Domain 7: Security Operations Flashcards
Continuity Planning Subtasks (5)
Strategy Development, Provisions and Processes ,Plan Approval, Plan Implementation, Training and Education
Strategy Devlopment
Bridges gap btwn BIA and Continuity Planning in BCP - determines which risks are acceptable which must be mitigated
Provisions and Processes
specific procedures and mechanisms that will mitigate the risk deemed unacceptable
Three Categories of assets in BCP Provisions and Processes
People, Buildings/Facilities, Infrasctructure
Important Components of a Written BCP (11)
Continuity Planning Goals, Statement of Importance, Statement of Priorities, Statement of Organizational Responsibility, Statement of Urgency and Timing, Risk Assessment, Risk Acceptance/Mitigation, Vital Records Program, Emergency Response Guidelines, Maintenance, Testing and Exercise
Importance of a Written BCP (3)
Historical Benefit, Sanity Check, Reference document
Entitlement
amount of privileges granted to users
Aggregation
amount of privileges that users collect over time
Transitive Trust
extends the trust between two security domains to all their sub domains
Common methods for managing security in the information life cycle
Marking Data, Handling data, storing Data, Destroying Data
SLA
Service level agreement - agreement between and org and vendor that stipulated performance expectations
MOU
documents the intent of two entities to work together toward a common goal
ISA
info on how the two parties establish, maintain, and disconnect the connection
Virtual Machines
run as guest OSs on physical servers
SDNs
Software Defined Networks - uses simple network devices other than routers and switches
VSANs
Virtual Storage Area Networks - virtual dedicated high speed network that hosts multiple storage devices
What is the primary software component in virtualization?
Hypervisor
Hypervisor
managers the VMs, virtual data storage, and virtual network components
Cloud Computing
on demand access to computing resources from almost anywhere
SaaS
Software as a Service - fully functional applications (Google Docs), Consumes do not manage or control any assets
PaaS
Platform as a Service - computing platform (hw, OS, application), consumers manager the applications and maybe some config settings
IaaS
Infrastructure as a Service - servers, storage, networking resources, consumers install OS and applications and perform all maintenance
What are the 4 cloud models?
Public, Private, Hybrid, and Community
Public Cloud Model
assets available for any consumer to rent or lease
Private Cloud Model
assets are for a single organization
Community Cloud Model
assets are provided to two or more organizations
Baseline
starting point for configuration of a system
Unauthorized Changes Directly affect the __ in the CIA triad
Availability
Vulnerability Management
regularly identifying, evaluating and mitigating vulnerabilities
CVE
common vulnerability and exposure - dictionary for a standard convention in identifying vulnerabilities
Incident
Any event that has a negative effect on the CIA of an org’s asset
Computer Security Incident
an incident that is a result of an attack
Incident Response Steps
Detection, Response, Mitigation, Reporting, Recovery, Remediation, Lessons Learned
DoS Attacks
attacks that prevent a system from processing or responding to legitimate traffic or requests
DDoS
DoS attack using multiple attack systems
DRDoS
Distributed Reflective DoS, doesn’t attack victim directly, manipulates traffic to reflect attacks back
SYN Flood attack
sends multiple SYN flags, never completed conversation
Smurf Attack
floods the victim with ICMP echo packets
Fraggle Attacks
floods victims with UDP Packets over port 7 and 19
Ping Flood Attack
floods a victim with ping requests
Ping-of-death Attack
send oversized ping packet
Teardrop Attack
attacker fragments traffic in such a way that a system is unable to put data packets back together
Land Attack
attacker sends spoofed SYN packets suing the victims IP address as source and destination
Zero-day Exploit
attack on a system exploiting an unknown vulnerability
Malicious Code
any script or program that performs an unwanted, unauthorized, or unknown activity
Drive-by Download
code downloaded and installed on a user’s system without their knowledge
Man in the Middle Attack
attacker gains a logical position between two endpoints of communication
War Dialing
using a modem to search for a system that accepts inbound comms attempts, newer forms use VoIP
Knowledge Based Detection
signature or pattern based, uses database of known attacks
Behavior Based Detection
heuristics or anomaly based, creates a baseline of normal
Passive vs Active IDS Response
Passive is notifications, active modifies the environment
Darknet
Portion of allocated IP addresses within a network that are not used