Architecture & Design Flashcards
Penalty Types
Criminal
Civil
Administrative
Private Regulations
Sources of Industry Standards
Vendors
Government Agencies
Independent/Consulting Agencies
Define Defense in Depth
Multiple layers of overlapping security controls
Security Control Types by Method
Technical
Administrative
Physical
Examples of Technical Controls
DLP Systems
NIDS/NIPS
Firewall
Examples of Administrative Controls
Background Investigations
NDAs
Security Training and Awareness
Examples of Physical Controls
Fences/Cages Locks Smart Cards Man Traps Video Surveillance Bollards Lighting Signs
Vendor Diversity Issues
Lack of Innovation
Technical Inefficiencies
Security Training and Awareness Methods
Classroom Orientation Online Vendor Surveys Reminders
Information Classification Factors
Sensitivity
Criticality
Military Classification System
Top Secret
Secret
Confidential
Unclassified
Business Classification
Highly Sensitive
Sensitive
Internal
Public
Compliance Obligations
Laws
Regulations
Standards
Password Factors
Complexity Length History Minimum age Expiration
Define Tailgating/Piggybacking
Unauthorized access to a facility by following another credentialed user when they enter
Security Zones
Intranet Internet DMZ Extranets Honeynets Ad Hoc MANET WIFI Direct
Define Intranet
Companies internal network
Define Internet
Public external network
Define DMZ
Demilitarized Zone, typically an organizations public facing assets separated from internal assets for security purposes
Define Extranets
Shared networks between separate organizations
Define Honeynets
Decoy networks for gaining threat intelligence on attackers
Define Ad Hoc Networks
Temporary networks for specific usage
Private IP Address Ranges
- 0.0.1-10.255.255.255
- 16.0.1-172.31.255.255
- 168.0.1-192.168.255.255
Define Static NAT
Translate private to public IP addresses (or visa versa) on a one-to-one basis
Define Dynamic NAT
Translate private to public IP addresses (or visa versa) over multiple public and/or private addresses
Define PAT
Port Address Translation, allows systems to share a public IP address over ports
Convert 192.168.1.0/24 to Subnet Mask Notation
IP Address 192.168.1.0
Subnet Mask 255.255.255.0
Define SDN
Software Defined Networking
SDN Layers
Application Layer
Control Layer
Physical Layer
Database Encryption Types at Rest
HSM
TPM
SED
UEFI Features
Secure Boot
Remote Attestation
Hardware Root of Trust
Software Deployment Environments
Developer
Test
Staging
Production
Embedded Systems Benefits
Cost
Size
Manageability
ICS Types
SCADA
DCS
PLC
Define ICS
Industrial Control Systems
Define SCADA
Supervisory Control and Data Acquisition; remote monitoring, telemetry, and report back
Define DCS
Distributed Control Systems; process control
Define PLC
Programmable Logic Controller; specialized input/output for human interaction
Define IoT
Internet of Things; smart tech for general consumer goods
IoT Protection Methods
Firmware Updates Security Wrappers Segmentation Air Gap Application Firewalls
Define Air Gap
Networks with no external network connection
Development Methodologies
Waterfall
Spiral
Agile
Explain the Waterfall Model
Rigid step based process
Explain the Spiral Model
Phased approach; Determine requirements, risks, begin, develop and test
Explain the Agile Model
Flexible approach for external input integration
Software Capitalization Maturity Model
Initial Repeatable Defined Managed Optimizing
IDEAL Model
Initializing Diagnosing Establishing Action Learning
Purpose of Code Repositories
Store code Coordination Version Control Code Reuse Avoid Dead Code
Code Signing Process
Obtain Digital Certificate
Assign key to code
OS verifies hash of code with CA
Software Testing Types
Stress test
UAT
Regression Testing
Define Software Stress Testing
Testing using automated scripts for multiple and/or simultaneous input validation
Define UAT
User Acceptance Testing, also referred to as “Beta testing”
Define Regression Testing
Correctional bug fixes
Checking for accidental changes
Fagen Inspection Steps
Planning Overview Preparation Meeting Rework Follow Up
Define Static Software Testing
Examine code for common errors without executing script
Define Dynamic Software Testing
Execute code with provided inputs
Define Fuzzing
Expose security problems by providing invalid, unexpected, or random data inputs
Fuzzing Input Methods
Developer supplied
Script Generation
Mutation testing
Code Execution Types
Interpreted
Compiled
Define Interpreted Code
Code executed as written
Define Compiled Code
Code compiled into an executable file