Chapter 1: Getting Started Flashcards
What does OSI stand for?
Open Systems Interconnection
What does PDU stand for?
Protocol Data Unit
What are the 7 OSI Layers?
Top Down Order: All People Seem To Need Daily Planning
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
- Physical
What is the 1st OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Physical
- USB Standards, Bluetooth
- Bit
What is the 2nd OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Data Link
- ARP, CDP, PPP
- Frame
What is the 3rd OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Network
- IP
- Packet
What is the 4th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Transport
- TCP. UDP
- Segment
What is the 5th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Session
- x.225, SCP, ZIP
- Data
What is the 6th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Presentation
- AFP, NCP, MIME
- Data
What is the 7th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Application
- FTP, HTTP, SMTP
- Data
What are the 4 TCP/IP Layers?
- Application
- Transport
- Internet
- Network Access
Which OSI Layer(s) are equivalent to the TCP/IP Network Access Layer?
- Physical
- Data Link
Which OSI Layer(s) are equivalent to the TCP/IP Internet Layer?
Network
Which OSI Layer(s) are equivalent to the TCP/IP Transport Layer?
Transport
Which OSI Layer(s) are equivalent to the TCP/IP Application Layer?
- Session
- Presentation
- Application
How does the TCP handshake get initialized?
- SYN
- SYN-ACK
- ACK
What are the 5 security zones?
- Internet
- Internet DMZ
- Production Network Zone
- Intranet Zone
- Management Network Zone
Define vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
What are the vulnerability categories?
- misconfiguration
- default installations
- buffer overflows
- missing patches (unpatched servers)
- design flaws
- operating system flaws
- application flaws
- open services
- default passwords
Define hack value
The idea a hacker holds about the perceived worth or interest in attacking a target
Define zero-day attack
An attack carried out on a system or application before the vendor becomes aware and before a patch or fix action is available to correct the underlying vulnerability.
Define payload
The contents of a packet or specific malicious content an attacker delivers that is acted upon and executed by the system.
Define exploit
Software code, a portion of data, or a sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Define daisy chaining
A method of external testing whereby several sysstems or resources are used together to make an attack.
Define doxing
The process of searching for and publishing private information about a target (usually an individual) on the internet, typically with malicious intent.
What are the 5 sections of threat modeling?
- Identify Security Objectives
- Application Overview
- Decompose Application
- Identify Threats
- Identify Vulnerabilities
What does EISA stand for?
Enterprise Information Security Architecture
What is EISA?
A collection of requirements and processes that helps determine how an organization’s information systems are built and how they work.
What are the phases of risk management?
- Risk Identification
- Risk Assessment
- Risk Treatment
- Risk Tracking
- Risk Review
Define asset
Any item of value or worth to an organization, whether physical or virtual.
Define threat
Any circumstance or event with the potential to adversely impact organizational operations, organizational assests, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
Define security controls
Safeguards or countermeasures to avoid, counteract or minimize security risks.
Define risk
The potential for damage to or loss of an IT asset
Give an example of a preventive measure
Authentication
Give an example of a detective measure
Audit
Give an example of a corrective measure
Backups and restore
What does BIA stand for?
Business Impact Analysis
Define BIA
An organized process to gauge the potential effects of an interruption to critical business operations as a result of a disaster, accident, or emergency.
What does MTD stand for?
Maximum Tolerable Downtime
Define MTD
A measurement of the potential cost due to a particular asset being unavailable, used as a means to prioritize the recovery of assests should the worst occur.
What does BCP stand for?
Business Continuity Plan
Define BCP
A set of plans and procedures to follow in the event of a failure or a disaster, security related or not, to get business services back up and running.
Includes a DRP that addresses exactly what to do to recover lost data or services
What does DRP stand for?
Disaster Recovery Plan
Define DRP
A documented set of procedures to recover business infrasstructures in the event of a disaster.
What does ALE stand for?
Annualized Loss Expectancy
Define ALE
A measurement of the cost of an asset’s value to the organization and the monetary loss that can be expected for an asset due to risk over a one-year period.
What is the equation for ALE?
ALE = ARO * SLE
ARO = Annualized Rate of Occurance
SLE = Single Loss Expectancy
What does ARO stand for?
Annualized Rate of Occurance