Important Terms/Topics Flashcards

1
Q

Data Subjects

A

Data Subjects are individuals whose personal data is being processed. This can include customers, employees and partners. Data Subjects often have rights regarding their data, such as the right to access, correct, or request the deletion of their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Controllers

A

Data Controllers are the entities who determine the reasons for processing personal information and direct the methods of processing that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Custodians

A

Data Custodians are individuals or teams who do not have controller or stewardship responsibility of data but are responsible for the secure safekeeping of information.

For example, a data controller might delegate responsibility for securing PII to an information security team. In that case, the information security team serves as a data custodian.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Processors

A

Data Processors are service providers that process personal information on behalf of a data controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Root of Trust (Boot)

A

A Root of Trust based secure boot process validates each signed component as it starts and ensures that the trusted components are all loaded as part of the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fuzzing

A

Fuzzing is a technique whereby the tester intentionally enters incorrect values into input fields to see how the application will handle it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

COPE (corporate-owned, personally enabled)

A

COPE provides devices to users that they can then use for personal use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Steward

A

Data Stewards are individuals who carry out the intent of the data controller and are delegated responsibility from the controller. This means they carry out data usage and security policies and ensure that data is handled appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between standards and policies?

A

Policies are a statement of organizational intent. Standards are defined to help organizations achieve that intent through the use of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key Escrow

A

Key Escrow refers to a process where encryption keys are retained by the organization in case the files on the drive need to be accessed by someone with proper authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

KMS

A

Key Management Systems allow you to safely store and manage secrets like keys and certificates. Centralizing a KMS allows organizations to effectively manage their secrets, including tracking their life cycle and rotation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fault Tolerance & High Availability

A

High availability designs are less expensive because they attempt to minimize service interruptions, whereas fault-tolerant designs seek to avoid service interruptions almost entirely, and thus cost significantly more.

Fault tolerance is more preventative than high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SASE

A

SASE stands for Secure Access Service Edge. It’s a network architecture that combines network security functions with wide-area networking capabilities to support the dynamic, secure access needs of organizations, particularly those with distributed workforces and cloud-based applications. Essentially, SASE aims to provide comprehensive security and networking services from a single cloud-based platform, optimizing performance and simplifying management for businesses.

SD-WAN is the core of a SASE implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPC Endpoint

A

A Virtual Private Cloud endpoint is a way to directly connect to services inside of a cloud provider without an Internet gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Groups (Cloud)

A

Security groups are a virtual firewall for instances, allowing rules to be applied to traffic between instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OAuth

A

OAuth allows an end user’s account information to be used by third-party services, without exposing the user’s password.

17
Q

What are the steps to the Incident Response Process?

A
  1. Preparation
  2. Detection
  3. Containment
  4. Eradication
  5. Recovery
  6. Lessons Learned
18
Q

MITRE ATT&CK Framework

A

The MITRE ATT&CK Framework is a free, globally accessible knowledge base that describes the latest tactics and behaviors of cyber adversaries. It’s designed to help organizations identify security gaps, assess risk, and prioritize mitigations.

19
Q

Cuckoo

A

Cuckoo is a sandbox for malware analysis that will safely run malware and then analyze and report on its behavior.

20
Q

Exposure Factor

A

Exposure Factor is the percentage of value of an asset that would be lost due to an incident.

21
Q

Integrated Penetration Testing

A

Integrated Penetration Testing combines both offensive and defensive penetration testing and is often woven into an organization’s practices on an ongoing basis.

22
Q

Attestation

A

Auditors provide a statement about an organization’s posture as part of an Attestation process. This provides assurance that the auditors have reviewed the organization’s practices and have found them suitable or that deficiencies have been identified.

23
Q

What is the biggest downside of using Journaling as part of a backup restoration project?

A

Journaling replays transactions, which can take an extended period of time if the time between the last backup and the data loss event was longer and there was a high volume of transactions. So, restoring from Journals can take a very long time.

Journaling can be encrypted and is often used for live databases.

24
Q

What is typically not a consideration that one can control or change for embedded devices?

A

Compute power.

Compute is rarely a significant concern for embedded systems. They’re designed to function for long periods of time performing a specific function and do not have additional software or functions added.

25
Q

What type of information are tools like PRTG and Cacti used to analyze?

A

PRTG and Cacti are both network monitoring tools that can provide bandwidth monitoring information.

26
Q

Timelining

A

Building a timeline during forensic analysis, particularly from multiple systems, relies on accurately set system clocks or adding a manually configured offset.

27
Q

Which of the following options is not capable of gathering information about what systems a host is connecting to, how much traffic is being sent, and similar details?

IPFIX
NetFlow
NXLog
sFlow

A

NXLog is a log collection and centralization tool. The other three options are all for collecting network flow data.

28
Q

Bluesnarfing

A

Bluesnarfing involves accessing data from a Bluetooth device when it is in range.

29
Q

What two files are commonly attacked using offline brute-force attacks?

A
  1. The Windows SAM
  2. The ‘/etc/shadow/’ file on Linux
30
Q

Internet Relay Chat (IRC)

A

IRC is designed for group communication in discussion forums, called channels, but also allows one-on-one communication via private messages as well as chat and data transfer, including file sharing. IRC commonly runs on TCP 6667.

IRC is often used for command-and-control channels in botnets.

31
Q

What are the three common situations associated with race conditions?

A
  1. Time-of-check (TOC)
  2. Time-of-use (TOU)
  3. Target-of-evaluation