General Knowledge Flashcards
What is BIOS?
Basic Input Output System
- It is firmware, comes on a chip - normally a Electrically Erasable Programmable Read-Only Memory (EEPROM).
- Multiple BIOS (Motherboard, Hard Drive Controllers, Video Cards, Network cards etc.).
- First program that gets executed
- Performs a set of functions (self-test, measurements to ensure correct configurations, authenticate hardware), load the OS, before handling control over to the hypervisor or OS.
What are BIOS Security Features? Per NIS SP 800-147b.
- Authenticated updates - digital signatures prevent the execution of non-authentic BIOS images
- Secure local update - requires an admin to be physically present to install BIOS image without signature verification
- Firmware integrity protection - prevents unintended or malicious updates outside of authenticated BIOS update process
- Non-bypassability - no mechanism to allow main processor to bypass BIOS protections.
What is a TPM?
Trusted Platform Module or cryptographic co-processor
- Supports cryptographic functions
- Enables trust in computing systems
- Has a processor, persistent memory and volatile memory
- Used as roots of trust.
- Provides tamper resistance
- TPMs are HW-based.
SW-based TPMs are also available, though not as secure.
What are storage controllers and what do they do?
Storage controllers are hardware used to control storage devices.
They provide:
- Access Control
- assembly of data
- provide users/apps an interface to the storage device
Examples include iSCSI and FCoE (Fiber Channel over Ethernet).
What is KVM switch?
Keyboard Video Mouse Switch
Allows a single set of human interface peripherals to connect to multiple computers
Saves space.
Users can switch between multiple computers.
What is VXLAN?
- Virtual Extensible LAN
- Used in cloud environments
- VLAN is a Layer 2 concept that uses tags.
- VXLAN - extends this to Layer 3 allows VLANs to exist across data centers
What are the steps in DHCP exchange between server and client?
The mnemonic is DORA
Discover - client to server on UDP Port 67
Offer - DHCP responds with IP address on Port 68
Request - Client confirms it will use the IP address
Acknowledge - Server acks its.
DHCP v6 uses IPSec.
What are write-blockers?
- Write-blockers are used in digital forensics to preserve evidence - essentially, they block writes
- They are used to read from a disk for evidence analysis without writing to it thereby preserving the evidence.
- They can be SW-based -e.g. installed on a forensics computer
- Or HW-based - e.g. blockers on a chip/portable device through which the disk is connected to a computer. It traps and prevents writes.
Per CSA - what are the two key techniques that underpin cloud computing?
- Abstraction and Orchestration
- Abstraction - resources are abstracted from the underlying physical hardware/what virtualization does.
- Orchestration - coordinate carving out and delivering a set of resources from a pool to the consumer.
Per CSA - what’s the difference between traditional virtualization and cloud computing?
Traditional virtualization abstracts the resources, but does not orchestrate to pool resources together. This often requires manual processes.
What is utility computing?
Utility computing is the idea that computing resources can be consumed like water or electricity and paying only for what you use (metering).
What capabilities to PaaS offer?
- Databases, Messaging, Queuing, application development frameworks are some of the capabilities that PaaS have.
- In a PaaS, users only sees the platform - e.g. DBs may expand/contract automatically without the user having to manage the underlying servers.
Noteworthy
- Organizations can outsource cloud, but not the responsibility for governance.
- Moving to the cloud doesn’t change your risk tolerance. It just changes how risk is managed.
What information does PCI-DSS prevent you from storing?
CVV - Card Verification Value
CVV can be used in a transaction but cannot be stored.
What are merchant levels in PCI-DSS?
Merchants are classified into levels 1 through 4 based on the number of transactions annually.
Level 1 is the highest (unlike FIPS and CC/EAL) . These levels determine risk and ascertain the appropriate level of security for their businesses
Level 1 - over 6 million transactions annually
Level 4 - Less than 20,000 annually.
How must cardholder data be protected in PCI-DSS?
Using either Tokenization or Encryption.
What is XSS and how do you protect against it?
XSS = Cross Site Scripting
- Attacker inserts code into a Web App through HTML using the Java Code tag.
- Code eventually gets downloaded when a victim accesses the Web App and his/her browser executes the code in the background without victim’s awareness.
- WAF is one method of protecting web app against an XSS attack.
- Use of modern browsers which isolate un-trusted HTML code segments and won’t run them.
OWASP 2021 - Top 10 List
A01 - Broken Access Control
A02- Cryptographic Failures (weak crypto keys, unprotected passwords/secrets)
A03 - Injection (SQL, XSS)
A04-Insecure design