Flash Flashcards

1
Q

Storage timing covert

A

Process and ram related

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Certification and accreditation

Trust and assurance

A

Certification is the comprehensive technical analysis of a solution to confirm it meets the desired needs.

Accreditation is management’s official sign-off of certification for a predetermined period of time.

other words, trust is the presence of a security mechanism, function,
or capability. Assurance is the degree of confidence in satisfaction of security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PP; toe and security target

A

The first component is the Protection Profile (PP). The PP lists the security capabilities that a type or category of security products should possess.

Target of Evaluation (TOE) is the next component. Using the earlier firewall example, if a vendor desires for their firewall to be rated according to the Common Criteria, the firewall would be considered the TOE. The TOE—the Target of Evaluation—is simply a vendor’s product that’s being rated and being assessed according to the Common Criteria.

The next component, the Security Targets (ST), describe—from the vendor’s perspective—each of the firewall’s security capabilities that match up with capabilities outlined in the Protection Profile.

Written statement by vendor explaining how functional and assurance specifications of the product meet the protection profile (PP) requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Binding and sealing in TPM

A

Binding – A cryptographic operation in which data is encrypted in such a way that it is tied (bound) to a specific TPM’s hardware and software configuration. For example, encryption keys that are stored on a TPM can be bound to it, ensuring that keys are only accessible by that specific TPM and that the system’s integrity has not been compromised.

Sealing – A cryptographic operation that involves encrypting data. However, unlike binding, sealing is not tied to the TPM’s state or configuration. Instead, sealing is used to only allow the data to be decrypted in certain conditions, such as in the presence of certain software or after user authentication. As an example, sealing can be used to ensure that certain data can only be decrypted by the TPM if a user logs into a system with the correct credentials.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Resource pooling in cloud

A

Resource pooling relates to sharing the three primary sources of cloud computing (processors, disk space, and the network). They are almost never directly accessible because of typically being shared—pooled—among multiple users. So, resource pooling describes the relationship between the fundamental hardware that makes up the compute, storage, and network resources—the pool—and the multiple customers that utilize those resources. This is one of the key characteristics of cloud computing that points to significant value and economies of scale for consumers and cloud providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between monolithic ; micro services and server less (Faas)

A

Monolithic applications typically comprise of a back-end database, an application and a user interface. Correspondingly, this implies a single large code base, and changes to an application may require updates to all three areas.

Compared to a monolithic application that exists and operates as one unit, microservices exist and function as separate units that are loosely coupled via API calls.

The term serverless takes the basic premise of microservices—hyperfocused, independent pieces of functionality coupled together through APIs—and extends it to the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SASE

A

Secure access service edge (SASE), pronounced sassy, is a suite of technologies that is often looked upon as the future of wide area networks (WANs). It combines network security and wide area networking into a cloud-based service. It aims to get data and services as close to the end users as possible, while still maintaining robust security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Difference between xss and csrf

A

With XSS, the target of attack is the user’s browser; with CSRF, the target of attack is the web server

The success of a cross-site request forgery attack is predicated upon the concept of “persistence” that cookies in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reflected and stored xss

A

In the first example, malicious code is stored on the web server. This type of cross-site scripting is known as stored or persistent because the malicious code is stored on the server, and every user who visits that webpage is going to fall victim to that attack. In the second example, malicious code is reflected back to the victim via a carefully crafted URL. So, unlike the persistent cross-site scripting attack (which leverages multiple victims) reflected cross-site scripting targets one victim—the person who clicks on the provided crafted URL. Anyone else who visits the normal URL will not be impacted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confusion and diffusion

A

The first property is known as confusion, which focuses on hiding the relationship between the key and the resulting ciphertext. The confusion property suggests that if one bit of the key is changed, then about half of the bits in the ciphertext should change.

Diffusion follows similar thinking as confusion, but is focused on the plaintext. It suggests that if a single bit of the plaintext is changed, then approximately half of the bits in the ciphertext should change. The diffusion property focuses on hiding the relationship between the plaintext and the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block vs stream

A

However, block mode ciphers also provide an advantage, namely, that they have a high diffusion rate and are very resistant to tampering.

stream ciphers provide a clear speed advantage over block mode ciphers, because they work with one bit at a time as opposed to block ciphers that need to fill blocks and do creative operations with those blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Null cipher

A

A null cipher involves hiding a plaintext message within other plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deffie helman

A

Diffie–Hellman Key Exchange (uses discrete logarithms) is an asymmetric algorithm used primarily for symmetric key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CSR and issuance of certificates

A

After completing this process, the CSR will be effectively signed by the root of trust (root CA) private key, following the X.509 standard, and the certificate will be issued by an intermediate/issuing CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key recovery

A

Dual control

Split knowledge

Key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Side channel attack and fault injection attack

A

With a side-channel attack, the target is not the system or the algorithm itself. Rather, using complex tools, a system’s operations can be monitored and measured. Based upon these observations and measurements of items like timing (the length of time to perform an activity), power used (how much power is consumed during an activity), and radiation emissions (emissions made by all devices and systems), significant insight can be gleaned.

Fault Injection Attack In these attacks, the attacker attempts to compromise the integ- rity of a cryptographic device by causing some type of external fault. For example, they might use high-voltage electricity, high or low temperature, or other factors to cause a malfunction that undermines the security of the device.
Side-Channel Attack Computer systems generate characteristic footprints of activity, such as changes in processor utilization, power consumption, or electromagnetic radi- ation. Side-channel attacks seek to use this information to monitor system activity and retrieve information that is actively being encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Golden and silver ticket

A

The KRBTGT account is the Kerberos Key Distribution Center (KDC) service account and is responsible for encrypting and signing all Kerberos tickets. Through this access, an intruder can forge ticket granting tickets (TGT),

In this context, TGS tickets are known as silver tickets, because the scope of access is limited compared to the access of a golden ticket—the KRBTGT service account password hash. Silver tickets only allow for access to a particular resource, including the host system. However, the ability to forge silver tickets also means that an attacker can create TGS tickets undetected, because interaction with the KDC is not required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HMAC

A

However, it operates in a more efficient manner than the digital signature standard described in the following section and may be suitable for applications in which symmetric key cryptography is appropriate. In short, it represents a halfway point between unencrypted use of a message digest algorithm and computationally expensive digital signature algorithms based on public key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP sec modes and security associations

A

IPsec provides for two discrete modes of operation. When IPsec is used in transport mode for end-to-end encryption, only the packet payload is encrypted. This mode is designed for peer-to-peer communication. When it’s used in tunnel mode, the entire packet, including the header, is encrypted. This mode is designed for link encryption.
At runtime, you set up an IPsec session by creating a security association (SA). The SA represents the communication session and records any configuration and status information about the connection. The SA represents a simplex connection. If you want a two-way channel, you need two SAs, one for each direction. Also, if you want to support a bidirec- tional channel using both AH and ESP, you will need to set up four SAs.
Some of IPsec’s greatest strengths come from being able to filter or manage communica- tions on a per-SA basis so that clients or gateways between which security associations exist can be rigorously managed in terms of what kinds of protocols or services can use an IPsec connection. Also, without a valid security association defined, pairs of users or gateways cannot establish IPsec links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

throughput

A

actual rate of successful data transfer achieved, measured over a period of time. Note that bandwidth is the maximum amount, while throughput is the actual amount.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

signal-to-noise ratio

A

The level of the desired signal in comparison with the amount of background noise. A higher signal-to-noise ratio can allow for higher data transfer rates, because it means that there is less chance of lost packets and corrupt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Infiniband

A

InfiniBand A protocol for remote direct memory access (RDMA). This protocol is designed to provide access to memory as quickly as possible across the network. It is commonly used in applications like machine learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Spoofing

A

It’s really important to remember that when an IP address is spoofed by the attacker, although they can send traffic to a target resource, they won’t be able to accept something in response. Any response will be directed to the legitimate holder of that IP address.

24
Q

ARP poisioining

A

switch has a content addressable memory (CAM) table, which holds mappings of MAC addresses and which ports the respective devices are connected to. When traffic for a device for which the switch doesn’t have an entry reaches it, it will send a broadcast message that essentially asks, “What MAC address belongs to this IP address?” All of the devices will look at their ARP tables, and the device associated with that IP address will reply back, “That’s me, here’s my MAC address,”

25
Q

To secure wireless communication

A

To secure wireless communication, four (4) security services are required: access control, authentication, encryption, and integrity protection

26
Q

SDN architecture

A

SDN architecture includes application, control, and data planes. Communication between application and control planes is facilitated by northbound APIs; communication between data and control planes is facilitated by southbound APIs.

Application plane

Control plane

Data plane

27
Q

IEEE 802.1Q

A

IEEE 802.1Q refers to the IEEE standard that supports VLANs and SDNs. Among other things, the standard defines a system of what is known as “VLAN tagging” for network traffic as well as how bridges and switches should handle tagged frames.

28
Q

Dual homed host; screened host; Screened subnet; multihomed firewall

A

host can understand all layers of the OSI model and can therefore support all types of firewall technologies described above.

Bastion host

Screened subnet - DMZ

The multihomed firewall deployment method uses a single firewall with one interface connected to the internet, a second interface to the screened subnet, and a third interface to the intranet.

29
Q

VPN

A

VPN is tunneling plus encryption; without encryption, it can only be called a tunnel.

30
Q

SSH which layer protocol

A

L7 which provide tunnelling + encryption

It works only in transport mode - link encryption

31
Q

Advantage of IP sec

A

IPsec offers two advantages over other protocols from a security perspective. It adds authentication of devices as well as encryption. Authentication is added through AH and encryption through ESP. AH provides integrity, data-origin authentication, and replay protection. ESP provides all the functions AH does, in addition to ensuring confidentiality, as it provides payload encryption.

32
Q

Routing protocols

A

I-D ( RI) L - (OSPF, IS-IS) E - P

Get rid of oil

33
Q

Essid BSsid and issid

A

Wireless networks are assigned a service set identifier (SSID) to differentiate one wireless network from another. Technically there are two types of infrastructure mode SSIDs: extended service set identifier (ESSID) and basic service set identifier (BSSID). An ESSID is the name of a wireless network when a WAP is used. The BSSID is the MAC address of the base station, which is used to differentiate multiple base stations supporting an ESSID. Independent service set identifier (ISSID) is used by Wi-Fi Direct or ad hoc mode.
If a wireless client knows the SSID, they can configure their wireless NIC to communi- cate with the associated WAP.

34
Q

Essid BSsid and issid

A

Wireless networks are assigned a service set identifier (SSID) to differentiate one wireless network from another. Technically there are two types of infrastructure mode SSIDs: extended service set identifier (ESSID) and basic service set identifier (BSSID). An ESSID is the name of a wireless network when a WAP is used. The BSSID is the MAC address of the base station, which is used to differentiate multiple base stations supporting an ESSID. Independent service set identifier (ISSID) is used by Wi-Fi Direct or ad hoc mode.
If a wireless client knows the SSID, they can configure their wireless NIC to communi- cate with the associated WAP.

35
Q

Disadvantage of Kerberos

A

SESAME is a protocol for enabling single sign-on. Additionally, one of the big advantages of SESAME over Kerberos is that it supports symmetric and asymmetric cryptography, so it naturally solves the problem of key distribution, and it issues multiple tickets, which mitigates vulnerability to attacks like TOCTOU.

36
Q

Principle of access control

A

The Principle of Access Control refers to accountability. In order to achieve accountability, several things need to happen: 1. Users must be uniquely identified 2. Users must be properly authenticated 3. Users must be properly authorized 4. All actions should be logged and monitored With all these components in place, then, and only then, can the Principle of Access Control be achieved.

37
Q

Principle of access control

A

The Principle of Access Control refers to accountability. In order to achieve accountability, several things need to happen: 1. Users must be uniquely identified 2. Users must be properly authenticated 3. Users must be properly authorized 4. All actions should be logged and monitored With all these components in place, then, and only then, can the Principle of Access Control be achieved.

38
Q

ABAC and its need

A

Because of this fact and because so many companies are moving to the cloud and hosting important applications there, the need for better authentication and authorization to those applications is imperative. ABAC’s operation is shown in Figure 5-16, where a user needs to access a particular resource, and for that to happen, the authorization engine has to check the policy and match that against a variety of attributes that relate to the user and their environment.

It uses XACML

39
Q

Validation vs verification

A

Validation answers one fundamental question: Are we building the right product? Verification follows validation and asks a related and equally important question: Are we building the product correctly?

Assurance is provided through validation and verification

Are we building right product

40
Q

Boundary Vs Equivalence partioning

A

Boundary value analysis requires first identifying where there are changes in behavior—these are called boundaries. In the given example, there is a change in behavior between 7- and 8-character lengths—7 should be rejected, and 8 should be accepted. There is a second boundary between 16- and 17- character lengths—16 should be accepted and 17 should be rejected. Once the boundaries have been identified, testing can be focused on either side of the boundaries, as this is where there are most likely to be bugs. Equivalence partitioning starts with the same first step of boundary value analysis—identifying the boundaries, and then goes a step further to identify partitions. Partitions are groups of inputs that exhibit the same behavior.

41
Q

Open ID

A

Provides decentralised authentication

It’s an authentication standard

User enters open Id identifier and it acts as relaying party

42
Q

ARPreroast and kerbroasting

A

ASREPRoast identifies users that don’t have Kerberos preauthentication enabled. Kerberos preauthentication is a security feature within Kerberos that helps pre- vent password-guessing attacks. When preauthentication is disabled, attackers can send an authentication request to a KDC. The KDC will reply with a ticket-granting ticket (TGT), encrypted with the client’s password as the key. The attacker can then perform an offline attack to decrypt the ticket and discover the client’s password.
Kerberoasting Kerberoasting collects encrypted ticket-granting service (TGS) tickets. Service accounts (user accounts used by services) use TGS tickets instead of TGT tickets. After harvesting these tickets, attackers can crack them offline.
A TGS ticket is used by services running in the context of a user account. This attack attempts to find users that don’t have Kerberos preauthentication

43
Q

Web vulnerability scan

A

When an adminis- trator runs a web application scan, the tool probes the web application using automated techniques that manipulate inputs and other parameters to identify web vulnerabilities

44
Q

Direct evidence

A

Direct evidence speaks for itself and requires no inference (e.g., eyewitness accounts, confessions, a smoking gun). Direct evidence directly proves a fact being discussed. An example of direct evidence is video footage showing a defendant breaking into the computer storage area and walking out with two laptops.

45
Q

Circumstantial and corroborative evidence

A

Also referred to as indirect evidence, circumstantial evidence suggests a fact by implication or inference and can prove an intermediate fact. An example of circumstantial evidence is a witness testifying that the defendant was near the computer storage area after it had been broken into.

Corroborative evidence supports facts or elements of the case, not a fact on its own, but supports other facts. Corroborating evidence can be very powerful, as it serves to uphold and confirm testimony of witnesses and other forms of evidence.

46
Q

Heuristic based AV

A

Heuristic systems generally work one of two ways: 1. Static code scanning techniques: the scanner scans code in files, similar to white box testing 2. Dynamic techniques: the scanner runs executable files in a sandbox to observe their behavior.

47
Q

Clustering and redundancies

A

Clustering = a group of systems working together to handle a load. Redundancy = typically a primary system and secondary system, with the secondary system in standby mode and ready to take over if something goes wrong with the primary system. Clustering and redundancy both include high availability as a by-product of their configuration.

48
Q

Work recovery time

A

This is the time needed to verify the integrity of systems and data as they’re being brought back online. Just bringing systems back online is not enough to ensure the viability and continuity of operations in an organization.

MTD = RTO + WRT

49
Q

CI CD Continous deployment

A

Continuous integration involves automating many of the steps for committing code to a repository, as well as automating much of the testing. This allows code changes to be frequently integrated into the shared source code and ensures that a bunch of testing gets done easily. Continuous delivery also involves automating the integration and testing of code changes, but it also includes delivery, automating the release of these validated changes into the repository. Continuous deployment takes things a step further and automatically releases the code changes into production so that they can be used by customers.

50
Q

Memory/Object reuse

A

The ability to overwrite storage where secure and sensitive information has been written or stored. Most applications don’t have the ability to overwrite storage where sensitive information has been written, which can lead to this information being available or viewable by other applications.

51
Q

Memory/Object reuse

A

The ability to overwrite storage where secure and sensitive information has been written or stored. Most applications don’t have the ability to overwrite storage where sensitive information has been written, which can lead to this information being available or viewable by other applications.

52
Q

Buffer overflows protection

A

Address space layout randomization (ASLR) can be used to protect against buffer overflows. Parameter/bounds checking is another way to protect against buffer overflows.

53
Q

Total Risk

A

Threat x vulnerability x Asset value

54
Q

ACID

A

All or nothing

Consistent with rules and state

Isolate

Preservation

55
Q

Mode in os and cpu

A

User mode kernel mode - ring protection

Problem state and supervisory mode