CHAPTER 1-4 Flashcards
OSI Reference model
Application, Presentation, Session,Transport, Network, Data Link,Physical
TCP/IP Stack
Application,Transport,Internet,Network Access
Risk Management
Identifying organisational assets, threats to those assets and asset vulnerabilities, allowing the company to explore which countermeasures security personnel could put in place to minimize risks as much as possible (Identification,Assessment, Treatment, Tracking and Review)
Business impact Analysis
BIA - Effort to identify the systems and processes that are critical for operation.
Maxmium Tolerable Downtime
Provides a mean to prirotize the recovery of assets
IRT
Incident Response Team
ALE
Annualised loss expectancy - ARO (annual rate of occurrence) x SLE (single loss expectancy).
Single loss expectancy
Exposure factor x Value of Asset
Security Triad
Confidentiality (secrecy and privacy of information), Integrity (methods and actions taken to protect the information) and availability (communication systems and data being ready for use when legitimate user needs it)
Three main phases in a pen test
Preparation, Assessment and Conclusion
Five main phases of hacking
Reconnaissance, Scanning and Enumeration, Gaining Access, Maintaining Access and Covering Tracks
TOE
Target of evaluation
FISMA
Federal Information Security Modernization Act
HIPAA
Health Insurance Portability and Accountability Act
SOX
The Sarbanes-Oxley Act - Created to make corporate disclosures more accurate and reliable in order to protect the public and investors from shady behavior.
PCI-DSS
Payment Card Industry Data Security Standards - Security standard for organisations handling credit cards (consists of 12 requirements)
COBIT
Control Objects for Information and Related Technology created by Information System Audit and Control Association (ISACA) and IT Governance Institute (ITGI)
ISO/IEC 27001:2013
for creating, maintaining and improving organisations IS (Information Security)
OSSTMM
Open Source Security Testing Methodology Manual
Internet DMZ
Controlled buffer network between you and the uncontrolled chaos of the Internet
Internet
Outside the boundary and controlled
Production Network Zone
Restricted zone that strictly controls direct access from uncontrolled zones.
Intranet
Controlled zone that has little to no heavy restrictions
Management Network Zone
Highly secured zone with very strict policies
Anonymous Footprinting
Obscure source of all this information gathering
Pseudonymous Footprinting
Making someone else take the blame for actions
Benefits of Footprinting
Know the Security Posture
Reduce Focus Area
Identify vulnerabilities
Draw a network map
Active Footprinting
Requires attacker to touch the device network or resources
Passive Footprinting
Measures to collect information from publicly accessible sources (dumpster diving = passive)
Competitive Intelligence
Information gathered by a business entity about its competitors customers products and marketing