Domain 1: General Security Concepts Flashcards

1
Q

OSI Networking Model

A

7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network addressing

A

MAC Address

IP Address - lPv4 and IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MAC Address

A

Permanent, “burned-in” network address used by network interfaces to communicate with local network

Ex.
0a : 1b : 2c : 3d : 4e : 5f
or
00 : 0d : 4f : 12 : 34 : 56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP address - two types

A

IPv4- 32-bit address, separated into four “octets

• Valid IPs consist of 0-255 in each octet

Ex: 192.168.1.128, 127.0.0.1, 8.8.8.8

IPv6 - 128-bit address, represented on hexadecimal

• Values range from 0-9, A-F

Ex: fe80:0000:0000:afel:6bde:af0e:0509 or
2001:0db8:0000:0000:aaaa:abcd:7040:0073

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Hardware

A

• Hub
• Switch
• Router
• Layer 3 Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hub

A

Network aggregation device that re-transmits incoming data on all ports

  • No longer used, causes large amount of interference, unable to support faster, data race like 1Gbps
  • Layer 1 device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switch

A
  • network aggregation device that inspects each incoming frame to determine the destination Mac address, send data to the appropriate port where that Mac address is located
  • Layer 2 device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Router

A
  • network device that analyzes each incoming packet’s IP address to send data to appropriate interface or network to ensure delivery
  • Layer 3 device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 3 Switch

A
  • like a normal layer 2 switch but analyzes IP address. Required for VLAN operation
  • Layer 3 device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fundamental Security Concepts

Objective 1.2

A

The CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The CIA Triad

A

The CIA Triad is made up of

Confidentiality,

Integrity

and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

Keeping secret things secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

The data has not been altered in any way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability

A

The data or service is there when you need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AAA

A

Identification
Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identification

A
  • making the claim of who you are 
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authentication

A
  • Proving you are who you claimed to be
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authorization

A
  • Gaining access to your data and or services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Accounting

A
  • keeping track of who has authenticated

(Or attempted to authenticate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Non-Repudiation

A
  • provided with a specific encryption key and or digital signature is used identify the sender of a message
  • recipients are assured the source of the message, thanks to non-repudiation
  • cannot deny having sent a message, as it was signed by them or was encrypted using their private key 
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Gap Analysis

A

• analysis, a variation between organization, security, and requirements

• organization may be required by law, by industry, or by framework to have certain security measures in place

• cap analysis allows organization to examine any deviation to plan for corrective action, 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Zero Trust (ZTA)

A

• or Zero-Trust Architecture (ZTA) - requires authorization for each data transaction across network

• Control Plane
- Point of security control
- determines flow of data

• Data Plane
- point of interaction with data, most data around
- authorize to move data by the control plane in a zero-trust architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Kerberos

A

Kerberos is thought to be one of the more secure network authentication protocols and can be found in use by Windows Active Directory system. The Kerberos system evolves around the use of a Key Distribution Center (KDC) which ultimately issues tickets that allow a client to obtain access to a system resource by authenticating with the ticket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Deception and Disruption

A

Honeypot

Honeynet

Enticing targets for would-be attackers to attempt to access:

  • Honeyfile
  • Honeytoken
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Honeypot

A
  • Attractive target to lure would-be attackers away from actual target
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Honeynet

A
  • Fake network or fake data center composed of honeypots to distract would-be attackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Security Controls

Objective 1.1

A
  1. Categories
  2. Types
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Categories

A

• Technical

• operational

• Managerial

• Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Technical

A
  • forms of protection, implemented by an information system (Software or Hardware)
  • example
  • access control list, firewalls, intrusion detection systems, antivirus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Operational

A

• security controls, implemented by people rather than computational systems

• Ex.

  • cyber security awareness training
  • rules for individuals within an organization 
31
Q

Managerial

A

• form of control that provides oversight or supervision of an information system

• Ex.

  • Security policies
  • Risk management
  • Standard Operating Procedures (SOPs)
32
Q

Physical

A

• form of a barrier that physically prevents someone from assessing a facility, area or system: or is interacted with physically

• Ex.

  • Gates
  • Locks
  • Lights
33
Q

Types

A

• Deterrent

• Preventative

• Detective

• Corrective

• Compensative

34
Q

Deterrent

A
  • deterrent controls communication, either directly or indirectly, to an attacker that they should not attack
  • These controls do not prevent an attack from occurring, serving instead to convince and attack or not to execute and attack
  • ex. Warning, signs / banners.
35
Q

Preventative

A
  • preventive control served prevent and attack from happening in first place
  • ex. Locking the doors prevent unwanted access to an area. User training helps for venues, his room, falling victim to social engineering techniques.
36
Q

Detective

A
  • Controls, which notify in record when attack attempts are made, but do not prevent attacks from occurring
  • Detective controls can be used to alert that a preventive control has failed
  • ex. Security, camera, recordings, door, alarms, check them, and Dusen detection software are all forms of detective control. 
37
Q

Corrective

A
  • Controls that mitigate materialize risk and possibly prevent the risk from happening in the future
  • ex. Restoring lost data from backups. 
38
Q

Compensate

A
  • A control designed as a back up to another control, to be used in the event that the main control is unable to revise sufficient level of protection on its own
  • Complicating controls can also involve recovery of data if lost due to an attack / disaster
  • ex. Alarm that sounds after lock doors left open for period of time.
39
Q

Directive

A
  • A control design to enforce rule of behavior, specifying how individuals should interact with a system.
  • ex. Policy, disciplinary procedures for failure to apply, standard operating procedures.
40
Q

Physical Security Controls

A

• Lighting

• Fencing

• cameras

• Bollards

• Vestibules

• Sensor and Alarms
- infrared
- pressure
- microwave
-ultrasonic

41
Q

Change Management
Objective 1.3

A

Version Control

Documentation

Business Impact

Workflow

Technical Implications

42
Q

Version Control

A

• helps to track changes as they have an overtime

• in the event and issue occurs in the code, the problem can either be tracked down and eliminated, or the code can be rolled back to an early version before the issue Rose

• If confidential information is tracked, care needs to be taken to remove this information from control (login credentials, personal info and so on)

43
Q

Documentation

A

• Tracking changes
- who, what, when, why

• Updating diagrams

• updating policies and procedures

44
Q

Business Impact

A

• Impact analysis

• Limited downtime, work stoppage

• Maintenance windows

45
Q

Business Impact (cont’d)

A

• what might cause outage or have an impact?
- System restart
- Service restart
- Application restart

• who might be impacted?
- Ownership
- Stakeholders

46
Q

Workflow

A

• Standard Operating Procedure

• Approval process

• Test Results
- checking dependencies

•. Blackout plan

47
Q

Technical Implications

A

• Updating or changing allow lists and deny lists

•. Updating or changing restricted activities

• Managing legacy applications

48
Q

Cryptography
Objective 1.4

A

Hashing

And

Encryption

49
Q

Hashing

A
  • One-way
  • Used to ensure integrity

• useful for ensuring integrity of data and safeguarding passwords

• create a unique output digest from a given input

• One Way algorithm
- cannot derive the original input from a given output

• if two different inputs yield the same output, this is known as collision
- collisions mean the hashing algorithm is cryptographically broken

Types
- MD5
- SHA256
- SHA512

50
Q

Salting

A

• salting is altering the input data to confound cracking attempts

• to break a digest, attackers will hash varying, different inputs until it matches found

• when a match is found, attackers look back at the input for the answer

• if salt is used, it is hard to know what part is the users input and what part is default?

51
Q

Encryption

A
  • Two-way
  • Used to ensure confidentiality

• Ensured confidentiality, hides data from prying eyes

• algorithm types
- Symmetric
- Asymmetric

• Digital signatures
• Code signing

52
Q

Simplistic symmetric encryption

A
53
Q

Symmetric

A

• uses same key to both encrypt and decrypt

• problematic if key has not been shared prior
- How do you share the key over and unrested Work?

• computationally intense than a asymmetric

54
Q

Asymmetric

A

• utilizes a public key and a private key

  • Typically, large values in hundreds and thousands of digits
  • Mathematically related
  • Difficult to discern a key pairs mate out of the astronomical number of possibilities

• only the private key can decrypt data encrypted with the public key

• only the public key can decrypt data encrypted with the private key

• Computationally intense

55
Q

Asymmetric continued

A
56
Q

Key Exchange

A
  • Securely exchange keys for an encryption method is a vital part of ensuring the encryption remains secure
  • out-of-band exchange is when keys are sent over an unrelated channel, such as relaying a key verbally or sending it in the mail. These methods can be easily infiltrated / compromised to intercept the key
  • In-band exchange is when keys are exchanged over the same channel used for communicating. Ex. The public key can simply be given out since only the owner of the private key can decrypt messages encrypted using the public key
57
Q

Key Length

A

• key strength

  • measure of how resistant an encryption key is to brute force and other key-discovery techniques

• key strength must be balanced with usability relating to processing power / time

58
Q

Levels of Encrption

A

• Full disk encryption (FDE)

• Partition level

• Volume level

• File level

• Database level

• Record level

59
Q

Certificates and PKI

A
60
Q

PKI

A

• Public-Key Infrastructure

  • Public key
  • Private key
  • Key escrow
61
Q

Certificates

A
  • A certificate is a key-pair assignment from a Certificate Authority (CA)
  • Certificates are unique to the holder
  • Different types of certificates
    • third-party (issued by another entity)
    • Self-signed (issued by organization for use within organization)
62
Q

Certificate Authority (CA)

A
  • is a trusted organization that assigns certificates to applicants
    • applicants submit a certificate request (CSR) to the CA to initiate the process
  • checks with other trusted CAs to determine if Key pair is unique
  • assigns that key pair to the applicant for a specified length of time 
  • maintains record of assigned certificates
  • trusted because authority was granted by another CA in a hierarchy
  • traces chain of trust back to a root CA that maintain root of trust for CAs
63
Q

Certificate Status

Online certificate status protocol (OCSP)
Certificate revocation list (CRL)

A
  • online certificate status Protocol (OCSP) allows entity to check status of a certificate with issuing CA
  • Certificate Revocation List (CRL) identifies which certificates have been revoked by the issuing CA and should no longer be trusted.
  • Expired certificates are certificates that are past the date specified by the issuing CA
64
Q

Certificate Contents

A
65
Q

Cryptographic Tools

A

• trusted platform module (TPM)

• hardware security module (HSM)

• key management

• Secure Enclave

66
Q

TPM

Trusted Platform Module

A
  • Small, purpose-built chip used to identify a specific system (motherboard)
  • Either built into the motherboard design or as an add-on peripheral
  • Can protect small amounts of sensitive information, such as passwords and cryptographic keys
67
Q

HSM

Hardware Security Module

A
  • offloads the computationally intense encryption / decryption workload from the main general purpose CPU to a special purpose GPU powered peripheral
68
Q

Uses of cryptography

A
69
Q

Digital Signatures

A
  • Method of cryptographically signing a message to authenticate the sender and provide assurance that the message data has not been been modified (authentication and integrity)
  • Also provides non-repudiation, as the sender cannot later deny having signed the message
70
Q

Code Signing

A
  • Ensures an application has not been modified and confirms the author of the application
  • Accomplished through hashing file and signing this hash with the developers private key (asymmetric encryption) to provide a certificate base digital signature

• Provides integrity and non-repudiation

71
Q

Blockchain

A

• Acts as a decentralized and distributed public ledger that records the altar rations of a digital asset

• typically managed by a peer to peer Work

• most popular example of Blockchain at the moment is bitcoin, a distributed ledger, recording the transactions of users, using a cryptographic coin

• quite secure as an attacker would need to take over a majority of the network in order to add falsified information to the ledger (…hard to do, but not impossible!)

72
Q

Stenography

A

• hiding data or file within another file in order to hide the existence of the communication

• E.g., a secret text message hidden inside an image, audio, or video file

73
Q

Obfuscation

A
  • making something hard to read or understand
74
Q

Data hiding

A
  • tokenization
    • altering values with a stand-in value to obscure the value
    • can be reversed if needed
  • Data masking
    • replacing values to prevent the original from being seen
    • “Permanent tokenization”