Domain 5 Flashcards

1
Q

Encryption

A

Uses mathematical operations to transform information into a format where it is unreadable by anyone other than the authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encrypting Data

A

Takin plain text information and use an encryption algorithm in combination with an encryption key to encrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plain text

A

Information in its normal form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext

A

Plaintext data that has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Decrypting Data

A

Use decrypting algorithm and decryption key to perform that transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two Major categories of Encryption algorithms

A

Symmetric algorithms
Asymmetric algorithms

AES: Symmetric
RSA: Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric Encryption

A

“Shared secret encryption algorithms”

Encryption and decryption operations use the same key.

n: number of people who want to communicate
k: number of keys required

n(n-1) ÷ 2 = k

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Encryption

A

Solves problem of scaling to large groups

Each user gets 2 keys:
- Public key: can freely distribute to anyone they want to communicate with
- Private key – Kept secret

Anything encrypted with one key from the pair can be decrypted with the other key pair.

Slower than symmetric, but solves problem of creating keys for large organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Environments where encryption is used

A

To protect:
- Data at rest
- Data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data at rest

A

Stored data

Full-disk encryption (FDE): technology built into some operating systems that automatically encrypt all of the data stored on a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data in transit

A

Data moving over a network

HTTPS, VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hash functions

A

One-way function that consistently transforms a variable-length input into a unique, fixed-length output

  • One-way function: can’t reverse process
  • Map variable-length input to fixed-length outputs: you can send input of any length to a hash function and hashes t produces will always be same length
  • Produce unique outputs: not be able to find two different inputs that produce same hash value as output
  • Repeatable: always get same output from hashing same input using same hash functions

Can fail in one of two ways:
1. If has function is reversible, it is not secure.
2. It is not collision-resistant. Does not achieve the “unique output”. Possible to find two inputs that produce same hash output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Message Digest 5 (MD5)

A

Created by Ron Rivest (1991).

5th in series of hash functions that became more and more secure.

Replaced MD4

Another term for “Hash”

Produces 128-bit hash

No longer considered secure after 2013 collision resistant break discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Hash Algorithm (SHA)

A

Approved by NIST for use in federal computing applications

SHA-1: 160-bit hash value. No longer secure

SHA-2: family of 6 different hash algorithms – 224-,256-, 384-, 512-bit hashes

SHA-3: Keccak algorithm. Uses completely different mathematical algorithm. Produces a hash of any desired length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Race Integrity Primitives Evaluation Message Digest (RIPEMD)

A

Created as alternative to government-sponsored hash functions

Produces 128, 160, 256, and 320-bit hashes

Contains flaws in 128-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hash-Based Message Authentication Code (HMAC)

A

Combines symmetric cryptography and hashing

Provides authentication and integrity

Create and verify message authentication code by using a secret key in conjunction with a hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Life Cycle

A

Create - Store - Use - Share - Archive - Destroy - Create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Create

A

Data generated either in an on-premise system or in the cloud.

Can be modifications to existing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Store

A

Data placed into one or more storage systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Use

A

Active usage of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Share

A

Data made available to other people through one or more sharing mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Archive

A

Data is retained in long-term storage where it is not immediately accessible but can be restored to active use if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Destroy

A

Data is destroyed when it is no longer needed.

24
Q

Destroying Electronic Records

A

NIST SP 800-88

3 different activities to sanitize electronic media:
1. Clearing – Writing new data to device that overwrites sensitive data.
2. Purging – Use cryptography functiosn to obscure media on disk. Use of degaussing.
3. Destroying – Ultimate type of data sanitization. Shred, pulverize, melt, incinerate, or completely destroy the media. Media cannot be reused.

25
Q

Destroying Paper Records

A

Options:
1. Shredding – cross-cut shredder.
2. Pulping – chemical process to remove ink from paper.
3. Incineration – burning papers.

26
Q

Data classification

A

Security levels of information used in an organization and the process for assigning information to a particular classification level.
Helps determine the appropriate storage, handling, and access requirements for classified information.
Assigned based on sensitivity and criticality.

27
Q

Classification schemes

A

High, medium, low sensitivity.

Military:
1. Top Secret
2. Secret
3. Confidential
4. Unclassified

Business:
1. Highly Sensitive
2. Sensitive
3. Internal
4. Public

Pay attention to:
- PII
- Financial Info
- Health info

28
Q

Labeling

A

Ensures users are able to consistently recognize sensitive information and handle it appropriately

29
Q

Logging

A

Organizations can look at specific events and achieve 3 objectives:
1. Determine who caused it. Accountability or identity attribution
2. Track down all other events related to investigation. Traceability
3. Provide documentation of those actions. Auditability.

30
Q

Security information and Event Management (SIEM)

A

Two functions:
1. Act as central, secure collection point for log entries.
2. Apply artificial intellience.

Has access to all log entries from across the organization.

31
Q

Log Correlation

A

Actvity SIEM does when it collects all the information pieces to recognize combinations of activities that could indicate a security incident.

32
Q

Configuration Management

A

Establishes and monitors the way that specific devices are set up.

Tacks both OS settings and inventory of software installed

33
Q

Baseline

A

Snapshot of a system or application at a given point in time

Used to assess if a system has changed outside of an approved change management process.

34
Q

Version Control

A

Assigns each release of a piece of software an incrementing version number that can be used to identify any given copy.

Three part decimals:
1. Major version
2. Major update
3. Minor update

35
Q

Default Configurations

A

If not modified, can contain misconfigured firewalls with open ports and services, open permissions, guest accounts, default passwords, unsecured root accounts, or other serious security issues.

36
Q

Weak Security Settings

A

Dependent on documented security standards and configuration baselines to help install systems in secure manner

37
Q

Cryptographic weakness

A

Subject to eavesdropping and tampering

Admins must carefully manage encryptions keys to ensure they don’t fall into the wrong hands

38
Q

Patch and Updates

A

Ensures systems and applications receive all of the security updates provided by manufacturers to correct known vulnerabilities.

39
Q

Account Management

A

If accounts are improperly configured, user can use those extra privileges to cause damage.

40
Q

Acceptable use policy (AUP)

A

Describes what users are permitted to do with organization’s technology assets and what is prohibited.

41
Q

Data handling policies

A

Describes security controls and procedures that must be used to protect sensitive information.

42
Q

Password policies

A

Covers the protection and use of passwords in the organization.

43
Q

Bring Your Own Device (BYOD) policy

A

Documents requirements for using personal devices, the security controls that must be in place, and type of information that can be processed.

44
Q

Privacy Policy

A

Important way to communicate with employees, customers, and other individuals about what info the organization retains about them and the ways that they store, process, transmit, and maintain that information.

45
Q

Change Management Policy

A

Describes how changes are made in the organization.

46
Q

Rollback plan

A

Can restore the previous configuration if something goes wrong during or after the change.

47
Q

Social Engineering

A

One of the most dangerous risks and hardest threats come from human threat.

Use psychological tricks to manipulate people into performing actions or divulging sensitive info that undermines the organization’s security.

Successful for:
1. Authority and trust
2. Intimidation
3. Consensus and social proof
4. Scarcity
5. Urgency
6. Familiarity and liking

48
Q

Authority and Trust

A

Describes person that gives an air of authority and outward signs of authority to make people listen

49
Q

Intimidation

A

Browbeating people into doing what you want by scaring them and threatening that something bad will happen to them and/or the organization.

50
Q

Consensus and Social Proof

A

Herd mentality

When people don’t know how to react in a situation, they look for behaviors of others and follow.

51
Q

Scarcity

A

Making people believe that if they don’t act quickly, they will miss out.

52
Q

Urgency

A

Hackers create situations where people feel pressured to act quickly because time is running out.

53
Q

Familiarity and Liking

A

Use of flattery, false compliments, and fake relationships to get on a target’s good side and influence their activities.

54
Q

Security Training

A

Provides users with detailed info they need to protect the organization’s security.

55
Q

Security Awareness

A

Reminds employees about the security lessons they’ve already learned.