Chapter 2: Access Control Attacks and Monitoring Flashcards

1
Q

What is a risk?

A

A risk is the possiblity or likelihood that a threat will exploit a vulnerability resulting in a loss such as harm to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat?

A

A threat is a potential occurrence that can be caused by anything or anyone and can result in an undesirable outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a vulnerability?

A

Any type of weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is threat modeling?

A

The process of identifying, understanding, and categorizing potential threats. Threat modeling should begin early in the design process of a system and continue through its life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SD3+C, and what are its goals?

A

A motto which states: “Secure by Design, Secure by Default, Secure in Deployment and Communication”.

Its goals are:

  1. To reduce the number of security-related design and coding defects.
  2. To reduce the severity of any remaining defects.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the approaches to threat modeling?

A
  1. Focused on assets
  2. Focused on attackers
  3. Focused on software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is vulnerability analysis?

A

Attempting to discover weaknesses in systems against potential threats. It’s an ongoing process including both technical and administrative steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a dictionary attack?

A

A dictionary attack is an attempt to discover passwords by using every possible word in a predefined databas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a one-upped constructed password?

A

A password in which a single character differs from its original form. password -> password1, for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a brute force attack? A hybrid attack?

A

A brute force attack attempts to discover passwords by trying all possible combinations. A hybrid attack attempts a dictionary attack first, then moves on to brute forcing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a rainbow table?

A

A large database of precomputed hashes for guessed passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you combat rainbow tables?

A

Use salt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is salt?

A

Additional random bits added to a password before hashing it. This can dramatically increase the size needed for rainbow tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the methods to prevent access control attacks?

A
  1. Control physical access to systems
  2. Control electronic access to password files
  3. Encrypt password files
  4. Create a strong password policy.
  5. Use password masking
  6. Deploy multifactor authentication
  7. Use account lockout controls
  8. Use last logon notification
  9. Educate users about security
  10. Audit access controls
  11. Actively manage accounts
  12. Use vulnerability scanners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are access review audits for?

A

Checking that users do not have excessive privilieges and that accounts are managed appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are user entitlement audits?

A

Discovering when users have been granted excessive privileges or otherwise violate security policies related to user entitlement.

17
Q

What are dual administrator accounts?

A

Requiring administrators to have two accounts, one privileged and one not. The non-priv account is used for day to day activities, basically anything that doesn’t require privilege. This can mitigate the harm from attacks.