General Flashcards
What is in CIA triad
Confidentially
Integrity
Availability
List 6 step incident response
Prepare
Detection and analysis
Containment
Eradication
Recovery
Post incident activity or lessons learned
What are the triple AAA
Stands for accounting, authentication, and authorization
What is MITREs model for post attack techniques called
ATT&CK
adversial tactics , techniques, and common knowledge
List 7 steps of kill chain attack
Recon
Weaponization
Delivery
Exploitation
Installation
Command and control
Actions on objectives
What are the general 5 steps to hacking
Recon
Scanning
Gaining access
maintaining access
Covering tracks
What are 5 steps of pen test
Planning
Scanning
Gaining access
Maintaining access
Analysis & reporting
List examples of substitution ciphers
Rot13, Caesar cipher, and keyword cipher
What is one time pad
It’s unbreakable if properly used. Each person would get copy of pad to encrypt message which was the key
What is symmetric crypto
Uses one key to encrypt and decrypt
Symmetric key crypto uses what two ciphers and how do they encrypt
Block and stream
Block is by bytes while stream is bit at a time
List some symmetric key algorithms
Des,3des, and aes
List popular stream ciphers
RC4, seal, and ORYX
What two keys does asymmetric crypto use
Public and private
List common asymmetric algorithms
RSA, ECC, ECDSA, DSS, el gamal, and diffie hellman
List common hash algorithms
Sha, md5, and RACE
How does a digital signature get made using PKI
First hashed
Encrypted using private key
Receiver uses public key to decrypt
Ocsp versus crl
CRL is list download and checked
While online certificate services protocol checks certificate online to see if valid
What is ocsp stapling
Instead of web browser reaching out to ca. Web server caches response from oscp, and then staples response to certificate sent to client
What are the 5 threat intelligence lifecycle steps
Planning & requirements
Collection and processing
Analysis
Dissemination
Feedback
What are pkcs
Public key cryptographic standards for different uses in PKI infrastructure
What is pkcs 7 used for
Sign or encrypt messages
What is pkcs 10 used for
It’s standard to be used to request certificate from CA
What is pkcs 12 or pfx
File that stores private key, certificate chain, and certificate can be protected by password
What are 2 use cases of pkcs 7
Store certificates or CRL lists
What does windows event logon type 2 mean
It was an interactive login
What does windows event log type 3 mean
It was network login such as connection to shared drive
What does windows event logon type 10 mean?
Remote interactive such as rdp or terminal services
What trust model does full disk encryption use
Hardware root of trust
What are standard operating procedures
Step by step instructions on how to carry out a task
What are the iso 27000 standards
Series of standards that provide framework for info sec management practices
What is iso 27001
Framework and standards for information security management systems
What is operational technology?
It is systems that are used to monitor and manage manufacturing or industrial process assets
What is an ics and scada system
industrial control systems
Supervisory control and data acquisition systems
What vulnerabilities do legacy industrial systems like modbus possess
Don’t always support authentication, confidentiality, and replay protection
What are the 7 logging facility levels in syslog
1 Alert
2 Critical
3 Error
4 Warning
5 Notice
6 Informational
7 Debug
What is ntp and what port does it use?
Network time protocol
Uses udp port 123
What is log normalization
Converting log data into particular data representation and categorizing consistently
Why should logs use UTC time
It’s universal can easily convert to whatever time zone analyst is working in
What are the 4 areas in diamond model
Adversary
Capabilities
Infrastructure
Victim
What are 2 examples of hardware root of trust devices
TPM and HSM hardware security module
What do physical controls do?
Mitigate risks to physical security and also include technical controls
What do administrative/managerial controls do?
Mitigate risks by implementing certain processes and procedures
What do technical controls do?
Manage risk using technical measures such as antivirus or firewall
What are key and compensating controls
Key are ones that are primary and can affect an entire process if they fail
Compensating replace impracticable or unfeasible key controls
What is nist sp 800-53
Security and privacy controls for info systems
What 2 frameworks are common for cyber security
Iso 2700 series and nist sp 800-37 risk management and sp 800-35 security and privacy controls
What is iaas, paas, and saas
Iaas is cloud stuff like vps
Paas platform with some control like azure and
Saas is little to no control like office 365
What else are counter measures called in risk management?
Security controls
What is user acceptance testing
Where users test stuff like beta testing
What is regression testing ?
re-running functional and non-functional tests to ensure that previously developed and tested software still performs as expected after a change