Fundamental of Sec Flashcards
CIA
Confidentiality - Information is only available for the people who have appropriate authorization
Integrity - data is not modified or altered (checksum use for checking)
Availability - Information or data available when needed with proper authorization.
Later add two more letters for this: N & A
N - Non-repudiation - When any action occurs, the people involved in that incident cannot deny that they are not involved.
A- Authentication
What is AAA?
A- Authentication - Verifying the identity of the user who tries to logon
A - Authorization - what are the resources and actions that can be performed by authenticated users.
A - Accounting - tracing of activities and usage of the users for billing and auditing purposes.
What are the mentioned for data confidentiality?
Encryption
Access Controls
Data Masking
Physical Security Measures
Training and Awareness
How to maintain Integrity of the data?
Hashing - When any data get alter in small amount, hash will change in vastly.
Hash Digest work as a digital finger print and any data integrity change will indicate it.
Digital Signature - When the hash digest encrypt using users private key.
Regular Audits - Will help to identify any issue related to data
Checksum - Need to compare Origination checksum and Destination checksum. If the values are same then data did not alter when it transmitting.
ACL - Only authorized users can access the file or data.
What are the Authentication factors?
Knowledge Factors
Possession Factors
Inherence Factors
Action Factors
Location Factors
What is the meaning of accounting in Cyber Sec:
Keep the track of the all the actions of users and monitor them.
What we can use to check the accounting on the system?
Audit Trail
Regulatory compliance
Forensic Analysis
Resource Optimization - Monitor the resources and regulate accordingly to have more availability for the resources.
User Accountability - Monitor every individual actions.
What are the tools which we can use for accountability?
Syslog Servers
Network Analyzers
SIEM - Security Information and event Management - Provide Realtime insight of the network and hardware using different tool about the network.
Security Control Categories
Technical
Managerial
Operational
Physical
Security Control Types
Preventative
Deterrent - Make it seem to be difficult to attack or appeal
Detective
Corrective - After detecting the treat we can use corrective controls the mitigate the action. Jumping the emergency
Compensating - This tools use to protect the system if the other protecting tools not capable of doing it with modern tech. Offer backup and mitigation
Directive - Policies or documents that used to set the rule
Threat Actors
Unskilled Attackers
Hacktivists
Organized Crimes
Nation-State Actors
Insider Threats
Threat actors attributes
Internal vs External
Resources and Finding
Level of Sophistication and capability
APT
Advance Persistent Threat - Mostly this kind of attack can be launch by State-Sponsored Hackers. Because they have the capability of waiting and launching.
Threat Vector
Pathway or the source that attacker gain the access for deploying the attack.
Attack Surface
Every point where attacker try to enter the network and launch the attack.
Threat Actor
The person who attack the launch
Motivational Triggers for Social engineering attack?
Authority
Urgency
Social Proof
Scarcity
Likability
Fear
Type of Impersonations?
Impersonation
Brand Impersonation
Typo squatting
Watering Hole Attack