CompTIA A+ 1102 Security Flashcards
- contains a small RFID key
- contactless
- replaces a physical key
- utilizes proximity operationality
Key Fobs
- provide certificate based authentication
- requires a smart card reader to authenticate
Smart Cards
Does bio-metric authentication store an image of your unique bio-metric?
no, bio-metric authentication is usually stored as a mathematical representation.
- metal detectors
- provides passive scanning
Magnometers
MDM
Mobile Device Management (acronym)
provides centralized management for company owned and user owned devices
MDM
rights and permissions should be set to the bare minimum for both user accounts and applications.
Rule of Least Privilege
ACL
Access Control Lists (acronym)
- used to allow or deny traffic
- also used by operating systems
- commonly used on the ingress or egress of a routing interface
ACL
Phishing
- social engineering with a touch of spoofing
- often delivered by email or over text
Vishing
Voice Phishing (acronym)
- phishing that occurs over the phone or through voicemail
- caller ID spoofing is common
Vishing
Spear Phishing
targeted phishing, using insider information
spear phishing the CEO of a company
Whaling
- uses an authorized person to gain unauthorized access to a building
- the attacker does not have consent
Tailgating
- uses an authorized person to gain unauthorized access to a building
- unlike tailgating, the attacker does have consent
- for example, the attacker is holding donuts and asks to have the office door held for them
Piggybacking
- an attack type that exploits a vulnerability, known to the attackers, but unknown to the application’s/system’s/device’s vendor and support team are aware of it
- utilizes exploit code
Zero-Day Attacks
- also known as a man-in-the-middle attack
- the attacker sits in between your system and the network, and redirects your traffic
On-Path Attacks
ARP
Address Resolution Protocol (acronym)
ARP Poisoning
- utilizes spoofing
- an on-path attack that occurs on the local IP subnet
- due to ARP’s lack of security features
- the man-in-the-middle is on the local device, in the browser
- the attacker uses the advantage of encrypted traffic being so easy to proxy
- malware, often a trojan horse does all of the proxy work
On-Path Browser Attacks
- represent data as a fixed-length string of test
- will likely not have a collision (match another hash)
- makes it impossible to recover an original message from the digest
- without knowing the hash, the hashing method, etc.
- SHA-256 is a common hashing method.
- different operating systems and applications use different hash algorithms.
Hashes and Hashing a Password
Brute Force Attacks
- a form of password attack where attackers try every single possible password combination, until the password’s hash is matched
- time consuming
- also requires a large amount of computing power and resources
- adding your own code into a data stream
- enabled due to bad programming
- many different data types
Code Injection