Dion Test 1 Flashcards
3DES
Symmetric
DLP
Data Loss Protection - Prevents data loss. Software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks
Aircrack-ng
Suite of wireless security assessment and exploitation tools that includes monitoring, attacking, testing, and cracking of wireless networks. Includes packet capture and export of the data collected as a text file or pcap file
Collects wireless packet data
Autopsy
Cross-platform, open-source forensic tool suite
Digital forensics platform
BeEF
Browser Exploitation Framework - Penetration testing tool that focuses on the web browser
Brute Force Attack
Focuses on trying multiple passwords for a single user
Chain of custody forms list…
Everybody who has worked with or who has touched the evidence that’s part of the investigation. These forms record every action taken by each individual in possession of the evidence
tracert (trace route)
Networking diagnostic command for displaying possible routes and measuring transit delays of packets across an IP network
Used to determine the path traffic takes from one device to another
Shows how many hops, Uses ICMP
Displays the route of packets and timing between point A and point B. It’s very useful to help an administrator understand where along a route potential delays are arising
SQL Injection
Code injection technique used to attack data-driven applications.
Takes advantage of code vulnerabilities on website
Technique that exploits vulnerabilities in a target website’s SQL-based application software by injecting malicious SQL statements or by exploiting incorrect input
If you see “1=1 or 9=9, !=0”…its SQL Injection
Command injection
An attack where the goal is to execute arbitrary (random) commands on the host operating system via a vulnerable application
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Guides governance-related topics, including fraud, controls, finance, and ethics
Cryptographic Erase (CE)
Sanitizes a self-encrypting drive by erasing the media encryption key and then reimaging the drive.
CYOD
Choose Your Own Device
Data Custodian
Responsible for the safe custody, transport, storage of the data and implementation of business rules. Determines who has access to data
Data Owner
A senior executive role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of the information asset…Should not be an IT person
Covers activities such as making sure there are definitions in place, action is taken on data quality issues and Data Quality Reporting
Person accountable for the classification, protection, use, and quality of one or more data sets within an organization
DPO (Data Protection Officer)
Ensures that the organization processes the personal data of its staff, customers, providers, or any other individuals in compliance with the applicable data protection rules
Ensure that a company is complying with laws
Organization’s GDPR focal point and possesses
expert knowledge of data protection law and practices
Data Steward
Works for data owner and makes sure the data is appropriately labeled and classified…focused on the quality of the data
Data Wiping/Clearing
Data wiping/clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Keeps hard drive reusable
Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse
FACT: The database server is part of a critical production network
dd tool
Linux command Line tool
Can create forensic images (not a proprietary tool because it’s open-source).
Primary purpose is to convert and copy files
Degaussing
Involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed. Magnets
Degaussing is Purging
Dereferencing
Software vulnerability that occurs when the code attempts to remove the relationship between a pointer and the thing it points to
DES
Data Encryption Standard - Symmtreic key algorithm for the encryption of digital data. Short key length of 56 bits
Diffie–Hellman
Key exchange. Method of securely exchanging cryptographic keys over a public channel
Directory traversal/Path Traversal
HTTP/web attack that allows attackers to access restricted directories and execute commands outside of the web server’s root directory
If you see “../” = most likely directory traversal
Occurs when attacker is able to read files on the web server outside of the directory of the website on remote server
Disk Management
Utility in Windows that enables you to perform advanced storage tasks
DSA
Digital Signature Algorithm - Asymmetric. Used for digital signature and its verification. Doesn’t perform encryption
HIPAA
Federal law that required the creation of national standards to protect sensitive patient health info from being disclosed without the patient’s consent or knowledge
EDM (Exact Data Match)
Pattern matching technique that uses a structured database of string values to detect matches
ECC
Elliptical curve cryptography - is a public key encryption. Asymmetric
FACT: MAC Address Reporting can help identify rougue devices
FERPA
Family Educational Rights and Privacy Act - United States law that governs the access to educational info and records by public entities such as potential employers, publicly funded educational institutions, and foreign governments
FM-200
Non-flammable gas used for fire suppression
FTK Imager
Proprietary tool that can create perfect copies or forensic images of computer data without making changes to the original evidence. Identical in every way to the original
GLBA (Gramm-Leach-Bliley Act)
Requires financial institutions to explain their info sharing practices to their customers and safeguard sensitive data.
Guidelines for banks
GPG
GNU Privacy Guard - Asymmetric. Security tool for encrypting files.
AES
Advanced Encryption Standard - symmetric-key algorithm for encrypting digital data
Block cipher
Hypervisor
Also known as a virtual machine monitor - a process that creates and runs virtual machines
Allows one host computer to support multiple guest VMs by virtually sharing its resources, like memory and processing.
IdP
Identity Provider - Provides the validation of the user’s identity
Verifies user’s identity