Cards from Book Flashcards
What are some examples of detective access controls?
Security guards, supervising users, incident investigations, and intrusion detection systems
What are some examples of physical access controls?
Guards, fences, motion detectors, locked doors, sealed windows, lights, backups, cable protection, laptop locks, swipe cards, dogs, CCTV, mantraps, and alarms
What are the three commonly recognized authentication factors?
Something you know, something you have, and something you are
What is a cognitive password?
A series of questions about facts or predefined responses that only the subject should know (for example, what is your birth date? What is your mother’s maiden name?)
Name at least eight biometric factors.
Fingerprints, face scans, iris scans, retina scans, palm topography, palm geography, heart/pulse pattern, voice pattern, signature dynamics, keystroke patterns
What are the issues related to user acceptance of biometric enrollment and throughput rate?
Enrollment times longer than 2 minutes are unacceptable; subjects will typically accept a throughput rate of about 6 seconds or faster.
What access control technique employs security labels?
Mandatory access controls. Subjects are labeled as to their level of clearance. Objects are labeled as to their level of classification or sensitivity.
The Bell–LaPadula, Biba, and Clark–Wilson access control models were all designed to protect a single aspect of security. Name the corresponding aspect for each model.
Bell–LaPadula protects confidentiality; Biba and Clark–Wilson protect integrity.
Name the three types of subjects and their roles in a security environment.
The user accesses objects on a system to perform a work task, the owner is liable for protection of data, the data custodian is assigned to classify and protect data.
Explain why the separation of duties and responsibilities is a common security practice.
It prevents any single subject from being able to circumvent or disable security mechanisms.
What is the principle of least privilege?
Subjects should be granted only the amount of access to objects that is required to accomplish their assigned work tasks.
Name the four key principles upon which access control relies.
Identification, authentication, authorization, accountability
How are domains related to decentralized access control?
A domain is a realm of trust that shares a common security policy. This is a form of decentralized access control.
Why is monitoring an important part of a security policy?
Monitoring is used to watch for security policy violations and to detect unauthorized or abnormal activities.
What are the functions of an intrusion detection system (IDS)?
An IDS automates the inspection of audit logs and real-time system events, detects intrusion attempts, and watches for violations of confidentiality, integrity, and availability.
What are the pros and cons of a host-based IDS?
It can pinpoint resources compromised by a malicious user. It can’t detect network-only attacks or attacks on other systems, has difficulty detecting DoS attacks, and can be detected by intruders.
What are the pros and cons of a network-based IDS?
It can monitor a large network and can be hardened against attack. It may be unable to handle large data flows, doesn’t work well on switched networks, and can’t pinpoint compromised resources.
What are the differences between knowledge-based and behavior-based detection methods used by IDS?
Knowledge-based uses a signature database and tries to match monitored events to that database. Behavior-based learns about the normal activities on your system through watching and learning.
What is a honeynet, and what is it used for?
Honeynets are fake networks used to lure intruders in order to create sufficient audit trails for tracking them down and prosecuting. Honeynets contain no real or sensitive data.
How does penetration testing improve your system’s security?
Penetration testing is a good way to accurately judge the security mechanisms deployed by an organization.
What is a denial-of-service attack?
An attack that prevents the system from receiving, processing, or responding to legitimate traffic or requests for resources and objects
What is a spoofing attack?
The attacker pretends to be someone or something other than whom or what they are. They can spoof identities, IP addresses, email addresses, and phone numbers. They often replace the valid source and/or destination IP address and node numbers with false ones.
What are countermeasures to spoofing attacks?
Countermeasures to spoofing attacks include patching the OS and software, enabling source/destination verification on routers, and employing an IDS to detect and block attacks.
What is a man-in-the-middle attack?
An attack in which a malicious user is positioned between the two endpoints of a communication’s link
What is a replay or playback attack?
A malicious user records the traffic between a client and a server and then retransmits them to the server with slight variations of the timestamp and source IP address. It is similar to hijacking.
What is a sniffer attack?
Any activity that results in a malicious user obtaining information about a network or the traffic over that network. Data is captured using a sniffer or protocol analyzer.
What is a spamming attack?
Directing floods of messages to a victim’s email inbox or other messaging system. Such attacks cause DoS issues by filling up storage space and preventing legitimate messages from being delivered.
What are some countermeasures to common attack methods?
Patching software, reconfiguring security, employing firewalls, updating filters, using IDSs/IPSs, improving security policy, using traffic filters, improving physical access control, using system monitoring/auditing
Name the seven layers of the OSI model by their layer name and layer number.
Application (7), Presentation (6), Session (5), Transport (4), Network (3), Data Link (2), and Physical (1)
List the security features offered by the Network layer of the OSI model.
The Network layer (Layer 3) offers confidentiality, authentication, and integrity.
What is the maximum throughput rate and maximum usable distance for 10Base2 cable?
10Base2 cable has a throughput of 10 Mbps and can be run up to distances of 185 meters.
Name the common network topologies.
Ring, bus, star, and mesh
What are the four layers of the TCP/IP protocols, and how do they relate to the OSI model layers?
The four layers of TCP/IP are Application (layers 5–7 of OSI), Transport (layer 4 of OSI), Internet (layer 3 of OSI), and Link (layers 1 and 2 of OSI).
What are the five generation types of firewalls?
Static packet filtering, application-level gateway, stateful inspection, dynamic packet filtering, and kernel proxy
Name at least five networking device types other than firewalls.
Routers, switches, hubs, repeaters, bridges, gateways, proxies
What is a proxy, and what is it used for?
Any system that performs a function or requests a service on behalf of another system. Proxies are most often used to provide clients with Internet access while protecting their identity.
Name at least 10 network and protocol security mechanisms.
IPSec, SKIP, SWIPE, SSL, S/MIME, SET, PEM, PGP, PPP, SLIP, PPTP, L2TP, CHAP, PAP, RADIUS, TACACS, S-RPC
Name at least six protocol services used to connect to LAN and WAN communication technologies.
Frame Relay, SMDS, X.25, ATM, HSSI, SDLC, HDLC, ISDN
How are PVC, SVC, DTE, and DCE used in a Frame Relay network?
Frame Relay requires the use of a DTE and a DCE at each connection point. PVC is always available; SVC is established using the best paths currently available.
What are three remote access authentication mechanisms?
RADIUS, DIAMETER, and TACACS
What is tunneling, and why is it used?
A process that protects the contents of packets by encapsulating them in another protocol. This creates the logical illusion of a communications tunnel through an untrusted intermediary network.
What is a VPN?
A virtual private network (VPN) is a communication tunnel that provides point-to-point transmission of both authentication and data traffic over an intermediary network.
What are the four primary VPN protocols?
PPTP, L2F, L2TP, and IPSec (Note: SSL is a valid VPN protocol as well, but it’s not necessarily recognized on the exam as such.)
What are the two modes available through IPSec, and what do they do?
In transport mode, the IP packet data is encrypted, but the header is not. In tunnel mode, the entire IP packet is encrypted, and a new header is added to govern transmission through the tunnel.
What is NAT?
Network Address Translation (NAT) allows the private IP addresses defined in RFC 1918 to be used in a private network while still being able to communicate with the Internet.
What is transparency?
A characteristic of a service, security control, or access mechanism that ensures it is unseen by users
What are some important aspects to consider when designing email security?
Nonrepudiation, access control, message integrity, source authentication, verified delivery, acceptable use policies, privacy, management, and backup and retention policies
What is the most serious threat of email?
Email is the most common delivery mechanism for viruses, worms, Trojan horses, documents with destructive macros, and other malicious code.
What are possible mechanisms for adding security to email?
S/MIME, MOSS, PEM, and PGP
What are elements of effective user training against social-engineering attacks?
Always err on the side of caution whenever communications are odd or unexpected. Always request proof of identity. Classify information for voice communications. Never change passwords over the phone.
What are the most common threats against communication systems?
Denial of service, eavesdropping, impersonation, replay, and modification
What are some countermeasures to eavesdropping?
Maintaining physical access security, using encryption, employing one-time authentication methods
What is an ARP attack?
The modification of ARP mappings. When ARP mappings are falsified, packets are not sent to their proper destination. ARP mappings can be attacked through spoofing. Spoofing provides false MAC addresses for requested IP addressed systems to redirect traffic to alternate destinations.
What is privacy?
Prevention of unauthorized intrusion, knowledge that information deemed personal or confidential won’t be shared with unauthorized entities, freedom from being observed without consent
What are the requirements for accountability?
Identification, authentication, authorization, and auditing
What is nonrepudiation?
Nonrepudiation prevents a subject from claiming not to have sent a message, not to have performed an action, or not to have been the cause of an event.
What is layering?
Layering is the use of multiple controls in a series. The use of a multilayered solution allows for numerous controls to be brought to bear against whatever threats come to pass.
How is abstraction used?
Abstraction is used to collect similar elements into groups, classes, or roles that are assigned security controls, restrictions, or permissions.
What is data hiding?
Data hiding is preventing data from being known by a subject. Keeping a database from being accessed by unauthorized visitors is a form of data hiding.
What is change control or change management?
A mechanism used to systematically manage change. Typically, it involves extensive logging, auditing, and monitoring of activities related to security controls and security solutions.
What are the goals of change management?
Implementation of changes in an orderly manner, formalized testing, ability to reverse changes, ability to inform users of changes, systematical analysis of changes, minimization of negative impact of changes
What is data classification?
Data classification is the primary means by which data is protected based on categories of secrecy, sensitivity, or confidentiality.
What criteria are used to classify data?
Usefulness, timeliness, value or cost, maturity or age, lifetime or expiration period, disclosure damage assessment, modification damage assessment, national security implications, storage
What is the government/military data classification scheme?
Top secret, secret, confidential, sensitive but unclassified, unclassified
What is the commercial business/private sector classification scheme?
Confidential, private, sensitive, public
Name at least seven security management concepts and principles.
CIA Triad, confidentiality, integrity, availability, privacy, identification, authentication, authorization, auditing, accountability, and nonrepudiation
What are the elements of a termination procedure policy?
Have at least one witness; escort terminated employee off the premises immediately; collect identification, access, or security devices; perform exit interview; disable network account
What is the function of the data owner security role?
The data owner is responsible for classifying information for protection within the security solution.
What is the data custodian security role?
The data custodian is assigned the tasks of implementing the prescribed protection defined by the security policy and upper management.
What is the function of the auditor security role?
The auditor is responsible for testing and verifying that the security policy is properly implemented and the derived security solutions are adequate.
What should the documents that make up a formalized security structure include?
Policies, standards, baselines, guidelines, and procedures
What is generally involved in the processes of risk management?
Analyzing an environment for risks, evaluating each risk as to its likelihood and damage, assessing the cost of countermeasures, and creating a cost/benefit report to present to upper management
What should be considered when establishing the value of an asset?
Cost of purchase, development, maintenance, acquisition, and protection; value to owners/users/competitors; equity value; market valuation; liability of asset loss; and usefulness
Name at least five possible threats that should be evaluated when performing a risk analysis.
Viruses; buffer overflows; coding errors; user errors; intruders (physical and logical); natural disasters; equipment failure; misuse of data, resources, or services; loss of data; physical theft, denial of service
What is single loss expectancy, and how is it calculated?
The cost associated with a single realized risk against a specific asset. SLE = asset value (AV) * exposure factor (EF). The SLE is expressed in a dollar value.
What is annualized loss expectancy, and how is it calculated?
The possible yearly cost of all instances of a specific realized threat against a specific asset. ALE = single loss expectancy (SLE) * annualized rate of occurrence (ARO).
What are the basics distinctions between qualitative and quantitative risk analysis?
Quantitative risk analysis assigns real dollar figures to the loss of an asset. Qualitative risk analysis assigns subjective and intangible values to the loss of an asset.
What are the four possible responses by upper/senior management to risk?
Reduce/mitigate, assign/transfer, accept, or reject/deny
What is residual risk?
Once countermeasures are implemented, the risk that remains is known as residual risk. Residual risk is the risk that management has chosen to accept rather than mitigate.
What is total risk?
The amount of risk an organization would face if no safeguards were implemented. A formula for total risk is threats * vulnerabilities * asset value = total risk.
What is the controls gap?
The difference between total risk and residual risk. The controls gap is the amount of risk that is reduced by implementing safeguards.
What are the three learning levels of security?
Awareness, training, and education
What are the three types of plans employed in security management planning?
A strategic plan is a long-term plan that is fairly stable. The tactical plan is a midterm plan that provides more details. Operational plans are short term and highly detailed.
How many primary keys may each database table have?
One
What type of malicious code spreads through the sharing of infected media?
Viruses
What term is used to describe intelligent code objects that perform actions on behalf of a user?
Agent
What term is used to describe code sent by a server to a client for execution on the client machine?
Applet
What language by Sun Microsystems is often used for applet programming and development?
Java
What type of database key enforces relationships between tables?
Foreign key
What security principle ensures that multiple records are created in a database table for viewing at different security levels?
Polyinstantiation
What process evaluates the technical and nontechnical security features of an IT system?
Certification and accreditation
What type of accreditation evaluates the systems and applications at a specific, self-contained location?
Site accreditation
In which phase of the Software Capability Maturity Model do you often find hardworking people charging ahead in a disorganized fashion?
Initial
In which layer of the ring protection scheme do user applications reside?
Layer 3
What system mode requires that the system process only one classification level at a time and all system users have clearance and need to know that information?
Dedicated security mode
What is another term for the master boot record?
Boot sector
What type of virus embeds itself in application documents?
Macro virus
What can antivirus programs do when they encounter a virus infection?
Delete the file, disinfect the file, or quarantine the file.
What type of virus modifies itself each time it infects a new system in an attempt to avoid detection?
Polymorphic virus
What type of malicious code launches itself when certain conditions (such as a specific date) are met?
Logic bomb
What were the mechanisms of action used by Robert T. Morris’s Internet Worm of 1988?
The worm exploited vulnerabilities in the Sendmail debug mode and finger daemon, launched password attacks, and exploited trust relationships between systems.
Where are passwords stored in a UNIX system?
In the /etc/passwd or /etc/shadow file
What term is used to describe hackers rooting through trash looking for useful information?
Dumpster diving
What is the cornerstone of computer security?
Education
What are the three phases of the three-way handshake used by TCP/IP?
SYN, SYN/ACK, ACK
How does the teardrop attack operate?
It sends overlapping packet fragments to the victim machine.
What is the term used to describe a secret method used by a programmer to gain access to the system?
Trap door (or back door)
When is the XOR function true?
When only one of the input bits is true
What term describes a mathematical function that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values?
One-way function
True or false? All ciphers are meant to obscure the meaning of a message.
True
True or false? All codes are meant to obscure the meaning of a message.
False
What occurs when a change in the plain text results in multiple changes spread throughout the cipher text?
Diffusion
What is the code name of the project in which the National Security Agency successfully broke a Soviet one-time pad system in the 1940s?
VENONA
What type of cipher is the Caesar cipher?
Simple substitution
True or false? Modern cryptosystems rely on the secrecy of the encryption algorithm.
False
What is the length of the key used by the standard DES algorithm?
56 bits
How many rounds of encryption does DES utilize?
16
True or false? The IDEA algorithm is available free for noncommercial use.
True
What encryption algorithm was selected for the Advanced Encryption Standard (AES)?
Rijndael
What is the Diffie-Hellman algorithm is most commonly used for?
Key exchange
True or false? The Hashed Message Authentication Code provides nonrepudiation.
False
What are the three encryption algorithms supported by the Digital Signature Standard?
DSA, RSA, and ECDSA
What ITU standard describes the contents of a digital certificate?
X.509
What is the process by which you are issued a digital certificate?
Enrollment
Who issues digital certificates?
Certificate authorities (CAs)
True or false? PEM provides protection against replay attacks.
False
What protocol uses the RSA encryption algorithm to provide encrypted mail support for a number of common commercial email packages?
S/MIME
True or false? S-HTTP secures individual messages between a client and a server.
True
What cryptographic methods are used by the Secure Electronic Transaction (SET) protocol?
RSA public key cryptography and DES private key cryptography in connection with digital certificates
What are the four components of IPSec?
Authentication Header (AH), Encapsulating Security Payload (ESP), IP Payload Compression protocol (IPComp), and Internet Key Exchange (IKE)
What type of cryptographic attack is used against algorithms that don’t incorporate temporal protections?
Replay attack
What are some common reasons a certificate might need to be revoked?
The certificate was compromised, the certificate was erroneously issued, the certificate details changed, and there was a change of security association.
What type of cryptography relies on the use of public and private keys?
Asymmetric
What technology allows multiple users to make use of the same process without interfering with each other?
Multithreading
What are some of the terms used to describe the CPU mode that gives access to the full range of supported instructions?
System mode, privileged mode, supervisory mode, and kernel mode
What is the greatest security risk to RAM modules?
Theft
What addressing scheme supplies the CPU with the actual address of the memory location to be accessed?
Direct addressing
Magnetic/optical media devices are classified as what type of memory?
Secondary
Memory devices designed to retain their data when power is removed are known as .
nonvolatile
What two ways can storage devices be accessed?
Randomly and sequentially
What is the greatest security risk to computer monitors?
TEMPEST technology
What is another term often used for firmware?
Microcode
Where are the operating system–independent primitive instructions that a computer needs to start and load the operating system stored?
BIOS
What concept ensures that data existing at one level of security is not visible to processes running at different security levels?
Data hiding
What are the important factors in personnel management?
Hiring practices, ongoing job performance reviews, and termination procedures
What security mechanisms are countermeasures to collusion?
Job rotation, separation of duties, mandatory vacations, workstation change
Why is antivirus protection important?
Viruses are the most common form of security breach in the IT world. Any communications pathway can and is being exploited as a delivery mechanism for a virus or other malicious code.
What is need to know?
Need to know is the requirement to have access to, knowledge of, or possession of data or a resource in order to perform specific work tasks.
What principle states that users should be granted the least amount of access to the secure environment as possible for them to be able to complete their work tasks?
Principle of least privilege
What are due care and due diligence?
Due care is using reasonable care to protect the interest of an organization. Due diligence is practicing the activities that maintain the due care effort.
How are security and illegal activities related?
A secure environment should provide mechanisms to prevent the committal of illegal activities, which are actions that violate a legal restriction, regulation, or requirement.
With what level of security precautions should backup media be treated?
Backup media should be handled with the same security precautions as any other asset with the same data classification.
What are the goals of managing backup media?
Preventing disclosure, destruction, or alteration of data.
What are the processes that can be applied to used media in order to prepare the media for reuse in various environments?
Erasing, clearing, and overwriting media that will be used in the same classification environments; purging, sanitizing, and degaussing if media is used in different classification environments
What are the classifications of security control types?
Preventive, deterrent, detective, corrective, recovery, compensation, directive
What is the purpose of auditing?
To ensure compliance with security policy and to detect abnormalities, unauthorized occurrences, or outright crimes
What types of activities are labeled as auditing?
Recording of event/occurrence data, examination of data, data reduction, use of event/occurrence alarm triggers, log analysis, logging, monitoring, using alerts, intrusion detection
What is the purpose of compliance testing?
To ensure that all of the necessary and required elements of a security solution are properly deployed and functioning as expected
How are audit trails used?
To reconstruct an event, to extract information about an incident, to prove or disprove culpability
What types of activities can be used as penetration tests?
War dialing, sniffing, eavesdropping, radiation monitoring, dumpster diving, social engineering, port scanning, ping scanning
What are some ways to keep inappropriate content to a minimum?
Address the issue in the security policy, perform awareness training, use content filtering tools to filter source or word content.
Why is it important to protect against resource waste?
If the storage space, computing power, or networking bandwidth capacity is consumed by inappropriate or non-work-related (non-profit-producing) data, the organization loses money.
Why is it important to protect against privilege abuse?
It can cause the disclosure of sensitive information, violating the principle of confidentiality.
What countermeasures are moderately effective against errors and omissions?
Input validators and user training
How can you protect data against fraud and theft?
The use of access controls (auditing and monitoring, for example) reduce fraud and theft.
What are some safeguards against sabotage?
Intensive auditing, monitoring for abnormal or unauthorized activity, keeping lines of communication open between employees and managers, and compensating and recognizing employees for excellence
Why isn’t there an effective direct countermeasure against the threat of malicious hackers or crackers?
Most safeguards and countermeasures protect against one specific threat or another, but it is not possible to protect against all possible threats that a cracker represents.
What is malicious code?
Malicious code is any script or program that performs an unwanted, unauthorized, or unknown activity on a computer system.
True or false? Senior management should be included in the BCP process from the beginning.
True
What resource is in greatest demand during the BCP testing, training, and maintenance process?
Manpower
What type of decision making is mainly concerned with metrics such as dollar values and downtime?
Quantitative
What Business Impact Analysis/Assessment variable is used to describe the longest period of time a resource can be unavailable without causing irreparable harm to the business?
Maximum tolerable downtime (MTD)
What is the formula for computing single loss expectancy?
SLE = AV * EF [Single Loss Expectancy = Asset Value * Exposure Factor]
What is the formula for computing annualized loss expectancy?
ALE = SLE * ARO [Annualized Loss Expectancy = Single Loss Expectancy * Annual Rate of Occurrence]
What are some of the qualitative factors that must be taken into account when assessing the cost of a disaster?
Loss of goodwill among client base, loss of employees after prolonged downtime, social/ethical responsibilities to the community, and negative publicity
What is the first thing you should do when a disaster strikes?
Ensure that people are safe
What are the two possible responses to a risk?
Acceptance and mitigation
Provide two examples of devices that might be used to harden a system.
Computer-safe fire suppression systems and uninterruptible power supplies
What is the goal of business continuity planning (BCP)?
To ensure the continuous operation of a business in the face of an emergency situation
What are some of the elements that should be included in emergency response guidelines?
Immediate response procedures, notification procedures, and secondary response procedures
What are the five steps of the business impact assessment process?
Identification of priorities, risk identification, likelihood assessment, impact assessment, and resource prioritization
What process brings order to the chaotic events surrounding the interruption of an organization’s normal activities by an emergency?
Disaster recovery planning (DRP)
Name some common natural disasters.
Earthquakes, floods, storms, tornadoes, and fires
What organization sponsors the National Flood Insurance Program and is a good source of historical flood information?
Federal Emergency Management Agency (FEMA)
What disaster recovery system is often highly dependent on the public water supply?
Fire suppression system
What type of disaster recovery separates recovery sites by business teams?
Workgroup recovery
What are the three major options for alternative processing sites?
Hot sites, warm sites, and cold sites
What type of recovery site is particularly suited to workgroup recovery options?
Mobile site
True or false? Organizations participating in a mutual assistance agreement are typically located in the same geographic region.
True
True or false? There is an accepted standards document defining the requirements for an electronic vaulting solution.
False
What is the most common document type used for emergency response plans?
Checklists
What are the three major types of filesystem backups?
Full backups, incremental backups, and differential backups
What can be used to protect a company against the failure of a developer to provide adequate support?
Software escrow agreements
It is sometimes useful to separate disaster tasks from disaster tasks.
recovery, restoration (in either order)
True or false? In most circumstances, it is illegal for an employer to monitor an employee’s email.
False
If a witness is not able to uniquely identify an object, how else may it be authenticated in court?
By establishing a chain of evidence
What type of evidence is an authenticated computer log?
Documentary evidence
What are the three major evidence admissibility requirements?
Evidence must be relevant, material, and competent.
What law created the category of mission-critical computer systems?
Government Information Security Reform Act
What are the two requirements for acceptance of a trademark application?
The trademark must not be confusingly similar to another trademark, and it must not be descriptive.