block 11 2 b + c Flashcards
what is anti-virus (AV) software ?
- Software scans computer files for presence of malicious
code.
Too much affects computer’s performance, the software’s effectiveness, and can conflict with one another.
should be done at least once a week
what is Malicious logic/code (malware)?
Hardware, firmware, or software that is intentionally included or inserted in a system for a harmful purpose
what is CATIII?
findings degrade measures to protect against loss of confidentiality, availability, or integrity
what is CATII?
findings provide information about system, therefore have a high potential of allowing unauthorized access to an intruder.
what is CATI?
an indicator of the greatest risk and urgency.
The findings are those that allow an attacker to gain immediate access to a system or component.
why does DISA use STIGS?
- to strengthen and assess the security posture of a system or component.
- Findings from STIG are (CATs)
what is Unified Master Gold Disk (UMGD)?
running software to ensure compliance and discover any weaknesses in the system security
what do STIGS contain?
technical guidance to secure information systems/software
what is risk mitigation?
Once the risks are identified, we can
appropriately choose to either avoid, mitigate, transfer, or accept the risks.
what is Integrated Network Operations and Security Center (I-NOSC?
Their mission focus is to continuously ensure that systems are operational and fully capable.
personnel monitoring/supporting/responding to real time network events in the day to day
what is incident response?
Many organizations have
dedicated teams responsible for investigating any computer security incidents that take place
called a Computer Incident Response
Team (CIRT)
a CSIRT(computer security incident response team)
is set up as the central body to handle responses.
A distributed model contains multiple teams whose responsibilities each cover a particular area of a unit, office, or organization.
Finally, a coordinated model
allows for a team or body of security personnel who relay the IRPs to the teams who are affected by each
incident.
As for the four phases of an IRP, they include:
1. Preparation
2. Detection and Analysis
3. Containment, Eradication, and Recovery
4. Post-Event Activity
what is bluesnarfing?
act of hijacking and taking over a Bluetooth connection, typically done during the initialization vector upon pairing devices.
range 10-30 meters
what is bluejacking?
is the act of sending unsolicited messages over a Bluetooth connection
what is jamming?
- electromagnetic energy is emitted on a wireless network’s frequencies. This attack causes the WAPs to become unusable by the network since the signals cannot be found or used
ranges 18 meters (60 feet)
and 70 meters (230 feet).
Jamming is a form of a wireless DoS attack.
what is an evil twin?
an attack designed to fool people into logging into an AP typically over Wi-Fi
attempts to replicate or similarly name the Service Set Identifier (SSID), which is also known as the network name.
Those who connect to an evil twin will have their keystrokes recorded, and login information replicated in hopes of stealing that information to replay it later.
The evil twin attack is essentially a wireless phishing attack.
what are the 4 wireless attacks?
- evil twin attack
-jamming - blusnarfing
- bluejacking
what is a sensitive room?
is secure, sound-proofed, and protected, but only up to the classification of SECRET
Sensitive rooms can be used to contain highly classified documentation and equipment.
what is physical barriers and locks?
include fences, cages, physical locks, and mechanical locks.
Physical security also involves preventing unauthorized access to equipment, facilities, and systems.
bollards and mantraps. (found in front of storefronts, to prevent vehicles from driving into a building or pulling up to a building for quick on/offloading, blocking cameras, striking pedestrians, etc.)
what is secure premises?
refers to protecting structures and equipment (including information and software) from theft, vandalism, natural and manmade disasters, and accidental damage.
methods and technologies such as barriers, mantraps, bollards, and secure doors are among the types used to secure and protect a building or premesis
what is physical security?
involves the protection of servers and the protection of clients to prevent physical intrusion.
measures include lockable server racks, near field
communication (NFC) access to server rooms, surveillance, access lists, and security guards.
Physical server protection also includes practices such as not walking away from a server while logged in and always logging off or locking the system when it’s not in-use