Domain 5 - Protection of Information Assets Flashcards

1
Q

What is the role of Certificate Authority (CA)?

A

1) A trusted third party that serves authentication infrastructures or organizations, and registers entities and issues them certificates

2) Maintains a directory of digital certificates for the reference of those receiving them

3) Manages the certificate life cycle, including certificate directory maintenance and certificate revocation list (CRL) maintenance and publication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary role of Certificate Authority (CA)?

A

Check the identity of the entity owning a certificate and to confirm the integrity of any certificate it issued.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of Registration Authority (CA)?

A

The individual institution that validates an entity’s proof of identity and ownership of a key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Certificate Revocation List (CRL)?

A

1) An instrument for checking validity of the certificates for which the CA has responsibility

2) Provide list of digital certificates that are no longer valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Certificate Practice Statement (CPS)?

A

1) Document that outlines the policies and practices followed by a Certification Authority (CA) to issue and manage digital certificates (incl. policy on revoking certificates)

2) Designed to provide transparency and establish trust between the CA and its users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Digital Certificate?

A

1) An electronic document that is used to verify the identity of a user, device, or organization

2) Contains information about the identity of the entity it is issued to, such as name, address, and public key

3) Issued by a trusted third party known as a Certificate Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How Digital Certificate is used?

A

Used to establish secure communications over the internet and other networks, by allowing parties to verify the identity of each other and encrypting data to protect it from unauthorized access.

When a digital certificate is issued, it is signed by the CA using their private key, providing assurance that the certificate is authentic and has not been tampered with.

The certificate can then be used to authenticate the identity of the certificate holder, typically through the use of digital signatures or other cryptographic protocols (e.g. IPSec, SSH, S/MIME, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of Directory Server in PKI?

A

Makes other users’ certificates available to applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Secure Socket Layer (SSL)?

A

It is a protocol used to establish a secure and encrypted communication channel over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How SSL protects data?

A

1) User wants to access server, thus send request to the server to initiate secure connection using HTTPS protocol

2) Server responds by sending its digital certificate that contains the server’s public key & information about the certificate’s issuer

3) User checks the certificate to ensure it is valid by verifying the Certificate Authority’s digital signature contain in the certificate using the CA’s public key

4) Once verified, user generates symmetric session key & encrypts it with server’s public key

5) This is then send to server

6) An acknowledgement will be send after the server will decrypt with its private key to successfully receive the session key

7) The user & server can now use the session key to encrypt & decrypt all communication between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of IDS

A

1) Network-based = Operate by analyzing network traffic as it passes through a particular point on the network, such as a switch or router

2) Host-based = Operate on individual machines, analyzing system logs, file changes, and other activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Methods of detection used in Intrusion Detection System (IDS)

A

1) Statistical (Anomaly)= looks for deviations from normal patterns of behavior, which may indicate an attack

2) Signature-based = uses a database of known attack patterns, or signatures, to compare against network or system activity

3) Neural-based = Combines both statistical & signature-based IDS to create hybrid & better system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why Statistical-based IDS most likely generate false alarm?

A

This IDS relies on definition of known & expected behavior of systems. Because normal network activity may at times include unexpected behavior (e.g. sudden massive downloads), these will be flagged as suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Categories of Power Failures/ Interruption

A

1) Total failure (blackout)

2) Severely reduced voltage (brownout)

3) Sags, Spikes & Surges

4) Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is blackout?

A

Complete loss of electrical power which often caused by weather conditions (e.g. storm, earthquake) or inability of an electrical utility company to meet user demands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is brownout?

A

Failure of electrical utility company to supply power within acceptable range which places strain on electronic equipment & may limit operational life or permanent damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Sags, Spikes & Surge?

A

Temporary & rapid decreases (sags) or increases (spikes & surges) in voltage levels which can cause loss of data, network transmission errors or hardware damages

18
Q

What is Electromagnetic Interference (EMI)?

A

Caused by electrical storms or noisy electrical equipment (e.g. motors, fluorescent lighting, radio transmitters) which may cause systems to hang or crash as well as damages similar to those by sags, spikes & surges

19
Q

Types of Power Interruption & how to control it?

A

1) Short-term: Those that last few seconds such as Sags, Spikes & Surges can be prevented using surge protector (e.g. power line conditioners)

2) Intermediate-term: Those that lasts from few seconds to 30 mins, can be controlled by Uninterruptible Power Supply (UPS) devices which provide constant power even if main power is lost

3) Long-term: Those that lasts few hours to several days, can be prevented using alternate power generators

20
Q

Types of Performance Indicators of Biometric System

A

1) False Acceptance Rate (FAR) = frequency of accepting an unauthorized person as authorized
2) False Rejection Rate (FRR) = frequency of rejecting an authorized person
3) Equal Error Rate (EER) = FAR equals FRR which measure the optimal accuracy of the Biometric

21
Q

What is the 2 sub-protocols in IPSec?

A

1) Encapsulating Security Payload (ESP) protocol
2) Authentication Header (AH) protocol

22
Q

What is Encapsulating Security Payload (ESP) protocol?

A

1) Encrypts the entire IP packet (including the original IP header) and encapsulates it with a new IP header

2) The new IP header has a destination IP address that is the ultimate destination of the packet, while the source IP address is the IP address of the device that is performing the encryption.

3) Provides confidentiality by encrypting the payload of the IP packet, as well as the original IP header.

4) Provides integrity and authentication by using a cryptographic hash function to compute a message authentication code (MAC) that is appended to the encrypted payload. The MAC ensures the payload has not been tampered or modified during transmission.

23
Q

What is Authentication Header (AH) protocol?

A

1) provides authentication & integrity of IP packets without encryption

2) sender computes a message digest (a hash) of the IP packet header & payload & adds it to the end of the packet.

3) receiver then performs the same calculation & compares the results to verify the integrity of the packet.

4) provides source authentication by adding an integrity check value (ICV) to the original IP packet header and payload

5) once received, ICV is recalculated using the same algorithm and the same secret key. If matches, then proves the packet was not tampered & the sender who they claimed to be.

24
Q

What is the 2 encryption modes in IPSec?

A

1) Transport mode = only the payload (data that is transferring) is encrypted. The IP packet header is not encrypted.

2) Tunnel mode = Both payload & packet header is encrypted.

25
Q

What is Dynamic Host Configuration Protocol (DHCP)?

A

Protocol that automatically assigns IP addresses to anyone connecting to the network.

With DHCP disabled, static IP addresses must be used, and this requires either administrator support or a higher level of technical skill to attach to the network and gain Internet access.

Thus, reduces risk of unauthorized access to network.

26
Q

What is the major risk of implementing remote VPN access to its network?

A

When remote access is enabled, malicious code in a remote client could spread to the organization’s network.

One problem is when the VPN terminates inside the network and the encrypted VPN traffic goes through firewall.

This means that the firewall cannot adequately examine the traffic.

27
Q

Steps in Auditing the Configuration of Network

A

1) Understand the importance & role of the network device within the organization’s network topology.

2) Identify the good practices for the type of network devices deployed to ensure no anomalies within the configuration.

3) Identify whether components of the network are missing or subcomponents of the network are being used appropriately.

28
Q

Purpose of a “Raised floor” in a computer machine room

A

Enable ventilation systems, power cables & data cables to be installed underneath the floor.

This eliminates the safety and damage risk posed when cables are placed in a spaghetti-like fashion on an open floor.

Raised floor won’t prevent water damage to machines if there’s overhead water pipe leakage

29
Q

What is port scanning?

A

Technique used by attackers to identify open ports on a computer or network in order to exploit vulnerabilities or gain unauthorized access.

It involves sending a series of requests to a target computer or network to determine which ports are open & which services are running on those ports.

By analyzing the responses, an attacker can identify vulnerable services & launch attacks against them.

This often target the external firewall of the organization. Use of wireless will not affect this.

30
Q

What is back door?

A

This is an opening implanted into or left in software that enables an unauthorized entry into a system.

31
Q

What is war driving?

A

Practice of driving or walking around with a wireless-enabled device such as a laptop or smartphone in search of wireless networks.

The purpose of war driving is to locate wireless access points (WAPs) & identify potential vulnerabilities in the wireless networks.

Uses a wireless Ethernet card, set in promiscuous mode, & a powerful antenna to penetrate wireless systems from outside.

Promiscuous mode is a mode of operation for a network card that allows it to intercept & read all network traffic that it receives, including those not addressed to the network card.

32
Q

Best method to maintain integrity of log files (e.g. firewall logs)?

A

Establishing a dedicated third-party log server & logging events in it.

When access control to the log server is adequately maintained, the risk of unauthorized log modification is mitigated, therefore improving the integrity of log information.

33
Q

What is “session border controllers (SBC)”?

A

1) Enhances security in a communication network that uses Voice over Internet Protocol (VoIP) technology

2) Provides protection against malicious attacks, such as scanning & denial-of-service (DoS) attacks

34
Q

How “session border controllers (SBC)” protects VoIP from scanning & DoS attack?

A

1) In the access network, an SBC hides the real address of the user & provides a managed public address that can be monitored. This minimizes the chances of attackers scanning the network for vulnerabilities.

2) It also allow clients behind firewalls to access the network while maintaining the firewall’s effectiveness.

3) In the core network, an SBC protects both the users and the network by hiding network topology & users’ real addresses. This means attackers cannot easily identify the location of the users or the network’s infrastructure.

4) It can monitor the network’s bandwidth & quality of service to ensure that users have a high-quality communication experience.

1) Core network is the central part of the network that provides connectivity between different sub-networks, such as LANs or WANs

2) Access network refers to portion of the network that connects endpoints such as IP phones to the service provider’s network, enabling voice traffic to be transmitted

35
Q

Steps in auditing logical access controls

A

1) obtain an understanding of the security risk facing information processing by reviewing relevant documentation, by inquiries, & conducting a risk assessment. Thus, ensure controls are adequate to address risk.

2) document the controls applied to the potential access paths to the system. This is to assess adequacy, efficiency & effectiveness of controls based on the risk assessed.

3) test controls over the access paths to determine if they are functional

4) evaluate the security environment in relation to written policies & practices to assess its adequacy against good practices

36
Q

What is Challenge response-based authentication?

A

A type of authentication system that verifies the identity of a user by challenging them to provide a response to a specific task or question (e.g. one-time code or token send by server to user).

It is prone to session hijacking or man-in-the-middle attacks.

37
Q

What is the typical line of defense within a network?

A

1) Network Firewall

2) Intrusion Detection Systems (IDS)

3) Endpoints firewall & Antivirus Software (e.g. personal computers)

38
Q

Types of Penetration Testing

A

1) Blind testing
2) Targeted testing
3) Double-blind testing
4) External testing

39
Q

What is Blind Testing?

A

1) Also known as black-box testing

2) The penetration tester is not given any information & is forced to rely on publicly available information

3) This test simulates a real attack, except that the target organization is aware of the test being conducted.

40
Q

What is Double-blind Testing?

A

1) This is also known as zero-knowledge testing

2) The penetration tester is not given any information & the target organization is not given any warningboth parties are “blind” to the test

3) This is the best scenario for testing response capability because the target will react as if the attack were real.

41
Q

What is Targeted Testing?

A

1) This is also known as white-box testing

2) The penetration tester is provided with information & the target organization is aware of the testing activities

3) In some cases, the tester is also provided with a limited-privilege account to be used as a starting point

42
Q

What is External Testing?

A

This refers to a test where an external penetration tester launches attacks on the target’s network perimeter from outside the target network (typically from the Internet).