Book 3 Flashcards
Enlisted Information Warfare Specialist Command Specific
Active Directory Users and Computers Definition
stores users and accounts
Certificates Definition
Used with CAC, allows access to certain sites
Event Viewer Definition
Monitor events on local computer such as logon, open applications, etc
Computer Management Definition
Create local user, groups look at logs, shared folders
Security Templates Definition
Security templates provide standard security settings to use as a model for your security policies. They help you troubleshoot computers whose security policies are not in compliance with policy or are unknown. Security templates are inactive until imported into a Group Policy object or the Security Configuration and Analysis snap-in to MMC.
IP Security Policies Definition
Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. IPSec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft implementation of IPSec is based on standards developed by the Internet Engineering Task Force (IETF) IPSec working group.
Describe Group Policy in Active Directory. (FIX)
Exchange Server, “New Distro Group”, “Add Members” Security Group (settings, file access) vs. Distro Group (mailing list)
a. Group Policy Applications for security
b. Group Policy applications to local, global, and universal security groups
c. Recommended security structure for group policy design
d. Use of the “No Over-ride” option for group policy
Describe the importance of enforcing a strong password policy.
Given enough encrypted data, time, and computing power, attackers can compromise almost any cryptographic system. You can prevent such attackers from succeeding by making the task of cracking the password as difficult as possible. Two key strategies to accomplish this are to require users to set complex passwords and to require users to change their passwords periodically, so that attackers do not have sufficient time to crack the complex encryption code.
Complex Passwords
You should set password policy to require complex passwords, which contain a combination of uppercase and lowercase letters, numbers, and symbols, and are typically a minimum of seven characters long or more for all accounts, including administrative accounts, such as local administrator, domain administrator, and enterprise administrator.
Discuss the configuration of password policy through Group Policy, including, minimum password length, maximum password age, password history, length, minimum password age, and password complexity requirements.
NCDOC utilizes Active Directory Users and Computers (ADUC) which allows administrators to set the password policy for the entire command. NCDOC currently requires the use of 15 characters to include upper case, lower case, numbers and special characters.
Define “Account Lockout Policy”.
Stays locked until manually unlocked by Systems. Three incorrect tries and your password “locks out” your account.
Describe the issues surrounding an account lockout policy.
The main issue surrounding an account lockout policy is if your account is locked out after N61 working hours and you are deemed essential personnel, you will have to contact the BWC and have he or she call the duty I.T. to come in and unlock your account. If your account is locked out during working hours a coworker will have to submit a trouble ticket for you to have your account unlocked
Discuss the configuration account lockout policy through Group Policy, including lockout threshold, lockout duration, and bad password count reset interval.
- The configuration account lockout policy is automatically carried out by Group Policy. If you enter the wrong password in 3 times your account will automatically be locked out and require a technician to manually unlock it.
- Lockout threshold refers to the number of failed sign-in attempts that will cause a user account to be locked.
Lockout duration refers determines the number of minutes a locked-out account remains locked out before automatically becoming unlocked. The available range is from 0 minutes through 99,999 minutes. If you set the account lockout duration to 0, the account will be locked out until an administrator explicitly unlocks it.
Network redundancy
process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability. As such, it provides a means of network failover.
File Servers
In computing, a fileserver is a computer attached to a network that has the primary purpose of providing a location for shared disk access, i.e. shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations.
Exchange
Microsoft Exchange Server is a calendaring and mail server developed by Microsoft that runs exclusively on the Microsoft Windows Server product line
Domain controllers
On Microsoft Servers, a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within a Windows domain. A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.
Differential Backup:
Differential backups are completed nightly.
Incremental Backup:
Not completed at NCDOC.
Full Backup:
Weekly with the exception of SQL(Daily) and Exchange (2 times a week).
Network media used at NCDOC:
Fiber optic and the type of associated connectors:
Fiber optic for classified
SC Duplex (Standard Connector x 2), ST (Straight tip), LC Duplex (Lucent Connector x 2), MTRJ (Mechanical Transfer Register Jack)
Network media used at NCDOC:
Cat 6
Unclassified
Network media used at NCDOC:
RJ45
Used for phones. An 8-pin/8-position plug or jack that is commonly used to connect computers onto Ethernet-based local area networks (LAN). Two wiring schemes–T568A and T568B–are used to terminate the twisted-pair cable onto the connector interface. RJ45 is the medium often used for unclassified use.
What is the IEEE standard associated with PNAC?
802.1x
What layer does it work on?
Network
Explain how Persistent MAC Learning (Sticky MAC) works.
Persistent MAC learning, also known as sticky MAC, is a port security feature that enables an interface to retain dynamically learned MAC addresses when the switch is restarted or if the interface goes down and is brought back online.
What is an ISP?
Internet Service Provider. NCDOC ISP is COX
What is VPN?
Virtual Private Network
State the purpose of the following Enclaves (Non Attrib (COX))
Non Attrib (Cox) – Research and development
State the purpose of the following Enclaves Poison & Forensics
Investigate
State the purpose of the following Enclaves (SIPR)
Classified
State the purpose of the following Enclaves (NIPR)
Unclassified
How do you authenticate over VPN?
RSA Token
What is a STIG?
Security Technical Implementation Guide is a configuration standard consisting of cybersecurity requirements for a specific product. The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security.
Explain the purpose and location of COOP.
COOP planning is an effort to assure that the capability exists to continue essential agency functions across a wide range of potential emergencies. Washington DC
Describe the process for creating a PBI/PKE ticket.
a. AS&W create CER.
b. IH verifies the CER’s validity and generates a PBI or PKE in ITSM based on the exploit.
List the different types of Incident Report Record Messages and state the purpose of each
a. General
b. IP Resolution
c. DCO Open/Close
d. Ship’s Update
e. DINQ
f. Phishing w/ Attachment
Incident Handling Methodology Phases.
Post Incident Activity
Lessons learned
Incident Handling Methodology Phases.
Recovery
Restore to baseline
Incident Handling Methodology Phases.
Eradication
Re-provision asset, delete email from Exchange server
Incident Handling Methodology Phases
Containment
Remove media from network, disable account
Incident Handling Methodology Phases
Analysis
Log/Media/Malware RFI’s, PCAP
Incident Handling Methodology Phases
Preparation
Secure/Patch Network
Incident Handling Methodology Phases
Detection
IDS/IPS, Scans
Explain the information contained in CER Reports:
Early Indicator & Warning Report (EI&W)
Activity that could lead to further issues
Explain the information contained in CER Reports:
Intrusion Detection System (IDS)
Alerts received from IDS
Explain the information contained in CER Reports.
NSA/CSS Threat Operations Center (NTOC)
Activity seen around the GIG.
Define the three Mission Assurance Categories (MAC levels).
MAC 1(Vital)
Loss of primary mission capability (mission critical)
Define the three Mission Assurance Categories (MAC levels)
MAC 2 (Important)
Loss of secondary mission capability (redundancy/services
Define the three Mission Assurance Categories (MAC levels)
MAC 3 (Necessary)
Loss of End-User Access (workstation
Containment
the host(s) have been identified and need to be removed from the network, logically isolated, re-imaged or otherwise restricted
Incident Response Plan
This plan is provided as a tool to assist commands with detection, analysis, containment, eradication, and recovery from possible computer compromise during a Category 1 or 2 incident.
NCDOC Timeline for investigation updates
Update message on SIPR within 24 hours, next 24 hours: DINQ to ISIC, following 24 hours: go up chain of command, Report to DCOWO.
State the importance of containment measures/procedures.
Knowledge of the type of malware or exploit being employed on a host or user account that is compromised to determine the mitigation measures necessary.
Identify the difference in containment measures for Category 7 incidents compared to Category 2 Incidents.
Cat 2 must be mitigated faster because it grants unauthorized privileges.
Discuss what should be considered when determining the best method to eradicate a threat.
a. Type of system.
b. Type of malicious logic.
Explain why different types of incidents will have different eradication procedures.
Recovery of servers differs from recovery of workstations.
Describe several factors that should be considered during the recovery phase.
Whether to patch, wipe, image, reset accounts, etc.
List the steps necessary after receiving the final report from a Command.
a. Review target IP and source IP
b. Host affected seek required information updates
c. Antivirus updated within the last 7 days
d. Make ready for lead
e. Lead QCs
f. Ready for QC
g. QC closes or fixes ticket
List possible reasons a Navy command may be disconnected from the Department of Defense Information Network (DODIN).
Non-compliance, Non-Responsiveness, Outbreak (>30% of network affected)
Describe the following Cat Event:
DNS Beaconing
???
Describe the following Cat Event:
TOR/Proxy Routers
???
Describe the following Cat Event :
P2P
???
Describe the following Cat Event :
Unauthorized Software
???
Describe the following Cat Event :
Black Hole/IP Block violations – URL/IP list
???
Locate the status of an open ticket in ITSM.
Review status log.
Explain the difference between an Incident and an Event.
a. Event – An observable occurrence on a network (logins, open applications, etc.)
b. Incident – An observable occurrence on a network that’s malicious in nature.
Terms applying to Malware: Buffer Overflow
Overloads memory causing crashes
Terms applying to Malware: Worm
Self-replicating
Terms applying to Malware: Logic Bomb
Set to go off at a set time or after a set event
Terms applying to Malware: Spear Phishing
Social engineering
Terms applying to Malware: Trojan Horse
Hidden in other application
Terms applying to Malware: Denial of Service
Stops network usage
Terms applying to Malware: Root Kit
Grants Admin privileges
Explain the difference between a virus and a worm.
Virus requires a program to execute, worm is self-replicating.
Discuss the following virus propagation mechanisms.
a. Removable storage – USB
b. Email – Attachments
c. Instant Messaging – Links/URLs
d. Network – Worms
Describe the following virus infection vectors:
Polymorphism
a. Polymorphism – Changes characteristics to avoid detection
b. Metamorphism – Change their code to an equivalent one, but never remains constant.
c. Macro Virus – Embedded within scripts
d. Companion Virus – Virus which replaces a program and is executed when the user executes the program
e. Antivirus Deactivation – Disables the antivirus on the host.
Describe the following virus infection vectors:
Antivirus Deactivation
Disables the antivirus on the host.
Describe the following virus infection vectors:
Companion Virus
Virus which replaces a program and is executed when the user executes the program
Describe the following virus infection vectors:
Metamorphosis
Change their code to an equivalent one, but never remains constant.