Domain 2 Flashcards
What captures the relationships between physical and logical assets
Diagrams
are the minimum level of security required for the system or application
Baseline Configuration
reduce error and provides a clear communication standard
Standard Naming Conventions
Advanced planning is needed to apply deviations from an organization’s IP addressing schema
Internet protocol (IP) schema
refers to regulations pertaining to data being stored in other countries
Data sovereignty
What is the practice of enacting security controls that protect the CIA (Confidentiality, Integrity, Availability) of data
Data Protection
What is the systems way to prevent unwanted sensitive data from leaving the organization’s network
Data loss prevention (DLP
The act of hiding data by redacting all or parts of its content to preserve its confidentiality
Masking
Data, whether at rest, in motion, or in processing requires encryption
Data At rest/ In transit/motion/ In processing
is the process of replacing data fields with random values
Tokenization
What refers to the practice of protecting the rights of users over digital objects
Rights management
The lack of physical borders in the online world makes rights management difficult to govern
Geographical considerations
Policies such as a BCP (Business Continuity Plan) or DRP (Disaster Recovery Plan) that are created to promote business resiliency
Response and recovery controls
A security feature that prevents attackers from bypassing security through encrypted channels
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection
A mathematical function that creates a fixed-length output from a variable-length input, used to verify the integrity of data
Hashing
Security controls should be in place to authenticate users and not allow for unwanted access
API Considerations
is an alternative site that has little to no backups of the original site’s data and is fully operational within weeks
Cold Site
is an alternative site that has full backups of the original site’s data and is fully operational within minutes to a few hours
Hot site
is an alternative site that partial backups of the original site’s data and is fully operational within a few days
Warm site
are computer systems with fake data that is designed to attract hackers
Honeypots
are computer files that are designed resemble legitimate files but contain fake data
Honeyfiles
A network designed as a decoy to attract hackers
Honeynets
refers to fake network traffic that is designed to mimic real network communication
Fake Telemtry
occurs when a user is redirected to a malicious or wrong URL
DNS Sinkhole
A cloud computing model to provision cloud-based IT resources and components
Infrastructure as a service (IaaS
A cloud computing model to provision cloud-based IT services such as database management
Platform as a service (PaaS)
A cloud computing model to provision cloud-based software directly to a user over the internet
Software as a service (SaaS
The provisioning of ad hoc services via a cloud service
Anything as a service (XaaS)
refers to a cloud environment that is accessible by multiple organization
Community Cloud
cloud refers to a cloud environment that is only accessible by a single organization
Private
What cloud refers to a cloud environment that is a mix of both public and private cloud environments
Hybrid Cloud
A company that manages the IT infrastructure and security services of an organization
Managed service provider (MSP)/managed security service provider (MSSP
refers to a distributed cloud architecture that reduces latency
Fog computing
refers to a cloud architecture that performs computing at the edge of a network
Edge Computing
is a lightweight computer with limited capabilities and resources
Thin cilent
are environments that packages code to be executed software within an isolated and standard environment
Containers
collection of small modules that work together to create a complete system
Microservices/APIA
The act of provisioning IT systems and applications from machine-readable files and code
Infrastructure as code
A network architecture to manage compatible IT networking devices through computer programming
Software-defined networking (SDN)
Real-time reporting of configuration data through application programmable interfaces (APIs
Software-defined visibility (SDV)
An organization owns and manages web applications and rents its usage to users, usually on a subscription model
Serverless architecture
The process of enabling separate processes and services to work together
Services integration
define how resources are provisioned along with its restrictions
Resource policies
allows for a network connection to a Virtual Private Cloud network
transit gateway
is the technology that allows a computer to have multiple operating systems installed
Virtualization
A set of management practices and policies to keep track of ** within the enterprise. To make sure they can be controlled.
Virtual machine (VM) sprawl avoidance
Pre-programmed security controls that prevents a virtual machine from escaping its hypervisor and infecting the host operating system
VM escape protection
Computing **** are isolated areas that provide the functionalities required for software development, testing, staging, and production
Environment
A ** environment is an isolated computing environment designed for software development
Development
The ** environment is an isolated computing environment that resembles the production environment but is designed for software testing and troubleshooting
Test
is an isolated computing environment where tested software is prepared for the production environment
Staging
What is the process of ensuring manufactured components are clear of defects prior to its integration
Quality Assurance
_______ is the process of assigning permission to users. ________ is removing the users’ permissions.
Provisioning/Deprovisioning
The process to determine if unauthorized changes have been made to data.
Integrity measurement
Is the process of removing unwanted characters from a string input prior to its processing
Normalization
are pre-compiled functions to query a database
Stored procedures
this the practice of writing code that is difficult to analyze by observing its source code
Obfuscation/Camouflage
is code that when executed, its results are not used elsewhere within the application
Dead weight
Applications can perform input validation and code execution locally or on a remote server
Server-side vs. client-side execution and validation
Is the process of allocating memory to applications to avoid a memory leak
Memory Management
Software developers use SDKs to create software within a pre-built programming environment
Use of third-party libraries and software development kits (SDKs
occurs when the application loses control of its data during operations
Data Exposure
OWASP is a nonprofit organization dedicated to the protection of web-based applications
Open Web Application Security Project (OWASP
The process of having different components for software features and capabilities
Software diversity
converts programming languages to binary language
Complier
diversity is the act of creating identical binary images with different specifications
Binary
The process of automating tasks and courses of actions to prevent, detect, and recover from security incidents
Automation/scripting Automated courses of action
The process of constantly detecting and evaluating the risks associated with software systems
Continuous monitoring
The process of constantly detecting and evaluating security baseline changes to software systems
Continuous Validation
A technique to detect and resolve code conflicts by reducing interaction errors
Continuous integration
is a technique to deploy changes quickly and sustainably to software systems
Continuous delivery
is a technique to automatically release new software versions for immediate availability
Continuous deployment
refers to a system’s ability to withstand changes without issue
Elasticity
refers to a systems’ ability to increase its workload capacity with its current resources
Scalability
is the process of tracking the changes to different versions of software
Version Control
is the process of verifying an identity previously established in a computer system
Authentication
allows centralized security management and provides a logical means of organizing resources (users, printers, etc.
data storage mechanism similar to database
Directory Services
A collection of autonomous computer networks that agree on a common set of operating standards, identities can access resources on diverse networks
Federation
What is the supplying of proof or evidence of some fact, Used to verify the trustworthiness of a system
Attestation
An authentication technology that uses a time-based fact to create unique password
Time-based one-time password (TOTP)
An authentication technology that’s based on the ____ algorithm
HMAC-based one-time password (HOTP)
An authentication technology that’s based on sending text messages
Short message service (SMS)
is a small piece of hardware that is used to identify and authenticate a user, Tokens can be virtual and contains, the user’s rights and access privileges
Token Key
The password/cryptographic key remains on the
Usually would require an additional factor such as a PIN or password
Static Code
allow the user to initiate a logon and the application generates a response that the user enters intothe system
Authentication Applications
sends the user authentication notifications or access codes directly to the user’s mobile device
Push Notifications
can be used to verify that the user is in possession of the actual mobile device
Phone Call
carry long cryptographic tokens that are too large to guess
Smart Card Authentications
factors are biological factors specific to an individual
Biometrics
is the measurement of the pattern expressed by a person as they walk
Gait Analysis
For biometrics to be effective, they must have both low false positive rates and low false negative rates
Efficacy Rates
determines what level of false positives is allowed in the system
False Acceptance
determines what level of false negatives, or rejections, are going to be allowed in the system
False Rejections
(CER) is where both accept and reject error rates are equal, This is the desired state for the most efficient operation
Crossover error rate
What Attributes are collections of artifacts that focus on elements associated with the user
Multifactor authentication attributes
Something you ….., refers to presenting a trigger and measuring a response that cannot be fakedAn example is the results of a lie detector test
Something you exhibit
verifies the identity of the subject by comparing one or more factors against a database of valid identities (e.g., user accounts
Authentication
indicates who is trusted to perform specific operations For example, administrators grant a user access to files based on the user’s proven identity
Authorization
provides accountability by ensuring that subjects can be held accountable for their actions
Auditing
includes auditing, logging, and monitoring
Accounting
Determination of authentication processes should rest on data criticality and who needs access
Cloud vs. on-premises requirements