General Concept (Chapter 1) Flashcards

1
Q

CIA Triad

A

Confidentiality
- protects systems and data form unauthorized access
Integrity
- ensures data and systems have not been tampered with
Availability
- ensures that data and systems can still be access by authorised users and systems when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security, Functionality, Usability

A

An interlocked systems where if security is increased both Usability and functionality decrease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defense in depth

A

Are layers of security control that provides redundancy incase one layer has been breached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

Is a weakness/flaw in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

Anything that can potentially take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exploit

A

A mechanism that takes advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Payload

A

Is the part of an exploit that damages the system/steals information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero-day attack

A

A new/unseen attack that the vendor has not seen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control

A

A policy that is employed to help protect systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mitigation

A

An actions or control that helps reduce the impact of a negative attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Non-repudiation

A

A security concept that prevents the denial of involvement or responsibility of an individual by applying a digital signature to all actions of a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Principle of least privilege

A

A security concept that allows only the bare minimum access to the data that a user needs to perform their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accountability

A

Ensure that responsible parties are held liable for their actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authenticity

A

The proven fact that something is legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gap analysis

A

A thorough analysis of an organisations security defenses that identify security flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentication, Authorization, Accounting

A

An Architectural framework to provide, enforce and audit access to a network or data resources.
- Authentication request are forwarded to a central AAA server (RADIUS, TACACS) which checks users credentials against the directory service server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Zero Trust

A

A security strategy that assumes that all systems on the network (public & private) are compromised and each have to be authorised to access the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Three principles of zero Trust

A

1) Least Privilege
2) Access Privileges must be constantly reauthorized
3) Continuous monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Honeypot

A

A decoy system intended to look legitimate to divert an attack so that information of the attacker can be gathered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Honeynet

A

A decoy networking containing 1 or multiple honeypots,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Honeyfile

A

A fake file located in a network file share or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Honey token

A

Fake data deployed that legitimate users won’t need access to it, so that only an attacker would access it thus signalling an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Physical Control

A

Are tangible mechanisms designed to prevent unauthorized access to rooms, equipment, documents and other items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Administrative/Managerial control

A

Procedures and policies that inform people on how the business is to be run and how day to day operations are to be conducted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Technical control

A

Any measures taken to protect assets and reduce risk via technological means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Operational Controls

A

Security controls that are primarily implemented and executed by people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Preventive control

A

Designed to prevent attacks from occuring in the first place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Detective Control

A

Designed to detect and promptly correct attacks that have occured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Deterrent Control

A

Designed to discourage would-be attacked

30
Q

Mitigation/recovery control

A

Designed to minimise the impact of security incidents

31
Q

Compensating Control

A

Alternative fixes to cover any gaps in other control types

32
Q

Corrective control

A

Seeks to reverse/Remediate a security incident after it occurred

33
Q

Directive control

A

Designed to establish desired outcomes by guiding the execution of security within an organisation

34
Q

Cryptography

A

Is the process of converting plain text into unintelligible Cipher text and reverting it back. This creates data intrigity and confidentiality

35
Q

Block Cipher

A

Symmetric Encryption
Is a Cipher that encrypted data in a fixed-size block (64-bits), it converts plain text into Cipher text one block at a time, often taki g part of the previous block into the new block.
Good for large files and data at rest
AES (Advances Encryption Standard)
- a symmetric key algorithm that encrypts data in 128bits and has key sizes of either 128, 192, 256

36
Q

Stream Cipher

A

Symmetric Encryption
Data encryption used for a continuous streams of data. It uses a pseudo randomly generated stream of bits that is used in an XOR function with the data stream to encode the data one bit at a time. The data is decrypt with the key and the pseudo randomly generated bits
Used for real time communication

37
Q

Symmetric Encryption

A

Uses the same key to Encrypt and decrypt data
Key management is very important so not to compromise the data

38
Q

Asymmetric Encryption

A

A form of encryption that uses a public and a private key to encrypt/decrypt data and confirm data integrity
Public key
- is a key of a devices that is known to other devices on a network which those devices will uses to encrypted data intended for the original devices
Private key
- is a key of a devices that is only know to itself. It is used to decrypt data that has been encrypted with it’s public key

39
Q

RSA Cipher

A

The internet standard for asymmetric Encryption that is based on the practical difficulty of factoring the product of two large prime number

40
Q

Diffie-Hellman cipher

A

Is a protocol used for exchange asymmetric keys

41
Q

Elliptic Curve Cryptography (ECC)

A

A Cipher based on algebraic structure of elliptic curves over finite fields.
Strong encryption will being very efficient

42
Q

Hashing

A

Is a type of encryption that uses a mathematical formula to created a fixed-length string of characters, the hashed result cannot be decrypted but is used to insure that the original data has not been tampered with

43
Q

Salting

A

Is a method of adding complexity to a hashing function by adding random bits to the beginning or end of the data. Allowing 2 or more data that are the same to have a different hash output.
Both hash data and salt must be stored together

44
Q

Digital certificates

A

Is a public key stored in a document which includes metadata about the key.
Certificate are issued by a Certification Authority accompanied by a related private key
-Public keys are stored on .cer or .der file formats
- Private keys are stored on .pfx or .pvk file format

45
Q

Certificate Authority

A

Is a service that issues certificates

46
Q

Certificate revocation (CRL)

A

A list of certificates that were administratively revoked before they expired

47
Q

Online Certificate Status Protocol (OCSP)

A

Used to balance the load for validating certificates by quickly responding to CRL requests

48
Q

Root of trust

A

Highly reliable hardware, software and firmware used to generate and protect root and CA keys

49
Q

Self-signed certificate

A

Is a certificate that is created locally, rather than by a CA, which is ment for internal uses.

50
Q

Certificate signing request (CSR)

A

A messages sent to a CA requesting a digital certificate
- request files are stored as .csr

51
Q

Wildcard certificate

A

A certificate that includes any possible subdomain or host names under a parent domain.
Represented by *

52
Q

Digital signature

A

Is a security property that uses asymmetrical cryptography to sign digital forms (document, network packets, certificates, ect) which can be used to verify the authenticity and identify of the users signing, by using the users private key and hash

53
Q

Public key Infrastructure (PKI)

A

Is an arrangement that binds public keys with the respective entities which uses policies and procedures to create, manage, distribute, store and revoke digital certificate and manage public key encryption

54
Q

PKI components

A

Certificate Authority (CA)
- a service that registers and issues certificates
Registration Authority
- a service responsible for accepting digital certificate request and authenticating the entity making the request
Validation Authority
- validates the identity of the entity with the certificate

55
Q

Key Escrow

A

A component of PKI that is used to store the private key by a third party which helps protect against unauthorized access or compromise

57
Q

Key Stretching

A

The practice of taking a weak key (password) and transforming it into something that is computationally harder to crack

58
Q

Perfect forward Secrecy

A

Refers to an encryption system that changes the keys used to encrypt and decrypt data frequently and automatically, thus preventing an attack to use a compromised key to access the data

59
Q

Pass-the-hash Attack

A

Is a password craking attack that is used to authenticate by supplying the password hash over the network.
- The password hash can be acquired by performing a hash dump

60
Q

Secure Socket Layer (SSL)

A

Is a protocol that establishes a secure connection between a clients and a host to secure confidentiality and integrity of data transmission (HTTPS).
- It uses RSA asymmetry encryption to create a temporary secure session (perfect key secrecy) by exchanging public keys

61
Q

Transport Layer Security (TLS)

A

Is the successor of SSL which fixes its vulnerabilities

62
Q

OpenSSL

A

Is an open source implementation of SSL/TLS protocols

63
Q

Secure/Multipurpose Internet Mail Extension (S/MIME)

A

A protocol used for sending digitally signed encrypted email messages

64
Q

Pretty Good Privacy (PGP)

A

A system for creating asymmetric key pairs and trading public keys,
Provides authentication and cryptographic privacy

66
Q

Blockchain

A

A mechanism used to store and secure digital data as an open ledger, each new entry becomes a block with a unique identifying hash.
- Old blocks needs the approval of all parties to be able to change the data stored in the block

67
Q

Accessing data from a blockchain

A

It’s too impractical to try to access data directly from the blockchain, so to get around that a local database is created that stores all previous blocks and is updated when new blocks are created. The local database can then be used to access data from the blockchain

68
Q

Steganography

A

A method of concealing secret data within a data form that is non-secret (image, text video)

69
Q

Data masking

A

A method of disguising data by replacing the data with a fake but realistic version, with the goal of creating a version that cannot be deciphered or reverse engineered

70
Q

Tokenization

A

The process of substituting sensitive data with a non-sensitive equivalent which acts as a pointer to the sensitive data