Chapter 3 Flashcards

1
Q

Storage types

A

three specific types of storage: long-term, ephemeral, and raw storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Volume storage
Object based storage
database

A

volume: file storage , block storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threats to cloud storage:
Long term

A

Long term storage threat:
threats include exposure and malicious access due to credential theft or compromise or privilege escalation, risks to the integrity of the data due to issues with the underlying service, and exposure of the data due to attacks against the encryption protecting it. They can also include denial of service and service outages and attacks that deny access to the data, like cryptographic malware–style attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threats to cloud storage:
Ephermal storage

A

sares the same risks and also presents risks to the incident response and forensics process, as ephemeral systems and storage devices may be automatically destroyed or removed when those systems are terminated. Since many environments automatically scale as needed, this means that forensic artifacts may be lost unless they are intentionally preserved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats to cloud storage:
raw storage

A

it may be allocated directly on devices. In some cloud systems, reallocation of raw storage has left fragments of data available to the next user of that block storage. While that has been remediated in major cloud providers’ infrastructure, that type of risk is another reason to always encrypt data throughout cloud infrastructure so that inadvertent exposure of your storage does not result in a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threats to cloud storage
Side channel attacks

A

side channel attacks that operate outside of your environment. Information may be available to attackers or insiders who can perform network traffic capture or even physical theft of the underlying servers or media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keys and secrets management

A

level of protection
key recovery
key distribution
key revocation
key escrow
key lifetime
outsourcing key mgmt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

certificate management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing

A

That means that hashes are used for a variety of purposes, including checking if a file has changed, storing and retrieving data quickly, and a variety of other purposes. It’s important to note that hashing is not encryption, although the two are often confused. Hashes are one-way functions that don’t have keys like regular encryption. This means you can’t decrypt a hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Masking, Obfuscation, Anonymization, and Tokenization

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Randomization

A

The replacement of the data or part of the data with randomized information. Randomization is useful when you want to remove the real data but maintain its attributes, including things like the length of the string, its character set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anonymization

A

The replacement of the data or part of the data with randomized information. Randomization is useful when you want to remove the real data but maintain its attributes, including things like the length of the string, its character set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing

A

Hashing involves using a one-way cryptographic function to create a digest of the original data. Using a hash algorithm to obscure the data gives you the benefit of ensuring it is unrecoverable while retaining the ability to reference the data uniquely. That means that hashes are sometimes used to mask or anonymize data when the data content itself is not important for a field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shuffling

A

Using different entries from within the same dataset to represent the data. This has the obvious drawback of using actual production data but can help to create more realistic test data. A shuffled user field might have a randomized first name, last name, address, and other data from an existing dataset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Masking

A

Hiding the data with useless characters; for example, showing only the last four digits of a Social Security number: XXX-XX-1234

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tokenization

A

Tokenization involves replacing sensitive data with a replacement value called a token. Hashes are sometimes used to create tokens, although they’re rarely direct hashes of the data, to avoid attacks against hashes using generated datasets.