Ch2 - 2.03 - Understanding Security Principles & Terminologies Flashcards
1
Q
List Types of Security
A
- Physical Security
- Communication Security
- Computer Security
- Network Security
2
Q
List Some Important Security Principles - p1
A
- Separation of Duties
Separation of duties means that you ensure that all critical tasks are broken down into different processes and that each process is performed by a different employee - Least Privilege
Least privilege means that you give a user only the minimum level of permissions needed to perform their tasks or duties. - Rotation of Duties
Rotation of duties is the principle of rotating multiple employees through different job roles.
Rotation of duties offers multiple benefits.
First, it is a way to ensure accountability for employee actions.
The other benefit of rotation of duties is that the organization does not depend on one person being the only person able to perform a job role.
3
Q
List Some Important Security Principles - p2
A
- Concept of Need-to-know
Need to know means that you give employees access only to information that they need to know about. - Layered Security and Diversity of Defense
Layered security is the concept of not putting all of your eggs in one basket by relying on one type of security solution to create a secure environment.
Diversity of defense is the concept that you should use different products to increase the level of security in your environment - Due Care and Due Diligence
Due care is the concept of doing the right thing. When it relates to security, due care is about implementing the correct security controls to ensure the protection of the organization’s assets.
Due diligence is about identifying your risk so that you know what security controls to put in place (due care). Due diligence involves performing regular assessments and analyzing the assessment results to identify security issues in the environment.
4
Q
Vulnerability and Exploit
A
A vulnerability is a weakness in a piece of software or hardware that was created by the manufacturer by accident. Hackers spend quite a bit of time evaluating new software and hardware to try to locate vulnerabilities. Once the hackers find a weakness, they work on a way to exploit the weakness and compromise the system security.
5
Q
Reasons for Vulnerabilities
A
- End-of-life systems
- Embedded systems
- Lack of vendor support
6
Q
Types of Vulnerabilities
A
- Use of open-source intelligence
- Race conditions
- Improper input handling
- Improper error handling
- Misconfiguration/weak configuration
- Default configuration
- Resource exhaustion
- Untrained users
- Improperly configured accounts
- Vulnerable business processes
- Weak cipher suites and implementations
- Memory/buffer vulnerability
12a. Memory leak
12b. Integer overflow
12c. Buffer overflow
12d. Pointer dereference
12e. DLL injection - System sprawl/undocumented assets
- Architecture/design weaknesses
- New threats/zero day
- Improper certificate and key management
7
Q
List Threat Actors
A
- White-hat hacker
- Black-hat hacker
- Gray-hat hacker
A gray-hat hacker is a person who figures out
vulnerabilities in a product or web site, and how to exploit them, but instead of hacking into the systems themselves they disclose the information to the public. The gray-hat hacker may give the vendor some notice before disclosing the information in order to give the vendor a chance to correct the problem.
8
Q
List Types of Actors
A
- Script kiddies
- Hacktivists
- Organized crime
- Nation states/APT
- Insiders
- Competitors
9
Q
Name Attributes of Actors
A
- Internal/external
- Level of sophistication
- Resources/funding
- Intent/motivation