Chapter 1 - Mastering Security Basics Flashcards

1
Q

Availability

A

Indicates that data and services are available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Redundancy

A

Adds duplication to critical system and provides fault tolerance so if a critical component has a fault, the redundancy allows the service to continue without interruption.

-Disk redundancies (RAID)
-Server redundancies (virtualization can help)
-Network redundancies (NIC teaming)
-Power redundancies (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scalability and elasticity

A

Both contribute to high availability

Scalability refers to the ability of a system to handle increasing workload or demand by adding resources such as processing power, memory, or storage capacity. It measures how well a system can accommodate growth without sacrificing performance or efficiency.

Elasticity refers to the ability of a system to automatically or dynamically adapt to changing workload or demand by provisioning or releasing resources as needed. It involves scaling resources up or down based on demand in a flexible and automated manner. Often described in regards to cloud computing.

Scalability focuses on the ability of a system to handle growth by adding resources in a proactive manner, whereas elasticity focuses on the dynamic and automated adjustment of resources in response to changing demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Resiliency

A

The ability for systems to heal themselves or recover from faults with minimal downtime.

-Performing and testing full backups
-Backup power sources (UPS, generators)
-NIC teaming
-Redundant disk subsystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Managerial controls

A

Managerial controls are primarily administrative in function, typically documented in an organization’s security policy and focus on managing risk.

Two common managerial controls are:
-Risk assessments
-Vulnerability assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operational controls

A

Help ensure that the day-to-day operations of an organization comply with the security policy. People implement and execute them.

Operational controls include:
- Awareness and training
-Configuration management.
Baselines to ensure that systems start in a secure, hardened state.
-Media protection.
Physical media like USB flash drives, external and internal drives, and backup tapes
-Physical and environmental protection
Includes physical controls such as cameras, door locks, and environmental controls such as heating and ventilation systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Security Controls

A

Security controls are categorized as managerial (documented in written policies), operational (performed in day to day operations), or technical (implemented with technology).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technical Controls

A

Technical controls use technology such as hardware, software and firmware to reduce vulnerabilities.

Some examples include:
-Encryption
-Antivirus software
-IDS and IPS
-Firewalls
-Least privilege principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical controls and environmental controls

A

Include motion detectors and fire suppression systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventative controls

A

The primary goal of preventative controls is to prevent security incidents, some examples including:

-Hardening
-Training
-Security guards
-Change management (help prevent outages from configuration changes)
-Account disablement policy
-IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Detective controls

A

Attempt to detect when vulnerabilities have been exploited, resulting in a security incident. Detective controls discover the event after it has occurred. Examples include:

-Log monitoring
-SIEM systems (detect trends and raise alerts in real time)
-Security audit
-Video surveillance
-IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Corrective and recovery controls

A

Attempt to reverse the impact of an incident or problem after it has occurred.

-Backups and system recovery
-Incident handling process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical controls

A

Any controls you can physically touch:

-Bollards and barricades
-Access control vestibules
-Lighting
-Signs, fences, sensors and more

Can be multiple control types, ie locks are physical, deterrent and preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deterrent controls

A

Attempt to discourage a threat, to discourage potential attackers from attacking and from employees from violating a security policy

Deterrent and preventative often overlap

-Security guard
-Cable locks
-Physical locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Compensating controls

A

Alternative controls used instead of a primary control, such as requiring employees to use smart cards when authenticating on a system, but allowing new employees to access the network using a TOTP while their smart card gets made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Response controls

A

Commonly referred to as incident response controls, are controls designed to prepare for security incidents and respond to them once they occur; usually started by creating security policies then training personnel on how to respond to incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ping

A

Basic command to test connectivity for remote systems; can verify a system can resolve valid hostnames to IP addresses, test the NIC, and asset organizational security.

*Checks connectivity by sending Internet Control Message Protocol (ICMP) echo request packets, and remote systems answer with ICMP echo reply packets, which is how you know a system is operational.

  • Can be used for domain name resolution
    -Can be filtered out by Firewalls - admins often configure firewalls to block ICMP traffic or echo requests to prevent DoS attacks. Can use the ping command to check the effectiveness of your IPS or firewall.
18
Q

Hping

A

similar to ping but can send the pings using TCP, UDP and ICMP - helpful in identifying if a firewall is blocking ICMP traffic, but is only available on Linux-like systems.

19
Q

ipconfig and ifconfig

A

ipconfig on Windows

-Shows the TCP/IP configuration information for a Windows system, including items such as the computer’s IP address, subnet mask, default gateway, MAC address and address of a DNS server.
-Shows the configuration info for all NICs on a system, including wired and wireless NICs. Often used by technicians for troubleshooting.

ifconfig on Linux (“interface configuration”), has more capabilities than ipconfig

EXAMPLES:
- ipconfig: provides basic info on the NIC, such as the IP address, subnet mask and default gateway

-ipconfig /all and ifconfig -a
Shows a comprehensive listing of TCP/IP configuration info for each NIC, including the MAC address, addressed of assigned DNS servers, and address of a DHCP server if the system is a DHCP client.

NEED SUDO ON LINUX FOR:
-ifconfig eth0
shows the configurations of the first ethernet interface (NIC) on a Linux system. If the system has multiple NICs you can use eth1, eth2 etc, and also use wlan0 to view information on the first wireless interface.

-ifconfig eth0 promisc
Enables promiscuous mode on the first Ethernet interface, which allows a NIC to process all traffic it receives. Normally a NIC is in non-promiscuous mode, and it ignores all packets not addressed to it. Disable this with ifconfign eth0 -promisc

-ifconfig eth0 allmulti
Enables multicast mode on the NIC, allowing the NIC to process all multicast traffic received by the NIC.

*Normally a NIC uses a non-promiscuous mode and only processes packets addressed directly to its IP address. You would want to see all traffic on a system if using a protocol analyzer

20
Q

ip instead of ifconfig

A

Many Linux distros have deprecated ifconfig command and recommand using “ip” command instead, which displays info and configures network interfaces but doesnt use the same commands or have the same abilities like using a promiscuous mode.

sample commands:

-ip link show
Shows the interface along with some details on them

-ip link set eth0 up
Enables a network interface

-ip -s link
Shows statistics on network interfaces

21
Q

Netstat

A

Alllows you to view statistics for TCP/IP protocols on a system and gives you the ability to view active TCP/IP network connections.

Many attacks establish connections from an infected computer to a remote computer, which you can identify via netstat if you expect this.

Netstat displays the state of a connection, such as ESTABLISHED, to indicate an active connection.

22
Q

tracert and traceroute

A

tracert command lists all the routers between two systems, with each router referred to as a hop, in addition to the RTT (round trip time) for each hop. Used by Windows systems.

Linux systems use traceroute.

Used by network admins to identify faulty routers on the network.

23
Q

pathping

A

combines the functions of the ping and tracert commands to locate potential problems between two systems - problems on any hops or problems on any of the segments between two hops.

24
Q

Arp

A

command line tool that is related to the Address Resolution Protocol; however “arp” the command and ARP the protocol are not the same thing.
-ARP resolves IP addresses to MAC addresses and stores the result in the ARP cache.

*arp command is used to view and manipulate the ARP cache

25
Q

LAMP

A

LAMP stack is an open source stack used by many organizations hosting web servers which is an acronym, for Linux, Apache, MySQL, PHP or Perl or Python.

Linux = OS
Apache = web server application
MySQL = database management system
–>Developers create dynamic webpages with scripting languages such as PHP, Perl or Python.

26
Q

cat

A

Command is used to display contents of a file.

Short for concatenate, t

27
Q

grep

A

Command used to search for a specific string or pattern of text within a file.

Short for globally search a regular expression and print

EX:
sudo grep “authentication failure” /var/log/auth.log
–> this shows only the entries with the text “authentication failure”

or

sudo cat /var/log/auth.log | grep “authentication failure”
–> this reads the file with cat and then pipes the results to the grep command

28
Q

head

A

command that allows you to only see the beginning of a file.

By default it only shows the first 10 lines of a file.

29
Q

tail

A

command that allows you to see the end of a file, displaying the last 10 lines by default.

sudo tail -n 15 theodyssey.txt

*the -n switch/operator specifies how many lines to display

30
Q

logger

A

command used to add entries to the /var/log/syslog file from the terminal or from scripts and applications.

Sometimes used by admins before performing an operation such as when starting a backup operation:

logger backup started
–> gives you a timestamped entry with the text of “backup started”

31
Q

journalctl

A

command that queries the Linux system logging utility (journald) and displays the log entries from several source. You can’t query journald directly because it stores log data in binary format, but jornalctl displays the data as text.

*If you enter the command by itself it displays all journal entries which can be extensive, but you can limit the output in various ways:

journalctl –since “1 hour ago”

journalctl –list-boots

32
Q

chmod

A

command used to modify permissions on Linux system files or folders (short for “change mode”). Any file can have read, write and execute permissions.

R= can open file and view contents
W= can modify the contents, generally combined with read (2)
X= can launch the file and is used with executable files (1)

1st permissions =owner -u
2nd= group -g
3rd = other (everyone else) - o

33
Q

Windows logs

A
  • Security log: functions as a security log, audit log, and access log, and records auditable events such as successes or failures (when actions performed by a user succeed or fail such as a login attempt)

-System log: records events related to the functioning of the OS, such as when it starts, when it shuts down, info on services starting and stopping, drivers loading or failing or any other system components.

-Application log: records events sent to it by applications or programs running on the system, such as warnings, errors and routine messages.

34
Q

Network logs

A

Record traffic on the network, and are on a variety of devices including routers, firewalls, web servers and NIDS/NIPS. Can manipulate the devices to log all traffic passing through the devices, all traffic it blocks or both. Helpful when troubleshooting connectivity issues.

Web servers typically log requests to the web server for pages:
-host (IP)
-user-identifier (name of user if known)
-authuser (login name of user if logged on)
-date
-request (actual request line sent by client)
-status (HTTP status code returned to client)
-bytes (byte length of reply)

35
Q

SIEM system

A

Security Information and Event Management systems provide a centralized solution for collecting, analyzing and managing data from multiple sources, useful in large enterprises with massive amounts of data and and activity to monitor. Can be installed on centralized systems or be dedicated hardware and often include:

-log collectors
-data inputs
-log aggregation
-correlation engine
-reports
-packet capture
-user behavior analysis
-sentiment analysis
-security monitoring
-automated triggers
-time synchronization
-event deduplication
-logs/WORM

36
Q

syslog

A

the syslog protocol specifies a general log entry format and the details on how to transport log entries.

You can deploy a centralized syslog server to collect syslog entries from a variety of devices in the network similar to how a SIEM server collects log entries.

syslog -ng and rslog are two additional open source software utilities used instead of syslogd on Linux-like systems and provide additional extensions.

37
Q

NXLog

A

another log management ool and is similar to rsyslog and syslog -ng, however it supports log formats for Windows such as event log entries, and can be installed on both systems. Functions as a log colleector and can integrate with most SIEM systems.

38
Q

Linux logs

A

common Linux logs are located in the /var/log/ directory. You can view logs in the System Log Viewer on Linux systems or by using the cat command from the terminal.

39
Q
A
40
Q
A