Domain 7: Security Operations Flashcards
Recommended height of a security fence
8 feet with barbed wire to keep most intruders out.
6-7 feet too hard to climb easily but won’t keep determined intruders out.
3-4 feet
Smurf Attack
A Smurf attack spoofs the source IP address with the victim’s address and floods the broadcast address with internet control message protocol (ICMP) requests. This causes devices on the network to send an ICMP reply to the victim for each ICMP request sent by the attacker.
Separation of Duties
Separation of duties allows for two or more people to play separate roles in the completion of a critical process. Two people serving separate functions at the same time within a holistic process can allow for auditing and accountability.
MTD
Maximum tolerable Downtime
SLE
Single Loss Expectancy
RPO
Recovery Point Objective
Defines how much data can be lost in terms of time.
Exposure Factor
The percentage of loss that an organization would experience if a specific asset were violated by a realized risk
RTO
Recovery Time Objective.
Should NOT exceed MTD
Duress Function
Covertly signal that the individual disarming the alarm system is being coerced to do so, even while the appearance of compliance is maintained.
Syn Flood
In a SYN flood attack, a client exploits the TCP three-way handshake by only sending SYN packets but never responding. The volume of resources this consumes on the host eventually causes the host to become overwhelmed and unresponsive.
Ping of Death
A Ping of death (PoD) attack is a denial-of-service (DoS) attack, in which the attacker aims to disrupt a targeted machine by sending a packet larger than the maximum allowable size, causing the target machine to freeze or crash. The original ping of death attack is less common today.
Fraggle attack
DOS Attack similar to Smurf attack. Difference is that it uses UDP port 7 and 19 instead of ICMP.
Attacker spoof the source IP address so that UDP responses to there instead of to the attacker. DOS attack against that spoofed address.
How long should it take to activate a hot site?
A few minutes to a few hours.
How long should it take to activate a warm site?
Few hours to a few days.
How long should it take to activate a cold site?
A few days to a few weeks.
During a cybersecurity investigation, what is considered MOST important?
Preservation of Evidence
How well lit should a parking lot or perimeter of building be?
Two foot-candles
A foot-candle is one lumen per square foot. The accepted standard for lighting used in parking lots or perimeters is a minimum of two foot-candles.
Capacitance IDS
A capacitance intrusion detection system detects changes in the electromagnetic field around the sensor. When a person walks into the field, it disturbs the field’s electromagnetic properties and will set off the alarm.
Configuration management
Configuration Management is used to ensure secure baselines on systems are adequately maintained, and any deviations are authorized and documented. Configuration Management seeks to establish safe, reliable configurations for systems.
Change Management Plan
A Change Management Plan is a generic plan that documents how changes will be monitored and controlled. It defines the process for managing change in the project.
Need to know principle
The need to know principle is used to determine if a user’s access to certain information is necessary to perform their job role sufficiently.
RAID 1
Disk Mirroring. Requires at least 2 disks, with exact copies of the same data on each.
EDRM
Electronic Discovery Reference Model.
Used in eDiscovery. Four phases
Identification
Collection
Processing
Review
Full backup
Complete copy of the target system, file, or data structure.