chapter1b Flashcards

1
Q

Change Management

A

Process of making sure changes are made smoothly and efficiently and do not negatively affect systems reliability, security, confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Impact Analysis

A

The identification of all work products affected by a change, including an estimate of the resources needed to accomplish the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sandbox Testing

A

Isolated testing environment; no connection to the real world or production system; a technological safe space; use before making a change to production; try the upgrade, apply the patch; test and confirm before deployment; confirm the rollback plan; move everything back to the original; a sandbox can’t consider every possibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Maintenance Window

A

The time period in which a change is expected to be implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technical Change Management

A

Put the change management process into action.; Execute the plan; There’s no such thing as a simple upgrade; Can have many moving parts; Separate events may be required; Change management is often concerned with ‘what’ needs to change; The technical team is concerned with ‘how’ to change it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allow/Deny list

A

A list of applications that can or cannot be used on the network. Applications can have known vulnerabilities and introduce security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Downtime

A

Refers to a period of time when a system is unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Legacy Applications

A

Some applications were here before you arrived; They’ll be here when you leave; Often no longer supported by the developer; You’re now the support team; Fear of the unknown; Face your fears and document the system; It may not be as bad as you think; May be quirky; Create specific processes and procedures; Become the expert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dependencies

A

The relationship between project activities. Changing one thing may affect many other processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Version Control

A

Track changes to a file or configuration over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Public Key Infrastructure

A

Policies and procedures that are responsible for creating, distributing, managing, storing, and revoking as well as performing other processes associated with digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric Encryption

A

An encryption method whereby the same key is used to encode and to decode the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric Encryption

A

Used in public key encryption, it is a scheme in which the key to encrypt data is different from the key to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transparent Encryption

A

Encrypt all database information with a symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Record level Encryption

A

Used when not all of the data is sensitive. Encrypting individual columns. Use separate symmetric keys for each column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transport Encryption

A

Protecting data traversing the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virtual Private Network (VPN)

A

A private data network that creates secure connections, or ‘tunnels,’ over regular Internet lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Key Stretching

A

A technique that is used to mitigate a weaker key by increasing the time needed to crack it. Uses Hashing, salting, and further encryption

19
Q

Key Exchange

A

Any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm.

20
Q

Out of Band Key exchange

A

Sending an encryption key to someone through telephone, courier, in person. Not over the web

21
Q

In band key exchange

A

Sending an encryption key through the network. The key must be protected with additional encryption.

22
Q

Session Key

A

A key that is used for a short period of time

23
Q

Trusted Platform Module (TPM)

A

A standardized piece of hardware designed to perform cryptographic operations. Found on most modern motherboards. Can be used to generate random numbers and cryptographic keys. Has keys that were created and burned into the persistent memory of the device.

24
Q

Hardware Security Module (HSM)

A

A device used to securely store thousands of cryptographic keys. Often used in clusters with power redundancies. Used in large environments like data centers.

25
Q

Key Management Systems

A

Used to manage many different keys from a single management console. Also keeps all the keys separate from the data that it is trying to protect.

26
Q

Secure Enclave

A

A protected area for our secrets that is isolated from the main processor. Has its own boot ROM and monitors the system boot process. Has a true random number generator. Can perform real-time encryption, has built-in root cryptographic keys, and performs AES encryption in hardware.

27
Q

Obfuscation

A

The action of making something obscure, unclear, or unintelligible

28
Q

Steganography

A

The art and science of hiding information by embedding messages within other, seemingly harmless messages

29
Q

Covertext

A

In Steganography, the container document or file that contains hidden info

30
Q

Tokenization

A

The process of replacing sensitive data with unique identification symbols. The original data and token are not mathematically related.

31
Q

Data Masking

A

Hiding parts of the original data

32
Q

Salt

A

Random data added during the hashing process.

33
Q

Rainbow table

A

A table of hash values and their corresponding plaintext values

34
Q

Blockchain Technology

A

A distributed ledger available for anyone to see, which keeps track of transactions.

35
Q

Public Key Certificate

A

Data that associates a public key with a specific owner, signed by a CA that attests to its correctness

36
Q

X.509

A

The most widely accepted format for digital certificates

37
Q

Root of Trust

A

Hardware or software components that are inherently trusted

38
Q

Certificate Authority (CA)

A

A trusted internal or third party authority that vouches for websites by digitally signing them

39
Q

Private Certificate Authority

A

An internal or digital certificate management system

40
Q

Wildcard Certificates

A

Allow all of the subdomains to use the same public key certificate and have it displayed as valid

41
Q

Subject Alternative Name (SAN)

A

Allows a certificate owner to specify additional domains and IP addresses to be supported. An extension to the X.509 Certificate

42
Q

Certificate Revocation List (CRL)

A

A repository that lists revoked digital certificates. Used to decommission a web server’s certificate.

43
Q

Online Certificate Status Protocol (OCSP)

A

A protocol that performs a real-time lookup of a certificate’s status.

44
Q

OCSP Stapling

A

Allows the certificate holder to get the OCSP record from the server at regular intervals and include it as part of the SSL or TLS handshake