Definitions Flashcards

1
Q

Data steward

A

The data steward is primarily responsible for data quality. Ensuring the data is collected and stored in a format containing values that comply with applicable laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data custodian

A

The data custodian handles all data and manages the system on which the data assets are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Owner

A

The owner is responsible for labeling the asset and ensuring that it is protected with appropriate controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Processor

A

The data processor is the entity engaged by the data controller to assist with technical collection, storage, or analysis tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cross-Site Scripting (XSS)

A

When an attacker uses a web application to ‘send malicious code’ to a different end user.
Occurs when web apps contain ‘reflected input’.
‘Client Side Vulnerability’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cross-Site Request Forgery (XSRF or CSRF)

A

‘Exploits trust’ that a user has in a website to ‘execute code’ onto the users computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the difference between XSS and XSRF

A

Cross-site scripting (or XSS) allows an attacker to execute arbitrary JavaScript within the browser of a victim user. Cross-site request forgery (or CSRF) allows an attacker to induce a victim user to perform actions that they do not intend to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dynamic-Link Library (DLL) Injection attack

A

When malware tries to inject code into the memory process space of a library using a ‘vulnerable/compromised DLL.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lightweight Directory Access Pool (LDAP) Injection attack

A

Exploits the weaknesses in LDAP implementations.
Occurs when users ‘input is not properly filtered’.
‘Unauthorized quire’s’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Extensible Markup Language (XML) Injection attack

A

When users enter values that query XML (known as XPath) with values that take advantage of exploits.
Similar to SQL, but does not have the same ‘access control’ so exploits can return entire documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the Events of the Cyber Kill Chain

A

Reconnaissance
Intrusion
Exploitation
Privilege Escalation
Lateral Movement
Obfuscation
Denial of Service
Exfilitration

RIEPLODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Address Resolution Protocol (ARP) poisoning

A

To sniff all traffic on a switched network. ARP poisoning occurs when an attacker, with access to the network, redirects an IP address to the MAC address of an unintended computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List Layers of the OSI Model

A
  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application

PLEASE DO NOT THROW SAUSAGE PIZZA AWAY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List the Incident Management Framework

A
  1. Detection
  2. Response
  3. Mitigation
  4. Reporting
  5. Recovery
  6. Remediation
  7. Lessons Learned

DRMRRRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Directory Traversal Attack

A

Directory traversal (also known as file path traversal) is a web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application. This might include application code and data, credentials for back-end systems, and sensitive operating system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the difference between Entropy and Ephemeral

A

Entropy is used to produce random numbers, which in turn are used to produce security keys to protect data. It is a measure of cryptographic unpredictability. A lack of can leave a crypto-system vulnerable and unable to encrypt data securely.

An Ephemeral key is an asymmetric cryptographic key used to create a one-time password when the user wants to authenticate. i.e DUO or Google Authenticator.

17
Q

What’s the difference between a honey-net and a honey-pot?

A

Honey-pots: singular Honey-net: plural

Honey-nets contain one or more honeypots

18
Q

List the Order of Volatility, from most volatile to least.

A
  1. CPU Cache, Registers
  2. Routing Table, ARP Cache, Process Table, Kernel Statistics
  3. System memory, RAM
  4. Temporary Files
  5. Data on Hard Disks
  6. Remote Logs
  7. Backups
19
Q

List examples of Technical Controls

A

Firewall Rules, Access Control Lists, Intrusion Prevention Systems, and Encryption

20
Q

List examples of Operational Controls

A

User Access Reviews, Log Monitoring, and Vulnerability Management

21
Q

List examples of Managerial Controls

A

Risk/Threat Assessments, Security Planning Exercises, Incorporation of security into the orgs change management, Service Acquisition, and Project Management Practices

22
Q

What is a Supply Chain attack?

A

An attack that occurs before software or hardware is delivered to an organization.

23
Q

What port does HTTPS run on?

A

TCP 443

24
Q

What port does HTTP run on?

A

TCP 80

25
Q

What port does SSH run on?

A

TCP 22

26
Q

What port does SMTP run on?

A

TCP 25

27
Q

What port does LDAPS run on?

A

TCP 636

28
Q

What port is the secure alternative to telnet?

A

SSH 22

29
Q

What is a Man-in-the-Browser also known as?

A

An On-Path attack