block 11 2 b + c Flashcards

1
Q

what is anti-virus (AV) software ?

A
  • Software scans computer files for presence of malicious
    code.

Too much affects computer’s performance, the software’s effectiveness, and can conflict with one another.

should be done at least once a week

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is Malicious logic/code (malware)?

A

Hardware, firmware, or software that is intentionally included or inserted in a system for a harmful purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is CATIII?

A

findings degrade measures to protect against loss of confidentiality, availability, or integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is CATII?

A

findings provide information about system, therefore have a high potential of allowing unauthorized access to an intruder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is CATI?

A

an indicator of the greatest risk and urgency.
The findings are those that allow an attacker to gain immediate access to a system or component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

why does DISA use STIGS?

A
  • to strengthen and assess the security posture of a system or component.
  • Findings from STIG are (CATs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is Unified Master Gold Disk (UMGD)?

A

running software to ensure compliance and discover any weaknesses in the system security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what do STIGS contain?

A

technical guidance to secure information systems/software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is risk mitigation?

A

Once the risks are identified, we can
appropriately choose to either avoid, mitigate, transfer, or accept the risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is Integrated Network Operations and Security Center (I-NOSC?

A

Their mission focus is to continuously ensure that systems are operational and fully capable.

personnel monitoring/supporting/responding to real time network events in the day to day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is incident response?

A

Many organizations have
dedicated teams responsible for investigating any computer security incidents that take place

called a Computer Incident Response
Team (CIRT)

a CSIRT(computer security incident response team)
is set up as the central body to handle responses.
A distributed model contains multiple teams whose responsibilities each cover a particular area of a unit, office, or organization.
Finally, a coordinated model
allows for a team or body of security personnel who relay the IRPs to the teams who are affected by each
incident.

As for the four phases of an IRP, they include:
1. Preparation
2. Detection and Analysis
3. Containment, Eradication, and Recovery
4. Post-Event Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is bluesnarfing?

A

act of hijacking and taking over a Bluetooth connection, typically done during the initialization vector upon pairing devices.
range 10-30 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is bluejacking?

A

is the act of sending unsolicited messages over a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is jamming?

A
  • electromagnetic energy is emitted on a wireless network’s frequencies. This attack causes the WAPs to become unusable by the network since the signals cannot be found or used

ranges 18 meters (60 feet)
and 70 meters (230 feet).

Jamming is a form of a wireless DoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is an evil twin?

A

an attack designed to fool people into logging into an AP typically over Wi-Fi

attempts to replicate or similarly name the Service Set Identifier (SSID), which is also known as the network name.

Those who connect to an evil twin will have their keystrokes recorded, and login information replicated in hopes of stealing that information to replay it later.

The evil twin attack is essentially a wireless phishing attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the 4 wireless attacks?

A
  • evil twin attack
    -jamming
  • blusnarfing
  • bluejacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a sensitive room?

A

is secure, sound-proofed, and protected, but only up to the classification of SECRET

Sensitive rooms can be used to contain highly classified documentation and equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is physical barriers and locks?

A

include fences, cages, physical locks, and mechanical locks.

Physical security also involves preventing unauthorized access to equipment, facilities, and systems.

bollards and mantraps. (found in front of storefronts, to prevent vehicles from driving into a building or pulling up to a building for quick on/offloading, blocking cameras, striking pedestrians, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is secure premises?

A

refers to protecting structures and equipment (including information and software) from theft, vandalism, natural and manmade disasters, and accidental damage.

methods and technologies such as barriers, mantraps, bollards, and secure doors are among the types used to secure and protect a building or premesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is physical security?

A

involves the protection of servers and the protection of clients to prevent physical intrusion.

measures include lockable server racks, near field
communication (NFC) access to server rooms, surveillance, access lists, and security guards.

Physical server protection also includes practices such as not walking away from a server while logged in and always logging off or locking the system when it’s not in-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is DDOS (denial of service attacks)?

A
  • attacks use multiple computers to attack a target.
    The controlled computers are called bots, wherein the set of bots being used together in an attack is called a botnet.
22
Q

what is fault tolerance?

A

property of a system that allows proper operation even if components
fail

23
Q

what is a public key?

A

unique key that is shared, so data can be encrypted and then sent to them.

24
Q

what is a private key?

A

keys that are unique to each individual. used to decrypt data encrypted by public key.

25
Q

what is PKC?

A

A form of cryptography that uses two related keys, a public key and a private key; the
two keys have the property that, given the public key, it is computationally infeasible
to derive the private key.

26
Q

what is asymmetric cryptography?

A

asymmetric means opposite

Cryptography uses two separate keys to exchange data
one to encrypt or one to decrypting data
one to digitally sign data or to verify digital signature
aka PKC

27
Q

what is symmetric cryptography (secret key)?

A

keys are called secret keys and are identical copies of the keys used. Therefore, the same key is used to encrypt
and decrypt data.

A cryptographic algorithm that uses the same secret key for its operation and, if applicable, for reversing the effects of the operation (e.g., an AES key for encryption and decryption

28
Q

what is encryption?

A

Cryptographic transformation of data
(called ‘plaintext’) into a form (called ‘ciphertext’) that conceals the data’s original meaning to prevent it
from being known or used

decryption; which is a transformation that restores encrypted data to its original state

29
Q

what is permissions?

A

means it is possible to track the user’s online activities, thus allowing for accounting and non-repudiation should a legal case arise.

shown through certificates, tokens, or user ID & password is referred to as Identity-Based Access Control (IBAC). IBAC may be enforced at the operating
system or application level, requiring user ID and passwords and/or with digital certificates

30
Q

what is user accounts?

A

The local account’s settings determine the rights for running programs, installing and removing programs, accessing files, and enabling or disabling services.

making and authorizing specific accounts for specfic uses and actions

31
Q

what is biometrics?

A

Biometric authentication relies on a unique physical characteristic to verify the identity of system users.

Common biometric identifiers include fingerprints, written signatures, voice patterns, typing patterns, retinal scans, and hand geometry

something that proves that you are who you say you are

32
Q

what is a token?

A

a small device (hardware) or computer-generated code (software) that is typically used in the authentication process.

33
Q

passwords

A

Passwords should never be written down and should be regularly changed.
60 to 90 days are healthy
contain a combination of sixteen or more letters (both upper and lower case), numbers and symbols

PINs and passwords do not provide non-repudiation, confidentiality, or
integrity.

34
Q

what is misuse detection?

A

it is trying to identify an attack already documented.

strength = adding attack signatures to database as identified which detects attacks more quickly in the future.

weakness =inability to recognize unknown attacks.

35
Q

what is IPS intrusion prevention system?

A

controls access to an IT network and protects it from abuse and
attack.
IPSs are designed to monitor intrusion data and take the necessary action to prevent an attack from
developing.

36
Q

what is signature based?

A

uses predefined signatures of well-known network threats.

system takes action when attack matches signature or pattern

37
Q

what is anomaly based?

A

monitors for any abnormal or unexpected behavior on the network.
If an anomaly is detected, the system blocks access to the target host immediately

38
Q

what is policy based?

A

administrators configure security policies

39
Q

what is network based IDS (NIDS)?

A

NIDSs are utilized to detect attacks by capturing and analyzing network packets.

40
Q

what are host based IDS (HIDS)?

A

HIDS operate on information collected from an individual computer system.

disadvantage = consumes resources on the host on which it resides, possibly slow that device down.

see intended outcome of an attempted attack, because they can directly access and monitor the data files and system processes usually targeted by attacks.

41
Q

what is IDS (intrusion detection system)?

A

system that scans, audits, and monitors the security infrastructure for signs of unauthorized access or abuse in progress.
IDS software can analyze data and alert security administrators to potential infrastructure problems.

42
Q

what is internet protocol security (IPsec)?

A

IPSec is an open-source authentication and encryption
protocol suite that operates at layer 3

A protocol that adds security features to the standard IP protocol to provide confidentiality and integrity services IPSec has two modes of operation:
transport and tunnel modes.

43
Q

what is secure real time transport protocol (SRTP)?

A

the methods of tagging, filtering, prioritizing, and protecting data

commonly used for replay protection in the transmission of real-time
audio/video data in Internet telephony applications

(RTP) is considered insecure since a telephone conversation over IP can easily be eavesdropped.

44
Q

what is a voice protection system? (VPS)

A

AVoice Protection System (VPS) acts like a firewall for the base’s phone lines, protecting calls to and from
the base.

45
Q

what is a VPN concentrator?

A

incorporate the most advanced encryption and authentication techniques available.

provide high availability (HA), high performance and scalability, and include components called scalable encryption processing modules.

Cisco VPN concentrators are built specifically for creating a remote-access VPN

46
Q

what is VPN gateway?

A

networking device that connects two or more networks together in a VPN
infrastructure, rather than just a client and server.

47
Q

what is a virtual private network?

A

VPNs provide secure connection over a non-secure (public) network to a
secure (private) network.

Protected information system link utilizing tunneling, security controls, and endpoint address translation giving the impression of a dedicated line

48
Q

what are firewalls?

A

Firewalls monitor all traffic entering and leaving the private network and alert IT staff for any attempts to circumvent security or patterns of inappropriate use based on certain criteria.

49
Q

what is internal control?

A

internal control = all efforts to ensure that the network and its data retain the characteristics of The CIA Triad and non-repudiation needed to maintain a safe and secure network

50
Q

what is defense in depth steps?

A

people
- Physical and personnel security measures must be established to control and monitor access to facilities and
the Information Technology (IT) environment.policies to control.
Personnel: making sure all personnel are on the same page that way we limit/prevent any risk

technology
- There are six focus
areas:
∙ Defend the Networks and Infrastructure
∙ Protect the local and wide area communication networks
(e.g. from Denial ofService Attacks)
∙ Provide confidentiality and integrity protection for data transmitted over these networks
(e.g. use encryption and traffic flow security measures to resist passive monitoring)
∙ Defend the Enclave Boundaries
(e.g. deploy Firewalls and Intrusion Detection to resist active network attacks)
∙ Defend the Computing Environment
(e.g. provide access controls on hosts and servers to resist insider, close-in, and distribution attacks)
∙ Defend the Supporting Infrastructure
(e.g. key management and PKI)

operations
- focuses on the activities required to sustain an organization’s security posture on a day-to-day basis
ex. Maintaining an up-to-date system security policy Certifying and accrediting changes to information systems