Implementing Security Flashcards
HIDS/HIPS
Host Based Intrusion Detection/Protection System
MDM
Mobile Device Management
EMM
Enterprise Mobility Management
MAM
Mobile Access Management
UEM
Unified Endpoint Management
Of MDM, EMM, MAM
MicroSD HSM
Micro SD card form Hardware Security Module
secures mobile devices
MSSP
Managed Security Service Provider
NIST
National Institute for Standards and Technology
CSA
Cloud Security Alliance
Prompting best practices in the cloud
CCM
Cloud Controls Matrix
Developed by the CSA to help organisations understand appropriate use of cloud security controls and map then to regularity stds
CASB
Cloud Access Security Broker
Software tools serving as intermediaries between service providers and users
EDR
Endpoint Detection and Response
Tools combining network response and log analysis.
Look for anomalies and IoC (indicator of compromise) using automated rules and detection
IPFIX
IP Flow Information Exchange
Serves as a means for transmitting traffic flow over the network (open net flow standard)
SIPS
Session Initiation Protocol Secure
For communications traffic like voice and video over HTTPS
SRTP
Real-Time Transport Protocol Secure
For voice and video communications
TLS
Transport Layer Security
Protocol used in HTTPS, VoIP, email and instant messaging
DMARC
Domain-based Message Authentication, Reporting & Conformance
For email and web traffic
DKIM
Domain Keys Identified Mail
DNSSEC
DNS Secure Protocol
UDP/TCP 53
Ensuring DNS is not modified or malicious using digital signatures
FTPS
FTP Secure using TLS
TCP 21 in explicit mode
TCP 990 in Implicit mode
SFTP
Secure FTP using SSH
TCP port 22
HTTPS
TCP using TLS port 443
IMAPS
Internet Mail Access Protocol Secure
Using TCP TLS port 993
LDAPS
Lightweight Directory Access Protocol Secure
Using TLS on TCP port 636
Secure POP3
TCP 995 using TLS
SRTP
Secure Real time Transport Protocol
UDP port 5004
Designed to provide audio and video streams via networks.
Uses encryption and authentication
SNMPv3
UDP ports 161,162
Authentication of message sources, integrity, validation and confidentiality via encryption.
Only authPriv level is encrypted
IPSec
Suite of security protocols
AH (Authentication Header) uses hashing and shared secret key to ensure IP payload and headers are secure
ESP (Encapsulated Security Payload) in transport or tunnel mode providing integrity and authentication for the packet
CASB
Cloud Access Security Broker
Enforce created policies:
Visibility,
Cimpliance,
Threat prevention
Data Security
SWG
Secure Web Gateway
Examine API, JSON, storage usage, activities; instance aware
OWASP
Open Web App Security Project
Provides up to date list of most recent web app concerns
TOCTOU
Time of Check to Time if Use
= race condition
Static Code Analysis (SAST)
Automated pre compilation of source code to identify potential vulnerabilities
Dynamic Code Analysis (DAST)
Testing of apps during run time for checking decide of running state
Software Composition Analysis (SCA)
Identifying open source and third party code to manage licenses and vulnerabilities
Fuzz Testing
Sending random malformed Data to check error handling/memory leaks
Continuous Integration (CI)
Frequently merging Code changes into a repository after which automated builds and tests are run
Continuous Deployment (CD)
Automatically deploying Tested and validated code to a production environment
Continuous delivery
Code changes are prepared ready to release in an automated way. A step before CD