Essential Knowledge Flashcards
OSI Model - Layer 1
1. Type
2. Data Unit
- Physical (USB, Bluetooth)
- Bit
OSI Model - Layer 2
1. Type
2. Data Unit
- Data Link (ARP, PPP)
- Frame
OSI Model - Layer 3
1. Type
2. Data Unit
- Network (IP)
- Packet
OSI Model - Layer 4
1. Type
2. Data Unit
- Transport (TCP)
- Segment
OSI Model - Layer 5
1. Type
2. Data Unit
- Session (X255, SCP)
- Data
OSI Model - Layer 6
1. Type
2. Data Unit
- Presentation (AFP, MIME)
- Data
OSI Model - Layer 7
1. Type
2. Data Unit
- Application (FTP, HTTP, SMTP)
- Data
TCP/IP Model - Layer 1
1. Type
2. OSI Layer Equivalent
- Network Access
- Physical (Layer 1) / Data Link (Layer 2)
TCP/IP Model - Layer 2
1. Type
2. OSI Layer Equivalent
- Internet
- Network (Layer 3)
TCP/IP Model - Layer 3
1. Type
2. OSI Layer Equivalent
- Transport
- Transport (Layer 4)
TCP/IP Model - Layer 4
1. Type
2. OSI Layer Equivalent
- Application
- Session (Layer 5), Presentation (Layer 6), Application (Layer 7)
How does TCP Handshake gets initialised?
- SYN
- SYN-ACK
- ACK
What does ARP stand for?
Address Resolution Protocol.
What is ARP used for?
Resolves IP address to physical address
What are the the 5 Network Security Zones?
- Internet
- Internet DMZ
- Production Network Zone
- Intranet Zone
- Management Network Zone
What does CVSS Stand for?
Common Vulnerability Scoring System
What is CVSS is used for?
Places numerical score based on severity for vulnerabilities and risks.
What does NVD stand for?
National Vulnerability Database
What is NVD?
US government repository of vulnerabilities
What are the 7 Vulnerability Categories?
- Misconfiguration
- Default Installation
- Buffer Overflow
- Missing Patches
- Design Flaws
- Operating System Flaws
- Default Passwords
What does EISA stand for?
Enterprise Information Security Architecture
What is EISA?
Process that determines how systems work within an organization
What are the 5 steps to Threat Modelling?
- Identify security objectives
- Application Overview
- Decompose application
- Identify threats
- Identify vulnerabilities
What are the 5 Phases of Risk Management?
- Risk Identification
- Risk Assessment
- Risk Treatment
- Risk Tracking
- Risk Review
What are the 6 types of Security Controls?
- Physical (Guards, Lights, Cameras)
- Technical (Encryption, Smart Cards, Access Control lists)
- Administrative (Training Awareness, Policies)
- Preventative (Authentication, Alarm Bells)
- Detective (Audits, Backups)
- Corrective (Restore Operations)
What does BIA stand for?
Business Impact Analysis
What does MTD stand for?
Maximum Tolerable Downtime
What does BCP stand for?
Business Continuity Plan
What does DRP stand for?
Disaster Recovery Plan
What does ALE stand for?
Annualised Loss Expectancy
What does ARO stand for?
Annual Rate of Occurrence
What does SLE stand for?
Single Loss Expectancy
What is the ALE formula?
ALE (Annualised Loss Expectancy) = SLE (Single Loss Expectancy) * ARO (Annual Rate of Occurrence)
What does UBA stand for?
User Behavior Analysis
What is UBA?
Tracking users and monitoring data for malicious activity
CIA Triad - What are they?
- Confidentiality (Passwords, Encryption)
- Integrity (Hashing, Digital Signatures)
- Availability (Anti-Dos Solutions)
What is Bit Flipping?
Integrity Attack - Obscure data from users.
What is CC commonly referred to?
Common Criteria
What does EAL stand for?
Evaluation Assurance Level
EAL - How many levels does it have?
1 - 7
What are the 2 Access Control Types?
- Mandatory (MAC)
- Discretionary (DAC)
What are the 4 Policy Categorisations
- Promiscuous - Wide Open
- Permissive - Block only known dangers
- Pudent - Blocks most, few exceptions
- Paranoid - Locks everything down
What is a phreaker?
Someone that manipulates or hacks telephone systems
What are the 4 Attack Types?
- Operating System
Vectors: Buffer overflows, Protocol Implementations, software defects, patch levels, authentication schemes - Application Level
Vectors: Buffer overflows, Bugs, XSS, DoS, SQL Injection, MitM - Misconfiguration
Examples: Improper permissions of SQL users; Access-list permit all - Shrink-Wrap Code
Examples: Software defect in version 1.0; Defect in example CGI scripts; Default passwords
What are the 5 hacking phases?
- Reconnaissance
- Scanning & Enumeration
- Gaining Access
- Maintaining Access
- Covering Tracks
What does SIEM stand for?
Security Incident Event Management
What does SOC stand for?
Security Operations Centre
What does SOC stand for?
Security Operations Centre
What are the 3 simple phases of a Penetration Test?
- Preparation
- Assessment
- Post-Assessment
What are the 3 Law Categories?
- Criminal
Laws that protect public safety and usually have jail time attached - Civil
Private rights and remedies - Common
Laws that are based on societal customs
What does OSSTMM stand for?
Open Source Security Testing Methodology Manual
Who is OSSTMM maintained by?
ISECOM ( Institute for Security and Open Methodologies)
OSSTMM - What are the 3 types of compliance?
- Legislative
Deals with government regulations (Such as SOX and HIPAA). - Contractual
Deals with industry / group requirement (Such as PCI DSS). - Standards based
Deals with practices that must be followed by members of a given group/organization (Such as ITIL ,ISO and OSSTMM itself)
What is ISO 27001?
Security standard based on the British BS7799 standard, focuses on security governance
What is ISO 27002?
Standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
What is NIST-800-53?
Catalogs security and privacy controls for federal information systems, created to help
implementation of FISMA
What does FISMA stand for?
Federal Information Security Modernization Act
What is FISMA?
A law to codify the authority of the Department of Homeland Security with regards to implementation of information security policies
What does FITARA stand for?
Federal Information Technology Acquisition Reform Act
What is FITARA?
A bill that was intended to change the framework that determines how the US GOV purchases technology
What does HIPAA stand for?
Health Insurance Portability and Accountability Act
What is HIPAA?
Law that set’s privacy standards to protect patient medical records and health information shared between doctors, hospitals and insurance providers
What does PCI-DSS Stand for?
Payment Card Industry - Data Security Standard
What is PCI-DSS?
Standard for organizations handling Credit
Cards, ATM cards and other POS cards
What is COBIT (Control Object for Information and Related Technology)?
IT Governance framework and toolset , created by ISACA and ITGI
What is SOX (Sarbanes-Oxley Act)?
Law that requires publicly traded companies to submit to independent audits and to properly disclose financial information
What is GLBA U.S Gramm-Leach-Bliley Act?
Law that protects the confidentiality and integrity of personal information that is collected by financial institutions.
What does CSIRT stand for?
Computer Security Incident Response Team
What is purpose of CSIRT?
Team provided a single point of contact when reporting computer security incidents
What does ITIL stand for?
Information Technology Infrastructure Library
What is purpose of ITIL?
An operational framework developed in the ’80s that standardizes IT management procedures
Which of the following is an example of a Single Class A network?
1. 10.0.0.0/8 (255.0.0.0)
2. 172.16.0.0/12 (255.240.0.0)
3. 192.168.0.0/16 (255.255.0.0)
- 10.0.0.0/8 (255.0.0.0)
Which of the following is an example of 16 Class B networks?
1. 10.0.0.0/8 (255.0.0.0)
2. 172.16.0.0/12 (255.240.0.0)
3. 192.168.0.0/16 (255.255.0.0)
- 172.16.0.0/12 (255.240.0.0)
Which of the following is an example of 256 Class C networks?
1. 10.0.0.0/8 (255.0.0.0)
2. 172.16.0.0/12 (255.240.0.0)
3. 192.168.0.0/16 (255.255.0.0)
- 192.168.0.0/16 (255.255.0.0)
What is DLP and what does it do?
Data loss prevention: Software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in-use, in-motion, and at-rest
What is MDM and what does it do?
Mobile Device Management: Software is used for the configuration and securing of mobile devices like smartphones and tablets.
What is UTM and what does it consist of?
Unified Threat Management: Is a device that combines the functions of a firewall, anti-malware solution, and IDS into a single piece of hardware.
Where is the Regional Internet Registry located for ARIN?
North America
ARIN (American Registry for Internet Numbers)
Where is the Regional Internet Registry located for LACNIC?
Latin America
LACNIC (Latin America and Caribbean Network Information Centre)
Where is the Regional Internet Registry located for RIPE NCC?
Europe, Middle East, Central Asia
RIPE NCC (Réseaux IP Européens Network Coordination Centre)
Where is the Regional Internet Registry located for AFRINIC?
Africa
AFRINIC (African Network Information Centre)
Where is the Regional Internet Registry located for APNIC?
Asia/Pacific
APNIC (Asia Pacific Network Information Centre)
When does the Payment Card Industry Data Security Standard (PCI-DSS) performs external and internal penetration testing among organizations?
At least once a year and after any significant upgrade or modification.
How is False Negative best described?
Happens when no alarm was raised even though an attack has taken place.
What are the 5 response types to risk?
- Acceptance
- Avoidance
- Transference
- Mitigation
- Exploitation
When does Secondary NS requests a zone transfer from a Primary NS?
When a Primary SOA is higher than a Secondary SOA
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
USER, NICK
How does the TCP Handshake gets terminated?
FIN
ACK-FIN
ACK
How is True Positive best described?
Alert was raised when an attack has taken place.
How is True Negative best described?
No alert was raised and no attack has taken place.