Flashcards

1
Q

EISA

A

Enterprise Information Security Architecture - the practice of applying a comprehensive and rigorous method for describing a current and/or future structure and behavior for an organization’s security processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 asset ownership categories?

A
  1. Owner – owns the information, determines the classification level
  2. Steward – manages the data/metadata, ensures compliance (standards/controls) and data quality
  3. Custodian – keeper of the information, ensures CIA is maintained (security role)
  4. User – accesses data
  5. CPO – Chief Privacy Officer ensures privacy of all data in the entire organization, manages all other roles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a Data Retention Policy.

A

A data retention policy identifies how, where, and why data will be retained (e.g. operational use, adherence to legal and regulatory requirements, periodic audits, etc.) The intent is to define how long data needs to be kept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between data Sanitization and data Destruction?

A

Data Sanitization – Data is irreversibly removed from media

Data Destruction – Data and media are both destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 4 methods of data sanitization.

A
  1. Degaussing – removing the magnetic field of drive
  2. Purging – clearing everything off the media
  3. Wiping – overwriting every sector of drive with 1 and 0
  4. Encryption – encrypting all files before deleting or disposing of media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 4 methods of data destruction.

A
  1. Burning – incinerating fibers
  2. Shredding – cutting vertical/horizontal lines
  3. Pulverizing – reducing fibers into fine particles using crushing, grinding, etc.
  4. Pulping – breaks down fibers using chemicals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the government data type categories?

A
  • Top Secret
  • Secret
  • Confidential
  • Sensitive But Unclassified (SBU)
  • Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the private sector data type categories?

A
  • Confidential
  • Private
  • Sensitive
  • Public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 5 security control types?

A
  • Preventive – Stops attacker from performing attack
  • Detective – Identifies an attack that is happening
  • Corrective – Restores a system to state before attack
  • Deterrent – Discourages attacker from performing attack
  • Compensating (recover) – Aids controls already in place
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three security control categories?

A
  1. Administrative – Defines policies, procedures, and guidelines (e.g. password policy, hiring/screening policy, mandatory vacations, training).
  2. Technical – Controls access to a resource (e.g. firewalls, encryption, passwords, IDS/IPS, smartcards, biometrics, etc.)
  3. Physical – Controls access to facility (e.g. locks, guards, fences, video cameras, gates, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three data states?

A
  • Data at Rest (storage) – Data on hard disks, memory cards, datacenters, cloud storage, archives, and backups, external and removable drives, etc.
  • Data in motion (transit) – Data sent on LAN, WAN, MAN, dedicated lines, wired, wireless, etc.
  • Data in use – Data in CPU registers, RAM memory, volatile storage such as router/switch, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you protect data at rest?

A
  • Conventional perimeter-based defenses like firewalls, IPS, and antivirus programs
  • Defense-in-depth access controls and MFA
  • Volume, disk, and file encryption
  • Partitioned storage (i.e. container security)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you protect data in motion?

A
  • Encapsulation
  • Dedicated Channels (e.g. B2B)
  • Transport Layer Security (SSL/TLS 1.2)
  • IPSec VPNs
  • Extensible Authentication Protocol (EAP) wireless variants
  • 802.1X and 802.11AE MACsec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does CIA or Security Triad stand for?

A
  • Confidentiality – ensuring only authorized users have the ability to access sensitive information
  • Integrity – ensuring only authorized subjects can edit/change/delete data
  • Availability – ensuring data access is uninterrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a cryptographic hash?

A

Maps data of any size to a fixed-length string (e.g. hash value, fingerprint, checksum, message digest, etc.). It is a one-way mathematical function with 128-512 bit length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is hashing used for?

A
  • Authentication
  • Data integrity
  • Nonrepudiation
  • Fingerprinting
  • Password storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are common hashing functions?

A
  • MD5 (128-bit digest produced)
  • SHA-1 (160-bit digest produced)
  • SHA-2 and SHA-3
  • RIPEMD (128-, 160-, 256-, 320-bit versions)
  • Hashes are actually only half as strong as the key lengths due to the birthday paradox
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Substitution Ciphers?

A

Replaces one letter for another. They are based on a rotation scheme or other key. Common ciphers include ROT13 and Caesar ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Polyalphabetic Cipher?

A

Replaces letters using multiple substitution alphabets and character sets. Vigenere is an example that uses a series of different Caesar ciphers based on the letters of a keyword (or secret key).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Transposition Cipher?

A

Rearranges or permutates letters (e.g. Rail Fence Cipher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the One-Time Pad (OTP) encryption cipher?

A

Considered unbreakable. Uses random number generator (RNG) or pseudorandom (PRNG) keys to generate values. Must be as long as the original message, which makes it difficult to deploy. (e.g. Vernam’s cipher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the different types of encryption keys?

A
• Manually generated
• Number generated
o Random number generator (RNG)
o Pseudorandom number generator (PRNG)
• Static keys
• Session keys
• Ephemeral keys  (not stored in long-term memory)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does “Forward Secrecy” mean to encryption?

A

Forward Secrecy is the use of short-term keys not used in any past sessions. It protects past sessions against future compromises of secret keys or passwords. A public-key cryptosystem has the optional property of forward secrecy when it generates one random secret key per session to complete a key agreement without using a deterministic algorithm (i.e. IPSec).

24
Q

What is the difference between Symmetric and Asymmetric encryption?

A

Symmetric algorithms use the same secret key for encryption and decryption. Asymmetric algorithms use different keys.

25
Q

What are the characteristics of Symmetric Algorithms?

A
  • Same secret key is used for encryption and decryption (key must be shared between sender and receiver securely)
  • Key is typically from 40 – 512 bits in length
  • Examples: DES (inactive), 3DES (3 iterations of DES – encryption, decryption, encryption), RC4, Blowfish/Twofish, AES (standard – 128, 192, and 256 Bits), and AWS uses AES-246 GCM
26
Q

What are the Benefits of Symmetric Algorithms?

A

Fast (wire-speed encryption, used for bulk data encryption such as VPN)

27
Q

What are the characteristics of Asymmetric Algorithms?

A
  • Different keys are used for encryption and decryption (generated together and mathematically related)
  • Public Key is shared with many, Private key is kept secret by owner
  • Keys range from 512 to 4,096 bits in length
  • Examples: RSA, DSA, Elliptic curve DSA, PGP/GPG, Diffie-Hellman
28
Q

What are the benefits of Asymmetric Algorithms?

A
  • Key management is simpler and more secure

* Best suited for digital signatures and session key exchange or agreement protection

29
Q

What are the downsides of Asymmetric Algorithms?

A
  • Slower than symmetric encryption (not suitable for bulk data encryption)
  • Design based on large numbers, computing discrete logarithms of large numbers
30
Q

How does asymmetric encryption change for Privacy vs Authentication?

A
  • Privacy = Encrypt with public key, Decrypt with private key
  • Authentication (Origin) = Encrypt with private key, Decrypt with public key
31
Q

What is the most popular encryption algorithm worldwide?

A
  • RSA (Ron Rivest, Adi Shamir, and Leonard Adleman) – 1978 at MIT
  • Based on factoring large numbers into their original prime number
  • Commonly used for digital signatures, key exchanges, and encryption
32
Q

What encryption is primarily used by governments and military?

A
  • DSA (Digital Signature Algorithm)
  • Patented in 1991 by David W. Kravits, former NSA employee, but NIST made the patent royalty-free
  • Commonly used for digital signatures
33
Q

What does a Data Loss Prevention (DLP) solution provide?

A

Provides strategic methods for ensuring that end users do not transmit sensitive or critical information outside the corporate network to stop data breaches and data leakage.

34
Q

What does PII stand for?

A

Personally Identifiable Information (PII) = Individual’s identifiable information (e.g. first name, last name, etc.)

35
Q

What does PHI stand for?

A

Protected Health Information (PHI) = Individual’s identifiable health information that contains at least on piece of information – name, address, birth date, phone number, mail or e-mail address, SSN, URL, IP, etc.

36
Q

What does AUP stand for?

A

Acceptable Use Policy

37
Q

What is Crypto Collision?

A

When two message inputs generate the same hash value

38
Q

What is the difference between Cryptography and Cryptanalysis?

A

Cryptography – Study and practice of security communications (e.g. encryption, hashing)
Cryptanalysis – study and practice of exploiting weaknesses in communication

39
Q

What is Ellptic Curve asymmetric encryption?

A
  • Rich mathematical functions (Values of points on a curve used in formula for encryption and decryption)
  • Most efficient (smaller keys providing exceptional strength – 3,072 standard key – 246 elliptic curve key – used in IOT devices with limited resources)
  • Commonly uses include digital signatures, key distribution, encryption
40
Q

What is the Diffie-Hellman asymmetric algorithm?

A
  • The first key agreement asymmetric algorithm used for generating shared secret keys
  • Same shared secret used all the time between parties
41
Q

What does DH encryption stand for?

A

Diffie-Hellman

• Same shared secret used all the time between parties

42
Q

What does DHE/EDH encryption stand for?

A

Ephemeral Diffie-Hellman

• Different shared secret used each time between parties

43
Q

What does ECDH encryption stand for?

A

Elliptic-curve Diffie-Hellman
• Uses EC Public/Private key pair
• Same shared secret used all the time between parties

44
Q

What does ECDHE/ECEDH encryption stand for?

A

Ellptical-Curve Ephemeral Diffie-Hellman
• Uses EC public/private key pair
• Different shared secret used each time between parties

45
Q

Name 5 different encryption attack classifications.

A
  • Ciphertext only – attacker has access only to a collection of ciphertexts or codetexts
  • Known plaintext – attacker has a set of ciphertexts to which he or she knows the corresponding plaintext
  • Chosen Plaintext – attacker can get the ciphertexts (plaintexts) corresponding to an arbitrary set of plaintexts (ciphertexts)
  • Adaptive Chosen Plaintext – attacker can choose subsequent plaintexts based on info learned from previous encryptions
  • Related Key – attacker can obtain ciphertexts encrypted under two different keys, keys are unknown but relationship is known
46
Q

What security-related activities do Routers perform?

A

o Network Address Translation (NAT)
o Infrastructure Access Control List (ACLs)
o Unicast and multicast Reverse Path Forwarding
o Integrated and modular L2-7 NGFW and IPS
o VPN gateways for TLS and IPSec
o URL filtering and caching
o Integration with various cloud services (web, email, DLP, antimalware)

47
Q

What are firewalls?

A
  • Integrated systems of threat defense functioning at Layers 2 – 7
  • Physical or virtual firewalls should be placed between all zones, domains, and partitions
  • Network or application-based firewalls
  • Restrictive (locked-down) vs. Permissive (allow, unless)
  • Stateless (packet filtering) vs. Stateful (maintains state)
  • Classic firewalls use interface-based ACLs and inspection rules
48
Q

What can next-generation firewalls (NGFW) do?

A
  • Layer 5-7 policies
  • Authentication proxy
  • Identity services
  • Integrated IDS/IPS
  • Content security
  • Advanced malware protection
  • URL filtering
  • Botnet filtering
  • Cloud correlation and participation
49
Q

What is an Asynchronous Transfer Mode (ATM) network?

A

A non-IP cell-switching protocol running on multiple layers: Physical, ATM, and ATM adaptation Layers

50
Q

What is a Converged IP network?

A

Commonly refers to a unified LAN, WAN, or MAN that uses multiple media (wired, wireless, cellular, satellite) to carry a variety of traffic types (data, voice, video, conferencing, etc.) without the need for separate networks for each.

51
Q

Describe the 7 Network Layers of the Open Systems Interconnect (OSI) Model.

A

Layer 7 – Application
Layer 6 – Presentation (compression, encryption)
Layer 5 – Session
Layer 4 – Transport
Layer 3 – Network
Layer 2 – Data Link (LLC, node to node data delivery, physical/MAC addresses, frames)
Layer 1 – Physical (Cables, Connectors, Repeaters, Hubs)

52
Q

What activity occurs at the Data Link (Layer 2) of the OSI model?

A
  • Physical addressing
  • Frame traffic control
  • Frame sequencing
  • Frame acknowledgement
  • Frame delimiting
  • Frame error checking
  • Establishing and terminating links
  • Media access management
  • Error control
  • Flow control
  • Access control
53
Q

What does the Logical Link Control (LLC) sublayer of the Data Link layer determine?

A

The LLC is the interface between media access methods and the network layer protocols. It determines if communication will be Connectionless (UDP) or Connection-Oriented (TCP).

54
Q

What is a MAC Address?

A

A Medium Access Control (MAC) address is responsible for connection to physical media. It is a 12-digit hexadecimal number unique to every computer.

55
Q

What activity occurs at the Network (Layer 3) of the OSI model?

A
  • Packet addressing
  • Converting MAC (Physical) to IP (Logical) address
  • Source-to-destination delivery
  • Routing (provides logical connection between different networks, combines various networks to form a larger network)
  • Subnet control (throttling)