Areas of focus Flashcards
An authentication mechanism that involves receiving a one-time use shared secret password that does expire
Time-based One-Time Password (TOTP)
Command used in forensic data acquisition to forensically create a bit by bit copy of a hard drive to a disk image
dd
GNU Privacy Guard (GPG)
Asymmetric - A newer and updated version of the PGP encryption suite that uses AES for its symmetric encryption functions
Blowfish
Symmetric - Block cipher that uses 64-bit blocks and a variable length encryption key to encrypt plaintext into ciphertext
International Data Encryption Algorithm (IDEA) -
Symmetric - block cipher which uses 64-bit blocks to encrypt plaintext into ciphertext
Elliptic Curve Cryptography (ECC)
Asymmetric - Algorithm that is based upon the algebraic structure of elliptic curves over finite fields to define the keys. With a 256-bit key is just as secure as RSA with a 2048-bit key. Most commonly used for mobile devices and low-power computing
Asymmetric Algorithms are known as…
Public Key Cryptography
Triple DES (3DES) -
Symmetric - Encryption algorithm which uses three separate symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES
Used to perform the sanitization of flash-based devices such as SSDs or USB devices
Secure Erase utility
A network traffic filter that controls incoming and outgoing traffic.
Access Control List
The order of volatility for evidence collection
Processor cache, RAM, Swap File, Hard/removable drive
Primary role is to ensure that the organization processes sensitive personal data in compliance with applicable data protection rules
Data protection officer
Overwriting a storage device by setting all bits to the value of zero. Not as effective on SSDs or hybrid drives, and takes a longer amount of time.
Zero-fill utility
An access model that is controlled by the system but utilizes a set of permissions instead of a single data label to define the permission level
Role-Based Access Control (RBAC)
Algorithm that creates a fixed-length 160-bit hash value unique to the input file
Secure Hash Algorithm (SHA-1)
Occurs when the outcome from an execution process is directly dependent on the order and timing of certain events. Those events fail to execute in the order and timing intended by the developer
Race condition
Diffie-Hellman
Asymmetric - Used to conduct key exchanges and secure key distribution over an unsecured network. Used for the establishment of a VPN tunnel using IPSec
Twofish
Symmetric - block cipher that replaced blowfish and uses 128-bit blocks and a 128-bit, 192-bit, or 256-bit encryption key to encrypt plaintext into ciphertext
Act of removing data in such a way that it cannot be reconstructed using any known forensic techniques
Purging (Sanitizing)
Rivest Cipher (RC4)
Symmetric - stream cipher using a variable key size from 40-bits to 2048-bits that is used in SSL and WEP
A software development method where application and platform requirements are frequently tested and validated for immediate availability. A human is still required to approve the release into the production environment.
Continuous Delivery
Database used for managing the entities in a communication network
Management information base (MIB)
A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion: Recon, Weaponization, Delivery, Exploitation, Installation, C2, Actions on Objectives
Kill Chain Framework
A knowledge base maintained for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures
MITRE ATT&CK Framework