Domain 4 Flashcards
Control
High level description of a feature or activity that needs to be addressed and is not specific to a technology
Benchmark
Contains security recommendations
Baseline
Implementation of benchmark on individual service
Configuration Management
Ensures that systems are configured similarly
Change Management
Policy Outlining the procedures for processing changes helps reduce risks associated with changes
Hardening
Is a practice of reducing a systems attack surface
Unified Endpoint Management
Provides management of the hardware, such as desktops, tablets, smartphones, and IOT devices
Mobile Application Management
Allows a security team to manage application and data security, even on unmanaged devices
Sideloading
Enables directly installing an application package in .apk format on a mobile device
Rooting/Jailbreaking
Rooting and Jailbreaking remove the vendor restrictions on a mobile device to allow unsupported software to be installed
Wifi Direct
Wifi direct wireless network allows 2 wifi devices to connect to each other without requiring a WAP. It is a single path and therefore cannot be used for internet sharing
Adhoc Wireless
Where 2 wireless devices can connect without a WAP but it is multipath and can share an internet connection
Tehering
GPS enabled smartphone can be attached to a laptop or mobile device to provide internet access
BYOD
Employee can bring their own device. Cost effective. AUP and Onboarding and Offboarding policies provide directions
CYOD
Chooses from list of approved devices
COPE
Company purchases the device and allows the employee to use it for personal use
Bluejacking (Annoyance)
Pranksters push unsolicited messages to engage or annoy other nearby Bluetooth
Bluesnarfing (data theft)
Data theft using Bluetooth
Bluebugging (eavesdropping or hacking)
Creates backdoor attack before returning control of the phone to its owner
Radio Frequency Identification
Uses radio frequency to identify electromagnetic field in a tag to track assets
Near Field Communication
Built on RFID often used with payment systems
GPS
Measure distance between two points
Evil Twin
Malicious fake Wireless Access Points set up to appear legitimate
Disassociation
Type of DOS attack attacker breaks the wireless connection between the victim device and access point
Jamming
A DOS attack that prevents nodes from using the channel to communicate by occupying the channel
CCMP
Created to replace WEP. Uses AES128
WPA2
An encryption scheme that implemented the CCMP
Simultaneous Authentication of Equals (SAE)
Used with WPA3. Protects against brute force. Uses a Diffie Hellman handshake called dragon fly. Immune to offline attacks
WPA3
Uses GCMP-256
WPA3 Personal
Uses SAE. Users can use passwords that are easier to remember
WPA3 Enterprise
Supports 256 bit AES
AAA Protocols
Radius and TACACS+
Wifi Protected Setup (WPS)
Password is stored locally so could be brute forced
IEEE802.1x
Authentication Protocol. Transparent to users because it uses certificate authentication. Can be used in conjunction with a Radius server