Chapter 4 Difficult Concepts Flashcards
Bluejacking
sending prank unsolicited messages
Bluesnarfing
unauthorized access to steal information like contacts, call logs etc on a device
blue bugging
attackers gain full control of a device
bluesmack
dos
blueborne
spread through theair to infect devices
enhanced open
aka opportunistic wireless encryption
provides individualized data encryption even in open networks
protects people in open wifi scenario
used by wpa3
SAE
A
simultaneous authentication of equals
replaces the 4 way handshake with a diffie hellman key
protects against offline dictionary attacks
Management Frame protection
ensures integrity of network management traffic
prevents eavesdropping, forging and tampering with management frames
used by wpa3
RADIUS
remote authentication dial in user service
offers authentication, authorization and accounting services
widely used for secure access to network resources
EAP
extensible authentication protocol
authentication frameowkr supporting multiple method
EAP FAST
T (Extensible Authentication Protocol-Flexible Authentication via Secure
Tunneling)
● Developed by Cisco Systems for secure re-authentication
Data Owner
a senior exec who labels info assets
Data Controller
entity responsibly for storage,
collection and usage
Data Processor
a group or individual hired by the data controller to assit with tasks like data collection and processing
Data Custodian
manages systems where data is stored
, enforces encryption, access controls
etc
Data Steward
A
focuses on data quality and metadata ensuring data is appropriately labeled and classifie
Certification
acts as proof data was properly disposed of
Degaussing
:
renders storage medium useless
uses magnetic fields to destroy storag
storage erase
implemented in firmware
of storage devices, now deprecated in favor
of cryptographic erase
NIST Special Publicaion 800-88
guidelines for media sanitization
Threat intelligence feeds
collected and disseminated by security researchers
EF
exposure factor A quantifiable metric to estimate the percentage of asset damageR
OpenVAS and Nessus
vulnerability scanning tool
SNMP/SNMP Manager Agent and Message Types
A
Simple Network Management Protocol (SNMP)
An Internet protocol used for collecting information from managed devices on IP
networks and modifying device behavior
Managed devices include the following
● Routers
● Switches
● Firewalls
● Printers
● Servers
● Client device
TRAP Granular
Sent TRAP messages get a unique object identifier OID) to
distinguish each message as a unique message being
received
OID
Unique object identifier used to identify variables
for reading or setting via SNMP
● Allows the manager to distinguish individual SNMP
trap messages
MIB
A
management info base
A hierarchical namespace containing OIDs and their
descriptions
● Describes the structure of device subsystem
management data
● Stores consolidated information received through
SNMP trap
Verbose TRAP
SNMP traps may be configured to contain all of the information about a given alert or event as a payload
oval
An SCAP language
ARF
XCCD
CCE
CPE
syslog
netflox
sflow
ipfix
MD5/SHA256 Checksum