Endpoint and Application Development Security Flashcards

1
Q

KRIs

A

Key Risk Indicators

exceeding normal baselines; failed logins; bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CISCP

A

Cyber Information Sharing and Collaboration Program

Analyst-to-analyst technical exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSINT

A

Open Source Intelligence
Public information sharing centers
DHS and CISCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 2 concerns of public information sharing centers?

A

Privacy and Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AIS

A

Automated Indicator Sharing
STIX and TAXII
More in public information sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

STIX

A

Structured Threat Information Expression

visually and stored lightweight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TAXII

A

Trusted Automated Exchange of Intelligence Information
Forced over HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Closed Source Information

A

owned
must go through a vetting process and meet certain criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adversary TTP

A

Tactics, Techniques, and Procedures
Threat actors and how they attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Boot Attestation

A

determining boot process is valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Antivirus - String Scanning

A

matching patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus - Wildcard scanning

A

skips bytes to look for exact match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Antivirus - Mismatch scanning

A

number of bytes in string be any value no matter position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Heuristic Monitoring - Code emulation

A

virtual environment is made to determine virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti-Malware - Bayesian filtering

A

for spam
divides emails
every word is analyzed and how often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

First-party cookies

A

from website being viewed so when revisited
could be stolen to impersonate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Third-party cookies

A

websites try to place in local hard drive for advertisment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Session cookie

A

in RAM
duration of site visit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Secure cookie

A

sent to server w encrypted requested over HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTP Response Headers - HSTS

A

HTTP Strict Transport Security
forces HTTPS

21
Q

HTTP Response Headers - CSP

A

Content Security Policy
restricts what resources a user can load into site

22
Q

HTTP Response Headers - X-XSS

A

Cross-Site Scripting Protection
stops a page loading if detects XSS attack

23
Q

HTTP Response Headers - X-Frame-options

A

prevents attacks that overlay their content on site

24
Q

EDR

A

Endpoint Detection and Response
more robust than HIDPS
gathers from multiple hosts to a central database

25
How do you harden endpoints?
Patches, turn off unneeded ports and services, change default settings
26
What are the 4 general concepts of SecDevOps?
Development, testing, staging, production
27
Directory traversal
exploits to move from root directory to others
28
Waterfall Model
Sequential design have to start over if you have to go back to last stage extensive planning
29
Agile Model
Incremental overcomes disadvantages of waterfall modules done in short sprints
30
Automated courses of action
Continuous monitoring Continuous validation Continuous integrity Continuous delivery Continuous deployment
31
Immutable systems
if change is needed a whole new system is made
32
Fuzzing
random inputs to try to trigger exceptions
33
CISA
Cybersecurity Info Act autority for info sharing private sector, state and local and federal gov't
34
FOIA
Freedom of Info Act publics right to request records from any federal agency
35
TLP
Traffic-Light Protocol sensitive info is shared w right audience 4 color catefories
36
PCII
Protected Critical Infrastructure Info protects private sector infrastructure info that is voluntarily shared w gov't to DHS
37
Legacy BIOS Boot
BIOS for boot no security
38
UEFI Native Mode
UEFI standards to boot updated as needed no validation of boot process
39
Secure Boot
firmware and software verified validated custom software may not pass Can turn off but hard to impossible to turn back on without resetting
40
Trusted Boot
Microosoft OS checks integrity of boot before loading
41
Measured Boot
Sends to trusted server to assess security highest security slower process
42
Secure coding techniques
input validation normalization stored procedure code signing obfuscation/camo code dead code Code reuse Server-side and client side validation
43
Input validation
errors are accounted for
44
Normalization
organizing data to database
45
Stored procedure
subroutine to access a relational database
46
Code signing
digital signing applications
47
Obfuscation/Camo code
inner functions hard to understand
48
Dead Code
code executes but no function
49