Chapter 1: Intro to Security Flashcards
Universally Connected Devices
Almost all devices are now connected up to the internet. This allows people from anywhere to have the ability to attack any connected device.
Increased Speed of Attacks
More tools allows for quicker scans. Many attacks can be automated
Greater sophistication of attacks
Attacks use common protocols or tools to send malicious packets. Hard to distinguish from legitimate traffic.
Availability/Simplicity of attack tools
Attackers use to have to know an extensive knowledge of networks, computers and programming capabilities. Now they need an internet connection. (Backtrack, Kali)
Faster Detection of Vulnerabilities
Software weaknesses can be uncovered and exploited with new software tools and techniques.
Delays in Patching
Hardware and software vendors can have trouble trying to constantly fix exploits.
Weak Patch Distribution
Some software vendors lack ability to distribute security patches in a timely fashion. No notification for users that updates are available.
Distributed Attacks
Make it impossible to stop an attack since it’s not coming from a single source. (Botnets)
User Confusion
Users are sometimes tasked with making decisions regarding computer security with little or no information to guide them.
Ex. “Do you want to view only content that was delivered securely?
“Is it safe to quarantine this attachment?”
CIA Triad
Confidentiality,Integrity,Availability
AAA
Authentication,Authorization,Accounting
HIPAA
Health Insurance Portability and Accountability Act
HIPAA Title II
The Privacy Rule Transactions and Code Sets Rule Security Rule Unique Identifiers Rule Enforcement Rule
Sarbox
A reaction to a rash of corporate fraud, the (Sarbox) is an attempt to fight corporate corruption.
Covers the corporate officers, auditors, and attorneys of publicly traded companies.
Requires stringent reporting requirements and internal controls on electronic financial reporting systems.
Consequences for willfully and knowingly certify false financial reports can be fined up to $5 million and serve 20 years in prison.
Attacker Methodology
Probe for Info: The first step of an attack
This reconnaissance is essential to provide information, such as the type of hardware used, version of software or firmware and personal info about users.
Ping sweeps: determine if a system responds
Port scanning: determining which ports may be accessible