Domain 5 :Given a scenario, implement security awareness practices Flashcards
Social Engineering
social engineering techniques to manipulate human psychology, exploiting emotions such as trust, curiosity, or fear to convince recipients to take action.
Spoofed Communication
Cybercriminals often use email addresses, URLs, or phone numbers that appear legitimate to deceive their targets. These are known as “spoofed” elements and are designed to mimic trusted sources.
Anomalous Behavior Recognition (ABR)
refers to the identification of unusual patterns or behaviors within a system or on the network. There are three types of anomalous behavior recognition, which are defined as follows:
Risky Behaviors
Risky behavior represents actions that, while not necessarily malicious, carry a heightened level of risk or potential harm to a system or organization. This can include actions such as granting excessive permissions, sharing login credentials, downloading suspicious files, or ignoring security warnings
Unexpected
Unexpected behavior is characterized by actions or activities that deviate from established norms or historical patterns.
Uninteional Behavior
Unintentional behavior involves actions that occur due to human error or accidents. This can encompass misconfigurations, accidental data leaks, or actions taken by users who have been tricked by social engineering attacks. Unintentional behavior can be caused by a lack of awareness or insufficient training.
User Guidance and Training
For effective security awareness training, there are several elements to consider. These elements include policy/handbooks, situational awareness, insider threats, password management, removable media and cables, social engineering, operational security, and working in a hybrid/remote working role.
Situational awareness:
Situational awareness is about identifying potential threats and vulnerabilities, understanding the consequences of actions, and making informed decisions to minimize risks. Consistent training can improve users’ capacity to maintain a heightened state of situational awareness and equip them with the skills necessary to avoid cyberattacks.
User guidance and training method
Policy/handbooks: Training material
Situational awareness: A training aid for a job role
Insider threat: A disgruntled employee causing damage
Password management: Best practice for passwords
Removable media and cables: Attack vectors
Social engineering: Catching users unaware
Operational security: Looking at social engineering attacks
Hybrid/remote work environments: Working in remote locations
Reporting and monitoring
Initial: Evaluating training effectiveness
Recurring: Retraining if staff’s guard is lowered
Development: Creating training materials
Execution: Delivery of training
what port number is HTTPS
443
What is Bcrypt used for?
Key streching algorthim
Open Vulnerability and Assessment Language (OVAL)
This is an XML-based schema designed to describe the security state of a system and query information related to vulnerabilities.
Puppet Forge
Puppet Forge is for implementing baselines
Security Technical Implementation Guide (STIG
: STIG is a comprehensive repository of cybersecurity guidelines and best practices curated by the United States Department of Defense (DoD
Site Suvery
These surveys involve a comprehensive analysis of the environment, which includes identification of sources of interference, such as load-bearing walls, cordless phones, microwaves, elevators, metal frames, metal doors, and radio waves. A site survey will help to determine the best places to install the wireless access points that users connect to.
Captive Portal
: A captive portal can be used to control access to a WAP. For example, when you join the wireless network at the airport, you are connected to the free Wi-Fi, yet you cannot access the internet right away
BLE
BLE prioritizes energy efficiency and uses random-generated device addresses to prevent tracking and identification. This makes it the first choice for a wide range of applications where conserving battery life is critical
EAP-TLS
EAP-TLS is a specific, secure version of wireless authentication that requires a certificate stored on the endpoint (client or device) to verify identity and authorization.
TLS
TLS is a cryptographic protocol that provides end-to-end security of data sent between applications over the Internet
Simple Network Management Protocol (SNMP),
is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks.
Turnsitle
This is a rotating gate that permits one person to pass at a time and is often used for crowd management and access control.