D430 Flashcards

Fundamentals of Information Security - D430

1
Q

Software development vulnerabilities

(6)

A
  • Authentication attacks
  • Authorization attacks
  • Buffer overflows
  • Cryptographic attack
  • Input validation attacks
  • Race conditions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Incident response cycle

A

1- preparation
2- detection and analysis
3- containment
4- eradication
5- recovery
6- post incident activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of attacks [4]

A
  1. Interception: Unauthorized capturing of data, such as eavesdropping on network traffic.
  2. Interruption: Disruption of services or communication, leading to loss of availability, such as in a Denial of Service (DoS) attack.
  3. Modification: Unauthorized alteration of data, which can affect data integrity.
  4. Fabrication: Creation of fictitious data or transactions, leading to unauthorized insertion of data into systems.

Together, they represent a broad spectrum of security threats that can compromise the confidentiality, integrity, and availability of information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identification of critical information

A

1st step in the OPSEC process, arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What step is analysis of vulnerabilities?

A

3rd step in the OPSEC process: to look at the weaknesses that can be used to harm us

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DES
(Encryption)

A

Data Encryption Standard (DES). While DES was once widely used and considered secure, advancements in computing power made its 56-bit key vulnerable to brute-force attacks. As a result, DES is now considered obsolete, and more robust encryption algorithms like AES are recommended for secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Mamagement Steps

(5)

A

A constant process as assets are purchased, used and retired. The general steps are
1- identify assets
2- identify threats
3- assess vulnerabilities
4- assess risk
5- mitigating risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pretexting

A

a form of social engineering in which one individual lies to obtain confidential data about another individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

exploit framework

A

A group of tools that can include network mapping tools, sniffers, and exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

man-in-the-middle attack

A

a hacker placing himself between a client and a host to intercept communications between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Executable Space Protection

A

A hardware and software-based technology that prevents certain portions of the memory used by the operating system and applications from being used to execute code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Acceptability

A

A measure of how acceptable the particular characteristic is to the users of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

uniqueness

A

In cybersecurity, “uniqueness” refers to the quality of being distinct or one-of-a-kind within a specific context or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptographic attacks

A

a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rule-Based Access Control

A

A model that is based off of allowing or denying access based on a set of predetermined rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Packet sniffers

A

A network or protocol analyzer, is a tool that can intercept traffic on a network, commonly referred to as sniffing. Sniffing basically amounts to listening for any traffic that the network interface of our computer or device can see, whether it was intended to be received by us or not. Some examples might be Wireshark (GUI) or Tcpdump (command-line tool)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Nmap

A

A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner. (Network mapper)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Clean desk

A

A policy designed to ensure that all confidential or sensitive materials are removed from a user’s workspace and secured when the items are not in use or an employee leaves her workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

VPN (Virtual Private Network)

A

A private network that is configured within a public network such as the Internet. A secure connection between two systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

packet filtering

A

a process in which firewalls are configured so that they filter out packets sent to specific logical ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Operations Security

A

A process that we use to protect our information (encryption) OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Performance

A

A set of metrics that judge how well a given system functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPSEC

A

Internet Protocol security

A set of protocols developed to support the secure exchange of packets between hosts or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

sandbox

A

A set of resources devoted to a program, process, or similar entity, outside of which the entity cannot operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

AES

How many cyphers does it use? endorse by through?

A

A set of symmetrical block ciphers endorsed by the us government through NIST . Is used by a variety of organizations. It is the replacement for DES as the standard encryption for us government . Uses 3 different ciphers one a 128 bit key one 192-bit key and one 256- bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Caesar cipher

A

A substitution cipher that shifts characters a certain number of positions in the alphabet usually 3 .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ROT13

A

A substitution cipher that uses a key of 13. To encrypt a message, you would rotate each letter 13 spaces. To decrypt a message, you would rotate each letter 13 spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Firewalls

A

A system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use. It naturally creates network segmentation when installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Host Intrusion Detection System (HIDS)

A

A system used to analyze the activities on or directed at the network interface of a particular host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

hping3

A

A tool used to test the security of firewalls and map network topology.
- constructs specially crafted ICMP packets to evade measures to hide devices behind firewall
- scripting functionality to test firewall/IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Authorization attack

A

An authorization attack is a cybersecurity threat that exploits vulnerabilities in the application’s authorization processes. This type of attack occurs when an application’s authorization mechanisms are not properly implemented or adhere to best practices, allowing attackers to gain unauthorized access to system functions, data, or resources they should not have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Confused deputy problem

A

A type of attack that is more common in systems that use ACLs rather than capabilities; when software has greater permissions than user, the user can trick the software into misusing authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

ECC

cyber security

A

Elliptic Curve Cryptography (ECC) is a method for encrypting data and securing digital communications using the mathematics of elliptic curves. It offers high security with smaller key sizes compared to traditional systems like RSA, making it efficient for use in environments with limited resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Race conditions

A

A type of software development vulnerability that occurs when multiple processes or multiple threads within a process control or share access to a particular resource, and the correct handling of that resource depends on the proper ordering or timing of transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Wireshark

A

A widely used packet analyzer, network protocol analyzer, used for network troubleshooting, analysis, software and protocol development, and education.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Netstumbler

A

A Windows tool used to detect wireless access points. Does not have as full feature set as kismet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Network ACLs

A

Network Access Control Lists (ACLs) are a security measure used within a network to control the flow of traffic. Access controlled by the identifiers we use for network transactions such as ip address, MAC address and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Brewer and Nash model

A

aka Chinese Wall; Access control model designed to prevent conflicts of interest. Commonly used in industries such as financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Confidential

A

Allowing only those authorized to access the data requested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Read

A

Allowing us to access the contents of a file or directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

authenticity

A

Allows us to talk about the proper attribution as to the owner or creator of the data in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Clickjacking Attack

A

also calles UI redress attack; typically uses an inline frame, or iframe.
In a clickjacking attack, an attacker wraps a trusted page in an iframe that places transparent image over legitimate links, graphics or form fields. Causes client to execute a command differing from what they think they are performing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Symmetric Cryptography

A

Also known as private key. Utilizes a single key for both encryption of plain text and decryption of the cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Discretionary Access Control (DAC)
[access control model]

A

an access control model in which the subject has total control over any object that the subject owns along with the programs that are associated with those objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Role-Based Access Control (RBAC)

A

An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Privilege Escalation

A

An attack that exploits a vulnerability in software to gain access to resources that the user normally would be restricted from accessing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Phishing

A

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Clickjacking

A

An attack that tricks users into clicking something other than what they think they’re clicking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

XSRF

A

cross-site request forgery (XSRF)
An attack that uses the user’s Web browser settings to impersonate the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Dual-factor authentication

A

An authentication method that includes multiple methods for a single authentication transaction. Often referred to as “something you have and something you know,” when the factors include a device such as a smart card and a secret such as a password or PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Digital signature

A

an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Stream Cipher

A

An encryption method that encrypts data as a stream of bits or bytes. One bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Block Cipher

specify size

A

An encryption method that encrypts data in fixed-side blocks. Block size is 64 bits .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Anomaly-based detection

A

Analyzes the current traffic against an established baseline and triggers an alert if outside the statistical average

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Mobile devices

A

Any device that communicate via a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Threat

A

Any event being man-made, natural or environmental that could damage the assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The * property

A

Purpose: The Star Property is designed to maintain the confidentiality of information within the system.
Function: It restricts the ability of a subject to write information to a higher security level than the subject’s own level. This is known as “no write up.”
Objective: The primary aim is to prevent the flow of information from lower to higher security levels, ensuring that sensitive information is not inadvertently or maliciously leaked to levels that should not have access to it.

Simple Integrity Axiom (no write down, or “integrity property”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Anti-malware tools

A

applications detect threats in the same way as an IDS either by matching against a signature or by detecting anomalous activities taking place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Software tokens

A

Applications that generate OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Deep Packet Inspection Firewall

A

Are capable of analyzing the actual content of the traffic that is flowing through them. Can resemble the contents of the traffic to look at what will be delivered to the application that it is destined for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Multilevel Access Control

A

Multilevel Access Control (MAC) is a security mechanism that classifies users and data into different levels of security. It restricts access to information based on the clearance level of users and the classification of the information, ensuring that users can access only the data for which they have authorization, thereby enhancing data security. They are used where the simpler access control models that we just discussed are considered to not be robust enough to protect the information to which we are controlling access. Such access controls are used extensively by military and government organizations, or those that often handle data of a very sensitive nature. We might see multilevel security models used to protect a variety of data, from nuclear secrets to protected health information (PHI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

RAID

A

RAID (Redundant Array of Inexpensive Disks) is a technology used to protect against data loss due to hardware failures in individual disks. It involves configuring multiple disks in various setups to provide redundancy and improve data reliability. Additionally, data can be replicated from one machine to another over a network or backed up onto media such as DVDs or magnetic tapes for added security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Cross-Site Scripting (XSS)

A

Attack by placing code in the form of scripting language into a webpage, other media that is interpreted by a client browser including adobe flash and types of video files. When another person views the webpage or media they execute the code automatically and the attack is carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Interception

A

Attacks allows unauthorized users to access our data, applications, or environments. Are primarily an attack against confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Interruption

A

Attacks cause our assets to become unstable or unavailable for our use, on a temporary or permanent basis. This attack affects availability but can also attack integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Fabrication

A

Attacks involve generating data, processes, communications, or other similar activities with a system. Attacks primarily affect integrity but can be considered an availability attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Modification

A

Attacks involve tampering with our asset. Such attacks might primarily be considered an integrity attack, but could also be an availability attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Server-side attacks

A

attacks that exploit vulnerabilities on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Biometrics

A

Authentication factors that use physical features ( something that you are )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Network Segmentation

A

Breaking a network into pieces and putting various levels of security between those pieces. We can control the flow of traffic allowing or disallowing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Honeypots

A

can detect, monitor, and sometimes tamper with the activities of an attacker. are configured to deliberately display vulnerabilities or materials that would make the system attractive to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Proxy servers

A

Can serve as a choke point in order to allow us to filter traffic for attacks or undesirable content such as malware or traffic to Web sites hosting adult content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Intrusion Prevention System (IPS)

A

Can take action based on what is happening in the environment. In response to an attack over the network an ips might refuse traffic from the source of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Portscanners

A

check to see what ports are open
Nmap
Zenmap
Masscan
Netcat
Advanced IP Scanner
Angry IP Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Most common Wireless network security families

A

Chief method of protecting traffic is encryption. The encryption is used by 802.11 wireless devices. The most common wireless families are - wired equivalent privacy (wep) - Wi-Fi protected access ( wpa) - Wi-Fi protected access v2 (wpa2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

COPPA

A

Children’s Online Privacy Protection Act: a law that intends to keep children under the age of 13 protected from the collection of private information and safety risks online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

TCPDump

A

Command line packet sniffing tool . Runs on Linux and unx operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

kismet

A

Commonly used to detect wireless access points and can find them even when attempts have been made to make doing so difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

CFAA

A

Computer fraud and abuse act of 1986. A law to reduce the hacking and cracking of government or other sensitive institutions computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Parkerian hexad model

A

Confidentiality, integrity, availability, possession/control, authenticity, utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

compliance

A

Conforming to a rule, policy or law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

CAN-SPAM Act

A

Controlling the Assault of Non-Solicited Pornography and Marketing Act; protects consumers against unwanted email solicitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Attribute-based access control (ABAC)

A

Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Technical/ logical controls

A

Controls are devices and software that protect assets. Think of firewalls, av, ids, and ips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Physical controls

A

Controls are physical items that protect assets. Think of locks, doors, guards and fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Administrative controls

A

Controls are the policies that organizations create for governance. Ex: email policies

87
Q

Detective

A

Controls serve to detect and report undesirable events that are taking place (ex. Bulgar alarms)

88
Q

preventitive

A

Controls used to physically prevent unauthorized entities from breaching our physical security

89
Q

CSRF

A

Cross-Site Request Forgery is an attack that causes an end user to execute unwanted actions on a web application in which he or she is currently authenticated. Unlike with XSS, in CSRF, the attacker exploits the website’s trust of the browser rather than the other way around. The website thinks that the request came from the user’s browser and was actually made by the user. However, the request was planted in the user’s browser

90
Q

Protecting data at rest

A

Data is at ready when it is on a storage device of some kind and is not moving over a network, or a protocol

91
Q

DMZ

A

Demilitarized zone. Combo of network design feature and a protective device such as a firewall.
Placing a server in the DMZ (Demilitarized Zone) means positioning it in a separate network segment that acts as a buffer zone between the public internet and the organization’s internal network. The DMZ is exposed to the public internet, making it more accessible from the outside but also more vulnerable to attacks.

92
Q

Physical concerns for data

A

Depending on the type of physical media on which our data is stored, any number of adverse physical conditions may be problematic or harmful to their integrity. Such media are often sensitive to temperature, humidity, magnetic fields, electricity, impact, and more, with each type of media having its particular strong and weak points.

93
Q

circumvention

A

Describes the ease with which a system can be tricked by a falsified biometric identifier

94
Q

Certificates

A

Digitally signed electronic documents that bind a public key with a user identity.

95
Q

Deterrence

A

discouraging criminal acts by threatening punishment

96
Q

Secure Protocols

A

Easiest way we can protect our data

97
Q

E-FOIA

A

Electronic Freedom of Information Act. Requires agencies to provide the public with electronic access to any of their reading room records that have been created by them since November 1996

98
Q

Auditing

A

Ensuring that we have accurate records of who did what and when. Primarily focused on compliance with relevant laws and policies, and access to and from systems and sometimes physical security

99
Q

Execute

A

Execute the contents of the file

100
Q

Cryptographic

A

Existed before the modern computer . Used to simplify the use of encryption and made more computer encryption possible.

101
Q

FERPA

A

Family Educational Rights and Privacy Act. Protects the privacy of students and parents

102
Q

FISMA

A

Federal Information Security Management Act provides a framework for ensuring the effectiveness of information security controls in government

103
Q

Identify assets

A

First and most important part or risk management. Identifying and categorizing the assets we are protecting

104
Q

GLBA

A

Gramm-Leach-Bliley Act. Protects the customers of financial institutions, any company offering financial products or services

105
Q

Protecting data in use

A

Hardest to protect. Data is in use when a user is accessing the data.

106
Q

HITECH

A

Health Information Technology for Economic and Clinical Health Act. Created to promote and expand the adoption of health information technology specifically the use of electronic health records.

107
Q

HIPAA

A

Health Insurance Portability and Accountability Act. Purpose is to improve the efficiency and effectiveness of the health care system. Requires privacy protections for individuals health information

108
Q

Utility

A

How useful the data is to us

109
Q

Input validation attacks

A

If we are not careful to validate the input to our applications, we may find ourselves on the bad side of a number of issues, depending on the particular environment and language being used. A good example of an input validation problem is the format string attack. Could be used to crash an application or cause the operating system to run a command and potentially compromise the system.

110
Q

Bell-LaPadula Model

A

implements a combination of DAC and MAC and is primarily concerned with the confidentiality of the resource in question. Generally, in cases where we see DAC and MAC implemented together, MAC takes precedence over DAC, and DAC works within the accesses allowed by the MAC permissions.

111
Q

Personally Identifiable Information (PII)

A

information about an individual that identifies, links, relates, or describes them.

112
Q

single-factor authentication

A

Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested

113
Q

integrity

A

Keeping data unaltered by accidental or malicious intent

114
Q

Information security

A

Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction.

115
Q

hash function

A

Keyless cryptography. Do not use a key but instead create a unique and fixed length hash value based on the original message. (Like a fingerprint) a slight change to the message will change the hash

116
Q

Defense in depth

A

Layering of security controls is more effective and secure than relying on a single control

117
Q

Allowing access

A

Let’s us give a particular party or parties access to a given resource

118
Q

Assess Vulnerabilities

A

Look at potential threats. any given asset may have thousand or millions of threats that could impact it, but only a small fraction of the threats will be relevant

119
Q

Collectibility

A

Measures how easy it is to acquire a characteristic with which we can use later to authenticate a user

120
Q

Tools we need to defend our network

A

Network segmentation, firewalls, IDS/IPS , wireless secure protocols, VPNs, secure protocols, MDM, port scanners , packet sniffers, honeypots

121
Q

Buffer overflow

A

Occur when we do not properly account for the size of the data input into our applications

122
Q

arbitrary code execution

A

Occurs when an attacker is able to execute or run commands on a victim computer

123
Q

Vulnerability assessment tools

A

Often include some portion of the feature set we might find in a tool such as Nmap, are aimed specifically at the task of finding and reporting network services on hosts that have known vulnerabilities.

124
Q

Application of countermeasures

A

Once we have discovered what risks to our critical information might be present, we would then put measures in place to mitigate them. Such measures are referred to in operations security as countermeasures.

125
Q

Assess risks

A

Once we have identified the threats and vulnerabilities for a given asset we can access the overall risk

126
Q

Identify threats

A

Once we have our critical assets we can identify the threats that might effect them

127
Q

one time password

A

OTP passwords that expire after a time frame of after one time usage

128
Q

Improper or Inadequate Permissions

A

Particularly with Web applications and pages, there are often sensitive files and directories that will cause security issues if they are exposed to general users. One area that might cause us trouble is the exposure of configuration files due to improper or inadequate permissions.

129
Q

PCI DSS

A

Payment Card Industry Data Security Standard. Security standards designed to ensure all companies that accept , process, or transmit credit card information maintains a secure environment(not a law)

130
Q

Intrusion Detection System (IDS)

A

Performs strictly as a monitoring and alert tool, only notifying us that an attack or undesirable activity is taking place

131
Q

Hardware tokens

A

Physical devices that generate a one time password ( something you have )

132
Q

Intrusion Detection System (IDS)

A

Preforms strictly as a monitoring and alert toll. Only notifying us that an attack or undesirable activity is taking place

133
Q

The Biba model of access control

A

Primarily concerned with protecting the integrity of the data, even at the expense of confidentiality

134
Q

Password manager

A

Programs that store all of the users passwords with a master password

135
Q

Accountability

A

Provides us with the means to trace activists in our environment back to their source. Depends on identification, authentication, and access control being present so that we know who a given transaction is associated with, and what permissions were used to allow them to carry it out

136
Q

Asymmetrical Cryptography

A

Public key utilizes 2 keys. A public key and a private key. The public key is used to encrypt data sent from sender to receiver and is shared with everyone

137
Q

US Patriot Act

A

Purpose is to deter and punish terroists acts in the United States and around the world

138
Q

Mitigating risks

A

Putting measures in place to help ensure that a given type of threat is accounted for

139
Q

Stream cipher programs

A

RC4, ORXY, and SEAL

A stream cipher is a method of encrypting data where the plaintext is combined with a pseudorandom cipher digit stream (keystream), one bit or byte at a time. Unlike block ciphers, which encrypt data in fixed-size blocks, stream ciphers work with continuous streams of data, making them suitable for environments where data arrives in an unpredictable manner or where it’s impractical to implement block ciphers. Stream ciphers are known for their speed and simplicity in hardware or software implementations but require careful management of the keystream to maintain security.

140
Q

Recovery phase

A

Recover to a better state that we were prior to the incident or perhaps prior to when the issue started if we did not detect it immediately

141
Q

Nonrepudiation

A

Refers to a situation in which sufficient evidence exists to prevent an individual from denying that he or she has made a statement or taken action

142
Q

Limiting access

A

Refers to allowing some access to out resource, but only up to a certain point

143
Q

Possession/ control

A

Refers to the physical disposition of the media on which the data is stored

144
Q

Regulatory Compliance

A

Regulations mandated by law usually requiring regular audits and assessments

145
Q

Industry Compliance

A

Regulations or standards usually not mandated by law, it is designed for specific industries (e.g. PCI DSS)

146
Q

Residual Data

A

Rendering the data as inaccessible when it’s no longer required

147
Q

Incident response

A

Response to when risk management practices have failed and have cause an inconvenience to a disastrous event

148
Q

Our first concern when we plan physical security

A

Safety of people is our first concern when we plan physical security

149
Q

SOX

A

Sarbanes-Oxley Act. Regulates financial practices and governance corporations. Designed to protect investors and the general public by establishing requirements reporting and disclosure practices

150
Q

Gamification

A

Selective use of game design and game mechanics to drive employee engagement in non-gaming business scenarios.

151
Q

Denying access

A

Simply the opposite of granting access

152
Q

Protecting data itself

A

SLL&TLS are used to protect info sent over the network and over internet. The operate in conjunction with other protocols like internet message access protocol (IMAP) , post office protocol (POP) for email

153
Q

Malware

A

software that is intended to damage or disable computers and computer systems.

154
Q

Universality

A

Stipulates that we should be able to find our chosen biometric characteristics in the majority of people we expect to enroll in the system

155
Q

Lack of input validation

A

Structured Query Language (SQL) injection gives us a strong example of what might happen if we do not properly validate the input of our Web applications. SQL is the language we use to communicate with many of the common databases on the market today.

156
Q

Client side attacks

A

Take advantage of weaknesses in the software loaded on our clients , or those attacks that use social engineering to trick us into going along with the attack

157
Q

Revoking access

A

Takes access that was once allowed away from the user.

158
Q

Impact

A

taking into account the assets cost

159
Q

Containment phase

A

Taking steps to ensure that the situation does not cause any more damage than it already has, or to at least lessen any ongoing harm.

160
Q

Authentication attacks

A

Targets and attempts to exploit the authentication process a web site uses to verify the identity of a user, service, or application.

161
Q

Social Engineering

A

techniques that trick a person into disclosing confidential information

162
Q

Permanence

A

Tests show how well a particular characteristic resists change over time and with advancing age

163
Q

Availability

A

The ability to access data when needed

164
Q

Authentication

A

The act of proving who or what we claim to be (password)

165
Q

Cryptanalysis

A

The breaking and finding a weakness in the algorithm and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

166
Q

CIA

A

The core model of all information security. Confidential, integrity and availability

167
Q

Identity verification

A

The half step between identity and authentication (showing two forms of Id)

168
Q

Security awareness

A

the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization.

169
Q

privacy rights

A

The legal and ethical sources of protection for privacy in personal data.

170
Q

Simple Security Property

A

The level of access granted to an individual must be at least as high as the classification of the resource in order for the individual to be able to access it

171
Q

Simple integrity axiom

A

Purpose: Ensures integrity.
Principle: A subject at a certain security level cannot write data to a lower security level. This is known as “no write down.”
Objective: Prevents the corruption of data at lower integrity levels by ensuring that users can only write information at their own level of integrity or higher. This helps in maintaining the accuracy and trustworthiness of the data by preventing the insertion of false or misleading information from higher levels.

Bell-LaPadula Model

172
Q

Risk

A

The likelihood that a threat will occur. There must be a threat and vulnerability

173
Q

Principle of Least Privilege

A

The lowest level of authorization allowed to a user to preform duties

174
Q

ACLs (access control lists)

A

The means by which we implement authorization and deny or allow access to parties based on what resources we have determined they should be allowed access to .

175
Q

Mandatory Access Control (MAC)

A

Mandatory Access Control (MAC) is a security model that restricts the ability of subjects (like users or processes) to access objects (like files or system resources) based on the policies defined by a central authority. Unlike Discretionary Access Control (DAC), where the access control policies are set by the object’s owner, MAC policies are enforced by the operating system or security kernel, ensuring a higher level of control over access permissions.

176
Q

brute force attack

A

the password cracker tries every possible combination of characters to guess the password

177
Q

Preparation phase

A

The preparation phase consists of all of the activities that we can preform in advance of the incident itself in order to better enable us to handle it

178
Q

Protecting Data in Motion

A

The primary method of securing data from exposure on network media is encryption, and we may choose to apply it in one of two main ways: by encrypting the data itself to protect it or by protecting the entire connection.

179
Q

Data security

A

The process of keeping data, both in transit and at rest, safe from unauthorized access, alteration, or destruction

180
Q

mutual authentication

prevents what?

A

The process where the session is authenticated on both ends and just one end . Prevents man in the middle attacks

181
Q

Compliance

A

The requirements that are set forth by laws and industry regulations. Example : HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal government agencies

182
Q

privacy

A

the state or condition of being free from being observed or disturbed by other people.

183
Q

Cryptology

A

The study of deciphering secret messages. Cryptographic algorithms

184
Q

Substitution

A

The substitution of one letter for another in a consistent fashion

185
Q

Capability-based security

A

The use of a token that controls our access. A capability is a communicable, unforgeable token of authority which provides the holder with the right to access a specific object in certain ways.

186
Q

Controls

A

The ways we protect assets. Physical, technical/ logical, and administrative

187
Q

Software firewall

A

This type of firewall generally contains a subset of the features on a large firewall appliance but is often capable of similar packet filtering and stateful packet inspection activities.
Unlike hardware firewalls, which are physical devices placed between a network and the gateway, software firewalls run on individual computers or servers to protect each device by filtering traffic and blocking unauthorized access from external threats.

188
Q

Vulnerability Assessment

Tool for

A

Tools such as Nessus . They work by scanning the target systems to discover which ports are open on them and then interrogating each open port to find out exactly which service is listening on the port in question

189
Q

3DES

A

Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. It was originally designed as a replacement for DES. It uses multiple keys and multiple passes and is not as efficient as AES, but is still used in some applications, such as when hardware doesn’t support AES.

190
Q

Symmetric block cipher programs

A

Two fish, serpent, blowfish , cat5, IDEA

191
Q

Extraneous files

A

unnecessary files that aren’t cleaned up when the application moves from development to production. Leaving extraneous files may be handing attackers materials they need to compromise the system.

192
Q

personal equipment

A

Use of personal equipment brings cost savings to a corporation but can open up certain risks like data leakage, malware, intellectual property viruses

193
Q

Multi-factor authentication

A

Use of several authentication techniques together, such as passwords and security tokens.

194
Q

stateful firewall

A

Uses a state table to keep track of the connection state and will only allow traffic through that is part of a new or already established connection. Unlike stateless firewalls, which only examine packet headers and enforce rules based on static criteria such as source and destination IP addresses, ports, and protocols, stateful firewalls keep track of the state of active connections and make decisions about packet flow based on the context of the traffic.

195
Q

VPN

A

Virtual Private Network. Can provide us with a solution for sending sensitive traffic over unsecured networks. VPN connection is often referred to as a tunnel. Is encrypted connection between two points

196
Q

Assessments

A

Vulnerability and penetration testing

197
Q

What underlying issues in protocol implementation commonly lead to vulnerabilities?

A

Vulnerabilities in protocol implementations frequently stem from pervasive software development oversights, including but not limited to buffer overflows. These issues arise when data exceeds the allocated storage capacity, potentially allowing attackers to execute arbitrary code or disrupt service operations.

198
Q

Post incident activity phase

A

We attempt to determine specifically what happened, why it happened, and what we can do to keep it from happening again.

199
Q

Scanners

A

We can look for ports and versions of service that are running, examine banners displayed by services for information. Examine the info our systems display over the network and similar tasks.
Nmap
Wireshark
Metasploit
Nessus
Netcat
OpenVAS
Masscan

200
Q

Penetration Testing

A

We conduct a test where we mimic as closely as possible the techniques an actual attacker would us

201
Q

Eradication phase

A

We will attempt to remove the effects of the issue from our environment

202
Q

Vulnerabilities

A

Weakness that a threat event or the threat can take advantage of.
Threat.

A threat is any potential cause of an unwanted impact to a system or organization.

Risk refers to the potential for loss, damage, or any other negative occurrence that is caused by external or internal vulnerabilities.

A vulnerability is a weakness in a system that can be exploited by a threat to gain unauthorized access or cause harm to the system.

203
Q

Authorization

A

What the user can access, modify, and delete

204
Q

Manual Password Synchronization

A

When a user synced passwords from different systems without a software application

205
Q

Unauthenticated access

A

When we give a user or process the opportunity to interact with our database without supplying a set of credentials.

206
Q

Admissibility of records

A

When we seek to introduce records in legal settings, it is often much easier to do so and have them accepted when they are produced from a regulated and consistent tracking system.

207
Q

Detection and analysis phase

A

Where the action begins to happen. We will detect the occurrence of an issue and decide whether or not it is actually an incident so that we can respond

208
Q

Identity

A

Who or what we claim to be ( username)

209
Q

WPA2

A

Wireless Protected Access 2. Wireless network encryption system. Offers the strongest security

210
Q

Signature-based detection

A

Works in a similar way to host antivirus systems

211
Q

Write

A

Write to a file or directory

212
Q

Phishing and Pretexting

A

While both phishing and pretexting aim to deceive and obtain confidential information, phishing typically occurs through electronic communication and relies on urgency, while pretexting involves creating a fabricated story to manipulate individuals in various contexts, including offline interactions.

213
Q

Compare Simple security property vs simple integrity axiom

A

Direction of Restriction: The Simple Security Property restricts read actions to prevent confidential information from moving to subjects with lower clearance, while the Simple Integrity Axiom restricts write actions to prevent the corruption or lowering of data integrity.
Security Objective: The Simple Security Property focuses on confidentiality, ensuring that sensitive information is not disclosed improperly. In contrast, the Simple Integrity Axiom is concerned with integrity, ensuring that information remains accurate and uncorrupted.