chapter 1: General Knowledge Flashcards
to study sec +
What is a wildcard certificate?
A wildcard certificate is a single Secure Sockets Layer (SSL) or Transport Layer Security (TLS) certificate that secures a domain and all of its subdomains.
What is a Gap Analysis?
Control objectives and controls intended to meet the objectives
What is git?
A distributed version control system that tracks versions of files.
What are SOP’s?
Standard Operating Procedures, which describes the activities necessary to complete tasks in accordance with industry regulations, provincial laws or even just your own standards for running your business
What are the main different types of security controls?
Technical, Administrative, and Physical
What is the purpose of the Technical Security control?
Consists of the hardware and software components that protect a system against cyberattack. (i.e. Firewalls, Intrusion Detection Systems, Encryption, Identification and Authentication Mechanisms, etc.)
What is the purpose of the Physical security control?
to protect an organization’s physical assets from theft, vandalism, or unauthorized access. (i.e. Locks and Keys, Access Cards and Badges, Biometric Systems, Backup Generators, Alarm Systems, etc.)
What is a Brute Force attack?
a cyberattack that uses trial and error to gain access to an account or network by guessing passwords, login credentials, or encryption keys.
What does Key Stretching do?
a cryptography technique that makes a weak key, such as a password or passphrase, more secure.
What does Key Rotation do?
the process of regularly replacing encryption keys with new ones to reduce the risk of a key being compromised.
What is salting?
a cybersecurity technique that adds a random string of characters to a password before it is hashed and stored, making it more difficult for attackers to access passwords.
What is Symmetric Encryption?
a type of encryption key management solution where only one key (a secret key) is used to both encrypt and decrypt electronic data.
What is Asymmetric Encryption?
also known as public key cryptography, is a process that uses a pair of related keys – one public key and one private key – to encrypt and decrypt a message and protect it from unauthorized access or use.
What are Diffie-Hellman and RSA an example of?
methods used to securely exchange or establish secret keys across insecure networks.
How does the Diffie-Hellman Key Algorithm work?
The Diffie–Hellman (DH) Algorithm is a key-exchange protocol that enables two parties communicating over public channel to establish a mutual secret without it being transmitted over the Internet. DH enables the two to use a public key to encrypt and decrypt their conversation or data using symmetric cryptography.
How does the RSA Key Exchange work?
The sender encrypts the data with their public key, and the receiver decrypts it with their private key
What is a backout plan?
a strategy for reversing changes made to a system if they cause issues.
What is an impact analysis?
a process that examines the potential consequences of a change to a system, process, or project.