Extra Flashcards

1
Q

Common Threats

A

-Dictionary Attack = Attacker attempts to steal an identity by brute forcing into a target accounts

-Disruptive Attack = An attack which attempts to disrupt a computer system or network for various reasons: DDoS, Coin miners, Rootkits, Trojans, Worms, etc.

-Ransomware = A type of malicious software (malware) that when installed holds data, workstation or a network hostage.

-Data Breach = When a malicious actor gains unautorized access to a system in order to extract private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Extended Detection and Response (XDR) -
Endpoint Detection and Response (EDR)

A

XDR is cross-layered detection and response security system. Uses a holistic approuach to detect and respond threats that would normalyy evade detection in a single-vector solution by collaborating multiple data sources into a multi-vector solution.

EDR combines real-time continous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud Access Security Broker (CASB)

A

CASB sits between cloud service users and cloud applications, and monitors all activity and enforced security policies.

  1. Remote Workforce / Corporate Office
  2. CASB: Control and Monitoring, Compliance Management, Data Security. Threat Protection
  3. Cloud Services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Security Posture Management (CSPM)

A

Security Posture: A formula to determine the overall effectiveness of a companies security overall defense

CSPM identify and remediate risks through security assessments and automated compliance monitoring. Automatically alerts security staff when a vulnerability is found.

-Zero Trust-based access control
-Real-time risk scoring
-Threat and Vulnerability Management (TVM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Just-in-Time | Just Enough Privilege

A

JIT = Giving access to resources only during the time when needed reducing the surface attack.

JeP = Giving access to only the specific actions (API calls) reducing the surface attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Automated Investigation and Remediation (AIR)

A

Automated Investigation = A service which uses an inspection algorithms that triggers an alert which in turn creates an incident

Automated Remediation = A service which watches for types of incidents and matches it with a remediation action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat Analysis & Modelling

A

TA = Is the practice of mitigating possible threats via threat modelling

TM = A structured process for identifying attackers and cataloging possible threats

Microsoft Security Development Lifecycle uses STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) and provides a tool to assist with this process > Microsoft Threat Modelling Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Microsoft Privacy Principles

A
  1. Control = You are in control of your privacy with easy-to-use tools and clear choices
  2. Transparency = We will be transparent about data collection so you can make informed decisions
  3. Security = We will protect your data with strong security and encryption
  4. Strong legal protections = We will respect your local privacy laws and fight for legal protection
  5. No content-based targeting = We will not use you email, chat, files or other, to target ads to you
  6. Benefits to you = When we do collect data, we will use it to make your experience better
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Microsoft Privacy

A
  1. Control your data = Your data belongs to you, Data processing only with consent
  2. Control data location = You choose where your data is located
  3. Securing your data = AES256 (at-rest), SSL/TLS (in-transit), Key Vault (Encryption keys)
  4. Defending your data = Responding to data requests, Law requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Primary Security Perimeter

A

Traditional security focused on firewalls and VPNs since there were few employees or workstations outside the office.

-BYOD, remote workstations access controls via Zero-trust model, e.g MFA
-User Identity Management becoming the primary perimeter for security (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microsoft Entra ID

A

Is Microsoft’s cloud-based identity and access management service.

  1. Free = MFA, SSO, Basic Security and Usage Reports, User Management
  2. Office 365 Apps = Company Branding, SLA, Two-Sync between On-Premise and Cloud
  3. Premium 1 = Hybrid Architecture, Advanced Group Access, Conditional Access
  4. Premium 2 = Identity Protection, Identity Governance

Can authorize and authenticate multiple sources:
On-Premises = Azure AD Connect
Web-App = App Registrations
Google & Facebook = External identities
Azure & M365 = Cloud Applications

App Registrations = Allows developers to integrate web-apps to use Azure AD authenticate users and request access to user resources such as email. calendar, and documents

External Identities = Allows people outside your organization to access your apps and resources, while letting them sign in using whatever identity they prefer

-B2B = Allows external business to authenticate with you app
-B2C = Allows customers to authenticate with your app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MDM and MAM

A

Mobile Device Management (MDM) = Control the entire device, can wipe data from it , and also reset it to factory settings

Mobile Application Management (MAM) = Publish, push, configure, secure, monitor, and update mobile apps for your users.

-Managed via Microsoft Intune
-You need Azure AD Premium 2
-Intune not part of Microsoft Endpoint Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Azure AD Connect

A

Is a hybrid service to connect your on-premises AD to you Azure Account

-Allows for SSO from your on-premises workstation to Azure

-Password Hash Synchronization = Sign-in method, synchronizes a hash of a users on-premises AD password with Azure AD
-Pass-through Authentication = Sign-in method, allows users to use the same password on-premises and in the cloud
-Federation Integration = Hybrid environment using an on-premises AD FS infrastructure, for certificate renewal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Azure Encryption Overview

A

-Azure Storage Service Encryption (SSE) = Protect data at rest by automatically encrypting before persisting it to: Managed disks, Blob Storage, Files, Queue.

-Transparent Data Encryption (TDE) = Encrypts data-at-rest for Microsoft Databases

AzureManaged Disks Supports 2 types of encryption:

  1. Server Side Encryption (SSE) = Encryption at rest enabled by default for all managed disks, snapshots and images. Keys can be managed in two ways: 1-Platform-managed keys (Azure manages) 2-Customer-managed keys (You manage)
  2. Azure Disk Encryption = Encrypt Windows and Linux IaaS VMs disks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Azure Security Benchmark

A

Includes a collection of high-impact security recommendations you can use to help secure the services you use in Azure. It includes Security Controls and Service Baselines.

-Security Controls = Recommendations applicable across your Azure tenant and services.

-Service Baselines = Recommendations on a individual service’s configuration. (minimum)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Azure Security Center

A

Is a unified infrastructure security management system, it strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud.

-Regulatory Compliance Dashboard shows your compliance posture for a set of supported standards and regulations.

-Secure Score = Single score that represents your current security situation

17
Q

Microsoft Defender

A

Provides advanced protection for you Azure and on-premises workloads. Composed of:

-Coverage: Lets you see the resources types in your subscription, elegible for protection.
-Security Alerts: Describe detauls of the affected resources, suggested remediation steps
-Insights: Rolling pane of news for reading (high priority alerts)
-Advanced Protection: Additional security features that are driven by analytics (VM/SQL Vulnerability Assessment, Just-in-time VM access, Adaptative Application Control, etc.)

Provides a unified pre- and post-breach enterprise defense suite that natively coordinates responses (detection, prevention, investigation) and across (endpoints identities, email, applications) to provide integrated protection against sophisticated attacks.

-Has Secure Score

18
Q

Exchange Online Protection

A

EOP is a cloud-based filtering service that protects your organization against spam, malware, and other email threats. Anti-malware, Anti-spam, Connection filtering, Anti-phishing, Anti-spoofing, etc.