D430 Flashcards
Fundamentals of Information Security - D430
Software development vulnerabilities
(6)
- Authentication attacks
- Authorization attacks
- Buffer overflows
- Cryptographic attack
- Input validation attacks
- Race conditions
Incident response cycle
1- preparation
2- detection and analysis
3- containment
4- eradication
5- recovery
6- post incident activity
Types of attacks [4]
- Interception: Unauthorized capturing of data, such as eavesdropping on network traffic.
- Interruption: Disruption of services or communication, leading to loss of availability, such as in a Denial of Service (DoS) attack.
- Modification: Unauthorized alteration of data, which can affect data integrity.
- Fabrication: Creation of fictitious data or transactions, leading to unauthorized insertion of data into systems.
Together, they represent a broad spectrum of security threats that can compromise the confidentiality, integrity, and availability of information systems.
Identification of critical information
1st step in the OPSEC process, arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed
What step is analysis of vulnerabilities?
3rd step in the OPSEC process: to look at the weaknesses that can be used to harm us
DES
(Encryption)
Data Encryption Standard (DES). While DES was once widely used and considered secure, advancements in computing power made its 56-bit key vulnerable to brute-force attacks. As a result, DES is now considered obsolete, and more robust encryption algorithms like AES are recommended for secure communication.
Risk Mamagement Steps
(5)
A constant process as assets are purchased, used and retired. The general steps are
1- identify assets
2- identify threats
3- assess vulnerabilities
4- assess risk
5- mitigating risks
Pretexting
a form of social engineering in which one individual lies to obtain confidential data about another individual
exploit framework
A group of tools that can include network mapping tools, sniffers, and exploits
man-in-the-middle attack
a hacker placing himself between a client and a host to intercept communications between them
Executable Space Protection
A hardware and software-based technology that prevents certain portions of the memory used by the operating system and applications from being used to execute code.
Acceptability
A measure of how acceptable the particular characteristic is to the users of the system
uniqueness
In cybersecurity, “uniqueness” refers to the quality of being distinct or one-of-a-kind within a specific context or system.
Cryptographic attacks
a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme
Rule-Based Access Control
A model that is based off of allowing or denying access based on a set of predetermined rules
Packet sniffers
A network or protocol analyzer, is a tool that can intercept traffic on a network, commonly referred to as sniffing. Sniffing basically amounts to listening for any traffic that the network interface of our computer or device can see, whether it was intended to be received by us or not. Some examples might be Wireshark (GUI) or Tcpdump (command-line tool)
Nmap
A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner. (Network mapper)
Clean desk
A policy designed to ensure that all confidential or sensitive materials are removed from a user’s workspace and secured when the items are not in use or an employee leaves her workspace.
VPN (Virtual Private Network)
A private network that is configured within a public network such as the Internet. A secure connection between two systems
packet filtering
a process in which firewalls are configured so that they filter out packets sent to specific logical ports
Operations Security
A process that we use to protect our information (encryption) OPSEC
Performance
A set of metrics that judge how well a given system functions
IPSEC
Internet Protocol security
A set of protocols developed to support the secure exchange of packets between hosts or networks.
sandbox
A set of resources devoted to a program, process, or similar entity, outside of which the entity cannot operate
AES
How many cyphers does it use? endorse by through?
A set of symmetrical block ciphers endorsed by the us government through NIST . Is used by a variety of organizations. It is the replacement for DES as the standard encryption for us government . Uses 3 different ciphers one a 128 bit key one 192-bit key and one 256- bit key
Caesar cipher
A substitution cipher that shifts characters a certain number of positions in the alphabet usually 3 .
ROT13
A substitution cipher that uses a key of 13. To encrypt a message, you would rotate each letter 13 spaces. To decrypt a message, you would rotate each letter 13 spaces.
Firewalls
A system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use. It naturally creates network segmentation when installed
Host Intrusion Detection System (HIDS)
A system used to analyze the activities on or directed at the network interface of a particular host
hping3
A tool used to test the security of firewalls and map network topology.
- constructs specially crafted ICMP packets to evade measures to hide devices behind firewall
- scripting functionality to test firewall/IDS
Authorization attack
An authorization attack is a cybersecurity threat that exploits vulnerabilities in the application’s authorization processes. This type of attack occurs when an application’s authorization mechanisms are not properly implemented or adhere to best practices, allowing attackers to gain unauthorized access to system functions, data, or resources they should not have access to.
Confused deputy problem
A type of attack that is more common in systems that use ACLs rather than capabilities; when software has greater permissions than user, the user can trick the software into misusing authority
ECC
cyber security
Elliptic Curve Cryptography (ECC) is a method for encrypting data and securing digital communications using the mathematics of elliptic curves. It offers high security with smaller key sizes compared to traditional systems like RSA, making it efficient for use in environments with limited resources.
Race conditions
A type of software development vulnerability that occurs when multiple processes or multiple threads within a process control or share access to a particular resource, and the correct handling of that resource depends on the proper ordering or timing of transactions
Wireshark
A widely used packet analyzer, network protocol analyzer, used for network troubleshooting, analysis, software and protocol development, and education.
Netstumbler
A Windows tool used to detect wireless access points. Does not have as full feature set as kismet
Network ACLs
Network Access Control Lists (ACLs) are a security measure used within a network to control the flow of traffic. Access controlled by the identifiers we use for network transactions such as ip address, MAC address and ports
Brewer and Nash model
aka Chinese Wall; Access control model designed to prevent conflicts of interest. Commonly used in industries such as financial
Confidential
Allowing only those authorized to access the data requested
Read
Allowing us to access the contents of a file or directory
authenticity
Allows us to talk about the proper attribution as to the owner or creator of the data in question
Clickjacking Attack
also calles UI redress attack; typically uses an inline frame, or iframe.
In a clickjacking attack, an attacker wraps a trusted page in an iframe that places transparent image over legitimate links, graphics or form fields. Causes client to execute a command differing from what they think they are performing
Symmetric Cryptography
Also known as private key. Utilizes a single key for both encryption of plain text and decryption of the cipher text
Discretionary Access Control (DAC)
[access control model]
an access control model in which the subject has total control over any object that the subject owns along with the programs that are associated with those objects
Role-Based Access Control (RBAC)
An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization
Privilege Escalation
An attack that exploits a vulnerability in software to gain access to resources that the user normally would be restricted from accessing.
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Clickjacking
An attack that tricks users into clicking something other than what they think they’re clicking.
XSRF
cross-site request forgery (XSRF)
An attack that uses the user’s Web browser settings to impersonate the user.
Dual-factor authentication
An authentication method that includes multiple methods for a single authentication transaction. Often referred to as “something you have and something you know,” when the factors include a device such as a smart card and a secret such as a password or PIN.
Digital signature
an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Stream Cipher
An encryption method that encrypts data as a stream of bits or bytes. One bit at a time.
Block Cipher
specify size
An encryption method that encrypts data in fixed-side blocks. Block size is 64 bits .
Anomaly-based detection
Analyzes the current traffic against an established baseline and triggers an alert if outside the statistical average
Mobile devices
Any device that communicate via a wireless network
Threat
Any event being man-made, natural or environmental that could damage the assets
The * property
Purpose: The Star Property is designed to maintain the confidentiality of information within the system.
Function: It restricts the ability of a subject to write information to a higher security level than the subject’s own level. This is known as “no write up.”
Objective: The primary aim is to prevent the flow of information from lower to higher security levels, ensuring that sensitive information is not inadvertently or maliciously leaked to levels that should not have access to it.
Simple Integrity Axiom (no write down, or “integrity property”)
Anti-malware tools
applications detect threats in the same way as an IDS either by matching against a signature or by detecting anomalous activities taking place.
Software tokens
Applications that generate OTP
Deep Packet Inspection Firewall
Are capable of analyzing the actual content of the traffic that is flowing through them. Can resemble the contents of the traffic to look at what will be delivered to the application that it is destined for.
Multilevel Access Control
Multilevel Access Control (MAC) is a security mechanism that classifies users and data into different levels of security. It restricts access to information based on the clearance level of users and the classification of the information, ensuring that users can access only the data for which they have authorization, thereby enhancing data security. They are used where the simpler access control models that we just discussed are considered to not be robust enough to protect the information to which we are controlling access. Such access controls are used extensively by military and government organizations, or those that often handle data of a very sensitive nature. We might see multilevel security models used to protect a variety of data, from nuclear secrets to protected health information (PHI).
RAID
RAID (Redundant Array of Inexpensive Disks) is a technology used to protect against data loss due to hardware failures in individual disks. It involves configuring multiple disks in various setups to provide redundancy and improve data reliability. Additionally, data can be replicated from one machine to another over a network or backed up onto media such as DVDs or magnetic tapes for added security.
Cross-Site Scripting (XSS)
Attack by placing code in the form of scripting language into a webpage, other media that is interpreted by a client browser including adobe flash and types of video files. When another person views the webpage or media they execute the code automatically and the attack is carried out
Interception
Attacks allows unauthorized users to access our data, applications, or environments. Are primarily an attack against confidentiality
Interruption
Attacks cause our assets to become unstable or unavailable for our use, on a temporary or permanent basis. This attack affects availability but can also attack integrity
Fabrication
Attacks involve generating data, processes, communications, or other similar activities with a system. Attacks primarily affect integrity but can be considered an availability attack.
Modification
Attacks involve tampering with our asset. Such attacks might primarily be considered an integrity attack, but could also be an availability attack.
Server-side attacks
attacks that exploit vulnerabilities on the server.
Biometrics
Authentication factors that use physical features ( something that you are )
Network Segmentation
Breaking a network into pieces and putting various levels of security between those pieces. We can control the flow of traffic allowing or disallowing traffic
Honeypots
can detect, monitor, and sometimes tamper with the activities of an attacker. are configured to deliberately display vulnerabilities or materials that would make the system attractive to an attacker.
Proxy servers
Can serve as a choke point in order to allow us to filter traffic for attacks or undesirable content such as malware or traffic to Web sites hosting adult content.
Intrusion Prevention System (IPS)
Can take action based on what is happening in the environment. In response to an attack over the network an ips might refuse traffic from the source of the attack
Portscanners
check to see what ports are open
Nmap
Zenmap
Masscan
Netcat
Advanced IP Scanner
Angry IP Scanner
Most common Wireless network security families
Chief method of protecting traffic is encryption. The encryption is used by 802.11 wireless devices. The most common wireless families are - wired equivalent privacy (wep) - Wi-Fi protected access ( wpa) - Wi-Fi protected access v2 (wpa2)
COPPA
Children’s Online Privacy Protection Act: a law that intends to keep children under the age of 13 protected from the collection of private information and safety risks online.
TCPDump
Command line packet sniffing tool . Runs on Linux and unx operating systems
kismet
Commonly used to detect wireless access points and can find them even when attempts have been made to make doing so difficult
CFAA
Computer fraud and abuse act of 1986. A law to reduce the hacking and cracking of government or other sensitive institutions computer systems
Parkerian hexad model
Confidentiality, integrity, availability, possession/control, authenticity, utility
compliance
Conforming to a rule, policy or law
CAN-SPAM Act
Controlling the Assault of Non-Solicited Pornography and Marketing Act; protects consumers against unwanted email solicitations
Attribute-based access control (ABAC)
Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions
Technical/ logical controls
Controls are devices and software that protect assets. Think of firewalls, av, ids, and ips
Physical controls
Controls are physical items that protect assets. Think of locks, doors, guards and fences