Chapter 1 - Essential Knowledge Flashcards
Network Security Zones - Internet
Uncontrollable
Network Security Zone - Internet DMZ
Controleld buffer network
Network Security Zone - Production Network Zone
Very restricted; controls direct access from uncontrolled zones; has no users
Network Security Zone - Intranet Zone
Controlled; has little to no heavy restrictions
Network Security Zone - Management Network Zone
Might find VLAN and IPSEC; highly secured; strict policies
CVSS
Common Vulnerability Scoring System - Places numerical score based on severity
National Vulnerability Database (NVD)
US government repository of vulnerabilities
What are the 2 access control types?
Mandatory (MAC) - access is set by an administrator. Discretionary (DAC) - allows users to give access to resources that they own and control
Hack Value
perceived value or worth of a target as seen by the attacker
Zero-day Attack
attack that occurs before a vendor knows or is able to patch a flaw
Doxing
searching for and publishing information about an individual usually with a malicious intent
Enterprise Information Security Architecture (EISA)
process that determines how systems work within an organization
Incident Management
Deals with specific incidents to mitigate the attack
What are the risk management phases?
Risk Identification, Risk Assessment, Risk Treatment, Risk Tracking, Risk Review
Annualized Loss Expectancy
ARO x SLE
Security Control Types: Physical, Technical, Administrative
Physical: Guards, lights, cameras. Technical: Encryption, Smart Cards, Access Control Lists. Administrative: Training awareness, policies
Types of Security Controls: Preventative, Detective, Corrective
Preventative: Authentication, alarm bells. Detective: Audits, Backups. Corrective: Restore Operations
User Behavior Analytics
(UBA) - Tracking users and extrapolating data in light of malicious activity
CIA Triad
Confidentiality: Passwords, encryption. Integrity: Hashing, digital signatures. Availability: Anti-dos solutions
Bit Flipping
Integrity attack. In Bit flipping, the attacker isn’t interested in learning the entirety of the plain-text message. Instead, bits are manipulated in the cipher text itself to generate a predictable outcome in the plain text once it is decrypted.