed.

Geographical considerations encompass a range of aspects, including:

physical security,
environmental conditions,
regulatory requirements,
and disaster recovery planning.

Evaluating and securing physical locations where IT equipment is housed, such as data centers, server rooms, or network closets.

Maintaining optimal environmental conditions within data centers to ensure that IT equipment operates reliably. Implementing fire suppression systems to protect IT equipment from potential fire hazards and minimize the risk of data loss or hardware damage. Extreme temperatures or humidity can adversely affect hardware performance. Implementing redundancy across geographically dispersed locations to ensure business continuity and high availability in the event of a localized disaster or disruption.

Response and recovery controls – are measures and processes designed to address and mitigate the impact of security incidents and disruptions to normal business operations.

Incident response controls are proactive measures and plans put in place to detect, respond to, and recover from security incidents promptly. include the establishment of an incident response team, incident response plans, communication procedures, and tools for monitoring and detecting security incidents. This may involve intrusion detection systems, log analysis, and other monitoring mechanisms.

Business Continuity and Recovery Controls: focus on ensuring that critical business functions can continue or resume after a disruptive event. Business continuity controls include disaster recovery plans, backup and recovery procedures, redundant systems, and off-site data storage. Implementing redundancy in critical systems to ensure continuous operation in the event of hardware or software failures. Designing systems with high availability architectures to minimize downtime and ensure rapid recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSL

A

The primary purpose of SSL is to establish a secure and encrypted connection between a client (such as a web browser) and a server. SSL uses encryption algorithms to encrypt the data transmitted between the client and server. This encryption helps prevent unauthorized parties from intercepting and understanding the information being exchanged. While SSL was widely used, it has been succeeded by TLS, which is an updated and more secure version of the protocol. The terms SSL and TLS are often used interchangeably, and the Security+ exam may reference both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TLS

A

TLS stands for Transport Layer Security. TLS is a cryptographic protocol designed to secure communication over a computer network, ensuring the privacy and integrity of data exchanged between systems. It is the successor to the earlier Secure Sockets Layer (SSL) protocol, and the terms TLS and SSL are often used interchangeably. TLS employs encryption algorithms to secure the data transmitted between the client and server. This encryption helps prevent unauthorized interception and ensures that even if the data is intercepted, it remains unreadable without the appropriate decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hashing

A

It is a cryptographic hash function that uses md5 or SHA-256 to convert a string to a hash value.

It is a one-way function, meaning it is computationally infeasible to reverse the process and obtain the original input from the hash value.
Hashing is used to verify the integrity of data. By comparing the hash value of the original data with the hash value of the received or stored data, it can be determined whether the data has been altered or tampered with. Hashing is commonly used to store passwords securely. Hashing is a key component of digital signatures. In digital signatures, a hash value of a message is signed using a private key, and the recipient can use the corresponding public key to verify the authenticity and integrity of the message. To enhance security, a random value called a “salt” can be added to the input before hashing. Salting prevents attackers from using precomputed tables (rainbow tables) to quickly determine the original input.

Common cryptographic hash functions include MD5, SHA-1, SHA-256, and SHA-3. However, MD5 and SHA-1 are considered weak for security purposes, and SHA-256 and SHA-3 are commonly recommended for stronger security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

API considerations

A

API considerations refer to the security-related factors that should be considered when developing, implementing, or interacting with APIs.

Use strong authentication methods such as API keys, OAuth tokens, or other secure authentication protocols, implement input validation to prevent common vulnerabilities like SQL injection and cross-site scripting (XSS).

Validate and sanitize inputs received from clients before processing them to ensure data integrity.

Implement rate limiting and throttling mechanisms to prevent abuse, limit the number of requests a client can make in each timeframe, and protect against denial-of-service (DoS) attacks,

Design secure error-handling mechanisms Implement robust logging mechanisms to record API activities and monitor for any abnormal or potentially malicious behavior.

Use versioning to manage changes to APIs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Configuration Management

A

refers to the practice of managing and controlling changes to the configuration of the software, network, or the company’s information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Baseline configuration

A

known and stable state of the system. It serves as a reference point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Standard naming convention

A

there must be a consistent naming convention when labeling entities within an organization because it helps ensure consistency, clarity, and management within the entities of a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data loss prevention (DLP)

A

Data Loss Prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data. Organizations use DLP to protect and secure their data and comply with regulations.

For example, an Intrusion Detection System (IDS) can alert about attacker attempts to access to sensitive data. Antivirus software can prevent attackers from compromising sensitive systems. A firewall can block access from any unauthorized party to systems storing sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Masking

A

In the context of data protection, “masking” refers to a technique used to protect sensitive or confidential information by partially or fully concealing certain portions of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

hoax

A

Hoaxes are security threats that seem like they could exist but in fact are not real at all. But they consume a lot of time. A deceptive act or false information with the intention of deceiving or tricking somebody to get sensitive information. Spam filters can help, especially these days where you have cloud spam filters where other people who have already received this email can mark it is something that is malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Influence campaigns

A

a coordinated effort by different communication channels with the aim of shaping the perception and opinion, spreading propaganda or disinforming the target audience. These campaigns are from political groups or nation states. These acts can even be conducted in person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OSINT

A

Open-Source Intelligence refers to the practice of collecting and analyzing information from publicly available sources to gather intelligence. It does not involve unauthorized access. This is public information. They collect data from web sites, social platforms, govt records, online forums and more. They do whois lookups, dns records lookups. The adhere to ethical standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

hot sites

A

These are sites that are an exact replica of what we are running in our production environment. This means that we have duplicate hardware, duplicate servers, all of the equipment and infrastructure is duplicated.

26
Q

cold sites

A

A cold site is effectively the complete opposite of a hot site. This is effectively a room with a bunch of racks in it, and it has none of your equipment currently in place, none of your data, and none of your applications. This means that you’ll need to bring the data with you. Maybe there are backup tapes or backup drives that are used, and you bring all of that with you to the cold site. There are also no people at the cold site, so you have to make sure that you bring the personnel that will then be attending to all of these systems that you will be installing and running at the cold site.

27
Q

warm sites

A

A warm site is somewhere in the middle between a hot site and a cold site. Instead of being immediately ready to go or having nothing available, it’s usually a location that has racks and some equipment that you can at least get up and running in a relatively short period of time. They might provide servers or equipment for the infrastructure, and you would simply bring your configurations to plug in to their equipment.

28
Q

What are honeypots?

A

a honeypot refers to a security mechanism set up to detect, deflect, or study attempts at unauthorized use of information systems. Essentially, a honeypot is a decoy system or network that is designed to attract and trap potential attackers, allowing security professionals to monitor their activities and study their techniques.

29
Q

What are the two main types to honeypots?

A

Production Honeypots: These are deployed within a production network with the aim of diverting and detecting malicious activity. The production honeypot appears to be a legitimate part of the network, and any interactions with it are treated as potentially malicious.

Research Honeypots: These are deployed to gather information about the tactics, techniques, and procedures (TTPs) of attackers. Research honeypots are typically placed in a controlled environment separate from the production network. The goal is to observe and analyze the behavior of attackers without putting the production network at risk.

30
Q

How do security professionals use honeypots?

A

honeypots lures attackers so security teams can detect and analyze unauthorized activities.

Study Tactics: Honeypots help security experts understand the methods used by attackers, enabling them to better defend against emerging threats.

Divert and Delay Attackers: Honeypots can divert attackers from critical systems and provide an early warning system.

Understanding honeypots is important for the Security+ exam, as it demonstrates knowledge of proactive security measures and the ability to analyze and respond to security incidents.

31
Q

honeynets

A

are multiple honeypots

32
Q

honeyfiles

A

Inside your honeypots and honeynets, you are going to include your honeyfiles. This is attractive bait for the attackers like password.txt

33
Q

What is the purpose of masking?

A

The purpose of data masking is to preserve the usability of the data for testing, development, or analysis purposes while ensuring that sensitive information is not exposed to unauthorized individuals.

34
Q

What are common hash functions?

A

Common cryptographic hash functions include MD5, SHA-1, SHA-256, and SHA-3.

However, MD5 and SHA-1 are considered weak for security purposes, and SHA-256 and SHA-3 are commonly recommended for stronger security.

35
Q

What are techniques to for API considerations?

A

Use strong authentication methods such as API keys, OAuth tokens, or other secure authentication protocols,

implement input validation to prevent common vulnerabilities like SQL injection and cross-site scripting (XSS).

Validate and sanitize inputs received from clients before processing them to ensure data integrity.

Implement rate limiting and throttling mechanisms to prevent abuse, limit the number of requests a client can make in each timeframe, and protect against denial-of-service (DoS) attacks,

Design secure error-handling mechanisms Implement robust logging mechanisms to record API activities and monitor for any abnormal or potentially malicious behavior.

Use versioning to manage changes to APIs.

36
Q

How do you secure data in transit or motion?

A

Securing data in transit is crucial to maintaining the confidentiality and integrity of information as it traverses networks. This can include data transferred over the internet, intranets, extranets, or any other network infrastructure.Unsecured data in transit is susceptible to various forms of attacks, such as man-in-the-middle attacks. One of the primary methods for securing data in transit is the use of encryption. The use of secure communication protocols, such as HTTPS (Hypertext Transfer Protocol Secure) for web traffic or VPN (Virtual Private Network) connections, enhances the security of data in transit. These protocols incorporate encryption and authentication mechanisms. TLS/SSL: Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communication over a computer network. They are widely used to secure data in transit, especially in web applications.

How well did you know th

37
Q

How are IRM files protected?

A

IRM protects files from unauthorized copying, viewing, printing, forwarding, deleting, and editing. IRM generally encrypts files in order to enforce access policies. In some cases, this means a document can only be viewed and the user cannot copy/paste the content within the document. The permissions are stored in the document where they are authenticated by an IRM server.

38
Q

Difference between tokenization and encryption?

A

While tokenization and encryption are both methods used to protect sensitive data, they differ in their approach. Encryption involves transforming data into a ciphertext using an algorithm and key, while tokenization replaces data with a randomly generated token without the need for decryption.

39
Q

How are smishing attacks conducted?

A

In a smishing attack, cybercriminals send deceptive text messages to lure victims into sharing personal or financial information, clicking on malicious links, or downloading harmful software or applications. Just like email-based phishing attacks, these deceptive messages often appear to be from trusted sources, and they use social engineering tactics to create a sense of urgency, curiosity, or fear to manipulate the recipient into taking an undesired action.

40
Q

Active reconnsaissance

A

Actively gathering information or probing, where the tester is actively interacts with the system to gather information. This may be through automated scanning or manual testing using various tools like ping, traceroute, netcat etc

41
Q

IaaS

A

Infrastructure as a Service is a cloud computing model that provides virtualized computing resources over the Internet. With IAAS, organizations can rent virtualized hardware resources, such as virtual machines, storage, and networking, rather than investing in and maintaining physical hardware.

42
Q

SaaS

A

Software as a Service is a cloud computing model that delivers software applications over the Internet. Instead of installing and maintaining software on individual computers or servers, users can access the software through a web browser. SaaS is a popular deployment model for a variety of applications and services.

43
Q

PaaS

A

Platform as a Service is a cloud computing model that provides a platform allowing customers to develop, run, and manage applications without dealing with the complexities of building and maintaining the underlying infrastructure. PaaS offerings typically include development tools, runtime environments, and other services to facilitate the application development process.

44
Q

XaaS

A

is a generic term that stands for “Everything as a Service.” It is an umbrella term that encompasses various cloud computing service models, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS), among others. The “X” in XaaS is a variable that can represent different types of services.

The idea behind XaaS is to highlight the diverse range of services that can be delivered over the internet, covering not only infrastructure, platforms, and software but potentially any service that can be provided remotely. This includes services such as Security as a Service (SECaaS), Network as a Service (NaaS), Desktop as a Service (DaaS), and more.

45
Q

What is the difference between a community and a public cloud?

A

Community cloud and public cloud are both models of cloud computing, but they differ in terms of their user base and the level of sharing and customization allowed. Here are the key differences between a community cloud and a public cloud:

User Base:

Community Cloud: This type of cloud is shared among several organizations that have shared concerns, such as similar regulatory requirements, compliance issues, or security requirements. It is designed for a specific community of users rather than the general public.
Public Cloud: A public cloud is open for use by the general public. It serves a broad range of users, including individuals, businesses, and organizations. Resources in a public cloud are typically shared among a large and diverse user base.
Sharing and Customization:

Community Cloud: In a community cloud, resources are shared among a specific group of organizations with common interests. This allows for a higher degree of customization and tailoring to meet the specific needs of the community members.
Public Cloud: In a public cloud, resources are shared among a large number of users. Customization options are generally more standardized to cater to a broad user base. Individual users or organizations have less control over the underlying infrastructure.
Control and Security:

Community Cloud: Because a community cloud is shared among a specific community with common concerns, there may be a higher level of trust and collaboration. This can lead to a better ability to implement specific security measures and controls that are relevant to the community.
Public Cloud: In a public cloud, security measures are more standardized, and users have less direct control over the underlying infrastructure. Security is typically the responsibility of the cloud service provider, and users must rely on the provider’s security practices.
Costs and Ownership:

Community Cloud: The costs of a community cloud are often shared among the community members, making it potentially more cost-effective for organizations with shared needs. Ownership and management responsibilities may be distributed among the community members or a third-party provider.
Public Cloud: Costs in a public cloud are generally more scalable and based on usage. Users typically pay for the services they consume on a subscription or pay-as-you-go model. Ownership and management of the infrastructure rest with the cloud service provider.
Understanding these differences is crucial when considering the appropriate cloud deployment model for specific organizational needs and requirements. The choice between a community cloud and a public cloud depends on factors such as the nature of the workloads, regulatory compliance, and the level of control and customization required.

46
Q

What is a hybrid cloud?

A

A hybrid cloud is a computing environment that combines the use of on-premises infrastructure (private cloud) with public cloud services. It allows data and applications to be shared between them.

47
Q

What is a private cloud?

A

A private cloud refers to a cloud computing environment that is dedicated to a single organization.

48
Q

What is MSP?

A

A Managed Service Provider is an organization that remotely manages and provides various IT services to clients, typically on a proactive basis.

49
Q

What is MSSP?

A

MSSP stands for Managed Security Service Provider. An MSSP is an organization that provides outsourced security services to businesses or other organizations. These services are often delivered remotely and may include monitoring, managing, and responding to security events.

50
Q

What is fog computing?

A

Fog computing is an extension of cloud computing that brings computational resources (such as processing power, storage, and networking) closer to the source of data generation, which is typically at the edge of a network, rather than relying solely on centralized cloud servers.

51
Q

What are fog computing devices?

A

Smart transportation networks are another example of a fog computing application. Each connected vehicle, traffic device, and even street on this kind of grid generates a stream of data.

52
Q

Hybrid Cloud

A

A hybrid cloud is a computing environment that combines elements of both private and public clouds. It allows data and applications to be shared between them.

53
Q

private Cloud

A

a type of cloud computing deployment model in which computing resources are used exclusively by a single organization.

54
Q

community cloud

A

Shared by a specific community of organizations with common interests.

55
Q

public

A

a public cloud refers to a type of cloud computing deployment model where computing resources, such as virtual machines, storage, and applications, are hosted and provided to the general public or multiple organizations by a third-party service provider over the internet.

56
Q

TOTP

A

TOTP stands for Time-Based One-Time Password. TOTP is a type of two-factor authentication (2FA) mechanism that enhances the security of user authentication by requiring not only something the user knows (typically a password) but also something the user has (a time-based, temporary code).

57
Q

Features ot TOTP

A

Shared Secret: During the initial setup of two-factor authentication, a user and a server share a secret key. This key is often represented as a QR code that the user scans with a mobile authenticator app or a hardware token.

Time Synchronization: Both the server and the user device are synchronized to the current time. The synchronization is critical for the generation and validation of time-based codes.

One-Time Password Generation: The user’s device (often a smartphone with an authenticator app) generates a one-time password based on the shared secret and the current time. This password changes at regular intervals, typically every 30 seconds.

Authentication: When logging in, the user provides their regular password and the current one-time password generated by the authenticator app. The server, knowing the shared secret and the current time, can independently generate the expected one-time password and compare it to the one provided by the user.

Expiration: One-time passwords are short-lived and expire quickly, providing an additional layer of security. Even if an attacker intercepts a password, it becomes useless after a short period.

58
Q

HOTP

A

HOTP stands for HMAC-based One-Time Password. HOTP is a type of two-factor authentication (2FA) mechanism that adds an extra layer of security to user authentication. Like Time-Based One-Time Passwords (TOTP), HOTP is used to strengthen the authentication process by requiring users to provide a temporary code in addition to their regular password.

59
Q

Features of HOTP

A

Shared Secret: During the initial setup of two-factor authentication, a user and a server share a secret key. This secret key is typically a long, random value.

Counter: A counter value is maintained both on the user’s device (e.g., a hardware token or a mobile app) and on the server. The counter represents the number of times the one-time password has been generated.

Hashing Algorithm: HMAC (Hash-based Message Authentication Code) is used as the underlying cryptographic hash function. The combination of the secret key and the counter is hashed to generate a one-time password.

Authentication: When logging in, the user provides their regular password and the current one-time password generated by the device. The server, knowing the shared secret and the counter, independently generates the expected one-time password and compares it to the one provided by the user.

Counter Increment: After each successful authentication, the counter is incremented to ensure that each one-time password is unique.

60
Q

soft authentication token

A

refers to a type of authentication mechanism that generates one-time passwords (OTPs) using software rather than hardware. Soft tokens are commonly used in two-factor authentication (2FA) systems to enhance the security of user logins.