Cybersecurity Flashcards
Name 5 of the top 10 OWASP vulnerabilities.
Injection Broken Authentication, Sensitive Data Exposure, XML External Entities, Broken Access Control
Name 5 more of the top 10 OWASP vulnerabilities
Security Misconfiguration, Cross-Site Scripting, Insecure Deserialization, Components with Known Vulnerabilities, Insufficient Logging and Monitoring.
What is OPSEC?
A systematic and proven process intended to deny to potential adversaries information about capabilities and intentions by identifying, controlling, and protecting generally unclassified evidence of the planning and execution of sensitive activities. The process involves five steps: (1) identification of critical information; (2) analysis of threats; (3) analysis of vulnerabilities; (4) assessment of risks; and (5) application of appropriate countermeasures.
Explain the MITRE ATT&CK Framework.
The MITRE ATTACK Framework is a curated knowledge base that tracks cyber adversary tactics and techniques used by threat actors across the entire attack lifecycle. The framework is meant to be more than a collection of data: it is intended to be used as a tool to strengthen an organization’s security posture.
What are FIPS 140-3 compliant ciphers and methods?
See attached
FIPS MAC Algorithms
See attached
FIPS approved for digital signatures
See attatched
What security standards does the Netherlands use?
EU Directive on Security Network and Information Systems (Directive (EU) 2016/1148
The Proposal for a Regulation of the European Parliament and of the Council on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020 (‘the Cyber Resilience Act’).
The NIS Implementation Act: The NIS Directive was implemented, on 17 October 2018, by the Network and Information Systems Security Act 2018 (only available in Dutch here) (‘the NIS Implementation Act’). Following the passage of the NIS Implementation Act, the Decree Laying Down Rules for Implementing the Network and Information Systems Security Act
The Cybersecurity Act
Regulation (EU) 2019/881 on ENISA (the European Union Agency for Cybersecurity) and on Information and Communications Technology Cybersecurity Certification and Repealing Regulation (EU) No.526/2013 (‘the Cybersecurity Act’)
Explain Cybersecurity regulatory authority.
In the Netherlands, there is no single all-encompassing regulatory authority tasked with the supervision of national cybersecurity. As indicated by the various laws detailed in the previous section of this Guidance Note, the competences in this field are scattered. Against this background, the following authorities are most relevant in the domain of cybersecurity regulation.
Authorities designated under the NIS Implementation Act
The NIS Implementation Act designates a number of national authorities to supervise compliance with its provisions. The AT supervises compliance with, and is able to take enforcement actions in relation to, the duty of care and the duty to report incidents under the NIS Implementation Act. Operators of essential services fall under the AT’s ‘active’ supervision policy. This means that the AT carries out planned inspections that are aimed at checking the set-up, existence and functioning of the risk management process, and the adoption of appropriate control measures. With regard to digital service providers, the AT applies ‘reactive’ supervision, meaning that inspections take place on the basis of incidents and signals received.
While some operators of essential services are subject to the supervision of the AT, others are subject to the supervision of sectoral regulatory authorities. For example, if an operator of essential services operates in the financial infrastructure sector, the DNB is the competent regulatory authority instead of the AT. Such sectoral regulatory authorities are also competent to enforce the NIS Implementation Act.
On the basis of the NIS Implementation Act, a supervisory authority has a number of powers, including the power to impose administrative fines.
Furthermore, there are two organisations that have taken on the role of the Computer Security Incident Response Team (‘CSIRT’) for the Netherlands, as provided for in the NIS Directive. The relevant organisations are:
the National Cybersecurity Centre (‘NCSC’), which acts as a CSIRT for operators of essential services; and
the Digital Service Providers CSIRT (‘CSIRT-DSP’).
Finally, the Minister of Justice and Security (‘MJS’) is responsible for performing the role of the ‘point of contact’ as set out in the NIS Directive.
The CSIRT and the point of contact are not competent to enforce the NIS Implementation Act.
The NIS2 Directive will streamline reporting obligations and introduce more stringent supervisory measures for national authorities and enforcement requirements, including harmonised sanctions across the EU.
What are the steps in incident response?
Prepare, Detection and Reporting, Analysis and Triage, Containment, Recovery, Lessons Learned
Explain threat hunting.
the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.
What is the OODA Loop?
Helps us make strategic decisions. Has 4 phases and acts a feedback loop. Observe, Orient, Decide, Act. Defenders and attackers operate an various speeds to complete their objectives. Intelligence speeds up how quickly we can complete the defender’s OODA loop.
What is the Cybersecurity NICE Framework
The NICE Framework is the foundation for increasing the size and capability of the U.S. cybersecurity workforce. It breaks down roles, knowledge, skills, and responsibilities across various tasks. The NICE Framework comprises seven categories (Securely Provision, Operate and Maintain, Oversee and Govern, Protect and Defend, Analyze, Operate and Collect, and Investigate) POOP DACI. There are 33 specialty areas and 52 work roles
Key to role of cyber threat analyst?
Provide timely, relevant, actionable insights on threat actors, capabilities, motivation, and threat environment to inform risk exposure and necessary defensive actions. TRAIT CaME
What are the three audiences for threat hunting?
Strategic, Operational, and Tactical. Strategic = CIO, Operations = Red Team, Forensics, Tactical = Security Operations Center.