comptia security Flashcards
EAP
extensible authentication protocol
802.1X
802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network. The user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server
SRTP
secure real time transport protocol - to encrypt and provide authentication for RTP - real time transport protocol traffic - used for audio/video streaming
HIDS
host based intrusion detection system
sw installed on the system to detect attacks
HIPS - host based intrusion prevention system is an extension of a HIDS to detect and block attacks
HIPS
extension of HIDS // host based intrusion prevention system
mail gateway
- is placed between an email server and the internet and it can filter out spam (spam filter)
- typically includes DPL (data loss prevention) capabilities
- can inspect the contents of outgoing traffic looking for key words and block any traffic containing proprietary data
reverse proxy
protects an internal web server
media gateway
converts data from one format to another such as telephony traffic to IP-based traffic
web application firewall
protects a web server
SSID
service set identifier
A service set identifier (SSID) is a unique identifier assigned to a wireless network. It allows devices on the network to identify and connect to the correct network. Most SSIDs are case-sensitive and can be up to 32 characters long
WEP
wired equivalent privacy
WPA2
Wi-Fi protected access II
NAC
network access control - can inspect VPN clients for health status, e.g. having up to date OS and antivirus sw
after they connect to a network
PaaS
platform as a service - a cloud computing model that provides cloud customer with a preconfigured computing platform they can use as needed
- provides an easy to configure OS and on demand computing
–> IaaS and SaaS
PAP
password authentication protocol - an older one where pwds are sent across the network in cleartext –> CHAP, MS-CHAPv2
passive reconnaissance
a penetration testing method used to collect information, typically uses open-source intelligence –> active reconnaissance
pass the hash
pwd attack that captures and uses the pwd hash, attempts to log on as the user with the hash commonly associated with the Microsoft NTLM protocol
PBKDF2
pwd based key derivation function 2
- a key stretching technique that adds additional bits to a pwd as a salt
- it helps prevent brute force and rainbow table attacks
NTLM
new technology LAN manager
a suite of protocols that provide confidentiality, integrity and authentication within Windows Systems
versions: NTLM, NTLMv2, NTLM2 Session
nonce
a number used once
cryptography elements frequently use a nonce to add randomness
steganography
uses obfuscation to hide data within data
OCSP
online certificate status protocol
an alternative to using a CRL
allows to query a CA with the serial number of a certificate
CA answers with good, revoked, unknown
DLP
data loss prevention
can reduce the risk of emailing confidential info outside the organisation
Saas
sw as a service provides sw or applications such as webmail via the cloud
TPM
trusted platform module
provides full drive encryption
COPE
corporate owned personally enabled
mobile device deployment model
= MDM mobile device mgmt that gives centralized control over COPE
–> BYOD, CYOD
CYOD
choose your own device
a mobile device deployment model
employees can connect their personally owned device to the network as long as the device is on a preapproved list
=storage segmentation to protect company data on mobile devices owned by users
ISA
interconnection security agreement specifies technical and security requirements for planning, establishing, maintaining, and disconnecting a secure connection between two or more entities:
BETWEEN ANY FEDERAL AGENCY AND A THIRD PARTY INTERCONNECTING THEIR SYSTEMS
ALE
annual (annualized) loss expectancy
the expected loss for a year
it is used to measure risk with ARO and SLE in a quantitative risk assessment
SLE x ARO = ALE
ARO
annual (annualized) rate of occurrence
the number of times a loss is expected to occur in a year
it is used to measure risk with ALE and SLE in a quantitative risk assessment
SLE
single loss expectancy
the monetary value of any single loss
used to measure risk with ALE and ARO in a quantative risk assessment
SLE x ARO = ALE
S/MIME
secure/multipurpose internet mail extensions
popular standard used to secure email
provides:
confidentiality
integrity
authentication
non-repudiation
signature-based detection tool
type of monitoring used on intrusion detection and intrusion prevention systems
detects attacks based on KNOWN ATTACK PATTERNS documented as attack signatures
- signature based IDS systems use signatures similar to antivirus software
a unique identifier is established about a known threat so that the threat can be identified in the future
SIEM
security information and event mgmt
attempts to look at security events throughout the organisation
sideloading
copying an app package to mobile device
useful to developers when testing apps
shimming
driver manipulation method
uses additional code to modify the behaviour of a driver
Shibboleth
open source federated identity solution
SHA
secure hash algorithm
hashing function used to provide INTEGRITY
versions: SHA-1, SHA-2, SHA-3
SFTP
secure file transfer protocol
TCP port 22
an extension of SSH (secure shell) used to encrypt FTP traffic
session hijacking
an attack that attempts to impersonate a user by capturing and using a session ID
session IDs are store in COOKIES!!
SED
self-encrypting drive
secure boot
process that checks and validates system files during the boot process
TPM typically uses a secure boot process
it is a security system offered by UEFI
it is designed to prevent a computer from being hijacked by a malicious OS
under secure book UEFI is configured with digital certs from valid OS vendors
the system fw checks the OS boot loader using the stored certificate to ensure that the OS vendor has digitally signed it
this prevents a boot loader that has been changed by malware or an OS installed without authorization from being used.
the TPM can also be invoked to compare hashes of key system state data (boot fw, boot loader, and OS kernel) to ensure they have not been tampered with by a rootkit
SAML
security assertion markup language
XML-based standard used to exchange authentication and authorization information between different parties
SAML provides SSO for web-based application
SDN
software defined network
uses sw and virtualization technologies to replace hw routers
SDNs separate the data and control planes
LDAP
lightweight directory access protocol
used to communicate with directories such as microsoft active directory
it identifies objects with query strings using codes such as CN=Users and DC=GetCertifiedGetAhead
LDAPS
lightweight directory access protocol secure
used to encrypt LDAP traffic with TLS
bollards
short vertical posts that act as a baricade
block vehicles but not ppl
HVAC
heating
ventilation
air conditioning
- physical security control that increases availability by regulating airflow within DCs and server rooms
RTO
recovery time objective
the max amount of time it should take to restore a system after an outage
it is derived from the max allowable outage time identified in the BIA
bcrypt
a key stretching algorithm
used to protect pwds
bcrypt salts pwds with additional bits before encrypting them with Blowfish
this thwarts rainbow table attacks
BIA
bussiness impact analysis
includes info on potential losses
DRP
disaster recovery plan
includes methods to recover from an outage
symmetric encryption algorithms
AES - advanced encryption standard
DES - data encryption standard
RC4 - Rivest Cipher 4
hashing
provides integrity for digital signatures and other data
hash=checksum
hashing verifies integrity for data such as email, d/l files, and files stored on a disk
hash is a number created with a hashing algorithm
HASHES ARE ONE-WAY FUNCTIONS
digital signature
is a hash of the message encrypted with the senders private key but the encryption doesnt provide integrity
the digital signature provides non-repudiation which doesnt provide integrity
SHA-2
secure hash algorithm version 2
is used for integrity
ECC
elliptic curve cryptography has minimal overhead and is often used with mobile devices for encryption
key stretching techniques
1) PBKDF2 = pwd-based key derivation function 2
2) bcrypt
that salt pwds with additional bits to protect agains brute force attempts
OCSP
online certificate status protocol
provides real time responses to validate certs issues by a Certificate Authority (CA)
CRL
certificate revocation list
includes a list of revokes certs
DSA
digital signature algorithm
creates a digital signature
HMAC
hash based message authentication code
creates a hash
AUP
acceptable use policy
informs users of their responsibilities when using an organisations equipment
cognitive pwd attack
utilizes information that a person would know eg name of a first pet and use it to change the users pwd
–> Sarah Palin example
rainbow table attack
is a pwd attack that uses a DB of precalculated hashes
- PBKDF2 and bcrypt thwart rainbow table attacks
SRTP
- secure real-time transport protocol
- used to encrypt and provide authentication for RTP traffic
- used for audio/video streaming
honeynet
group od servers configured as honeypots
an 802.1x server
provides port-based authentication and can authenticate clients
clients that cant authenticate (eg guests) can be redirected to the guest network which grants them Internet access but not access to the internal network
NAT
network address translation
translates private IP addresses to public IP addresses
PEAP
protected extensible authentication protocol
an extension of EAP
sometimes used with 802.1x
PEAP requires a cert on the 802.1x server
PEM
privacy enhanced mail
common format for PKI certs
it can use either CER (ASCII) or DER (binary) formats and can be used for almost any type of certs
chroot
Linux command used to change the root directory
often used for sandboxing
chmod
linux admins use it to change permissions for files
FDE
full disk encryption
SED
self-encrypting drive
a drive that includes the hw and sw necessary to encrypt a hard drive
- users typically enter credentials to decrypt and use the drive
runtime code # compiled code
runtime code = code that is interpreted when it is executed
compiled code = has been optimized by an application and converted into an executable file
RADIUS
remote authentication dial-in user service
DNS
domain name system
DHCP
dynamic host configuration protocol
SCADA
supervisory control and data acquisition system
trojans
commonly create backdoors