InfoSec Flashcards
What is a security plan?
A plan that identifies and organizes the security activities for a system/organization
What is risk analysis?
A systematic investigation of the system, its environment, and what might go wrong
What is a security policy?
A security policy is a document that defines how an organization deals with some aspect of security.
What is a plan maintenance?
A plan that specify the order which controls are to be implemented.
What is a business continuity plan?
A (business) continuity plan documents how a business will continue to function during or after a computer security incident
What is a Incident response?
Tells the staff how to deal with a security incident
What is ISO/IEC 27005 about?
Information Security Risk Management (ISRM)
What is ISO 31000 about?
(general) Risk Management (RM) (principles and guidelines)
What is risk management?
Coordinated activities to direct and control an organization with regard to risk
What is risk assessment?
Overall process of risk identification, risk analysis and risk evaluation
What is risk identification?
process of finding, recognizing and describing risks
What is risk evaluation?
process of comparing the results of risk analysis with risk criteria to determine whether the risk and/or its magnitude is acceptable or tolerable
What does “Level of risk” mean?
magnitude of a risk expressed in terms of the combination of consequences and their likelihood
What does “residual risk” mean?
risk remaining after risk treatment
What does vulnerability mean?
Weakness of an asses or control that can be exploited by one or more threats
What does threat mean?
potential cause of an unwanted incident, which may result in harm to a system or organization
What is ISO?
the process to comprehend the nature of risk and to determine the level of risk
What is Risk analysis?
Organized process for identifying the most significant risks in a computing environment, determining the impact of those risks, and weighing the desirability of applying various controls against those risks
What is management systems?
A management system is a “set of interrelated or interacting elements of an organization to establish policies and objectives and processes to achieve those objectives” (ISO/IEC 27000:2014)
What is cyber terrorism?
The use of computers to launch a terrorist attack
What is an Economic attack?
An attack that causes economic damage.
What is cryptanalysis?
the study of methods for breaking ciphertext
What is cryptography?
the use and practice of cryptographic techniques
What is cryptology?
the study of both cryptography and cryptanalysis
What is plaintext/cleartext, P?
The original form a message
What is ciphertext/cyphertext, C?
encrypted version of a message
What is a Cipher?
a pair of cryptographic algorithms, e.g., a mathematical function used for encryption and one for decryption
What is the cryptosystem in formal notation?
P = D(E(P))
What is an encryption algorithm?
A set of rules of how to encrypt plaintext and how to decrypt the ciphertext
What is a symmetric cryptosystem?
- Encryption and decryption keys are the same
- Provide a two-way channel to their users
- If the key is kept secret for a pair - the system also provides authentication proof
- If the secret key is compromised, the adversary can decrypt all traffic and produce fake messages
What is an Asymmetric cryptosytem?
*One key for encryption and another key for decryption
* Keys come in pairs
* A decryption key, KD, inverts the encryption of key KE so that:
* P = D(KD, E(KE,P))
* Also called public key
What is a Stream cipher?
- Each bit/byte of the data stream is encrypted separately (low diffusion)
- Fast and encryption can take place as soon as data is read
- If errors occur, only bit/byte is affected
- Susceptible to malicious insertions and modifications
What is a block cipher?
- Encrypts a group of plaintext symbols as a single block (typically 64, 128, 256 bits or
more) (high diffusion) - Slower process, the last block needs to be padded, and an error affects more bytes
- Impossible to insert a single symbol into one block
What is The Data Encryption Standard (DES)?
- Symmetric block cipher
- Encryption and decryption algorithms are public but the design principles are classified
- Used fixed 56 bits (short) key
- Is considered insecure and was deprecated in 2017
What is The Advanced Encryption Standard (AES)?
- A replacement for DES
- Symmetric, block cipher (128) bits
- Three different key lengths: 128, 192, and 256 bits
What is the de-facto encryption standard today?
AES
- Used in e.g., WPA2, IPsec, WhatsApp, Telegram… and in hardware such as Intel & AMD processors
What is Rivest-Shamir-Adelman (RSA)?
- Asymmetric block cipher
- Public key system (i.e., one private and one public key)
- Long keys (1024-4096 bits)
- Slow algorithm
What is the Diffie-Hellman key exchange protocol?
A way in which a public channel can be used to create a confidential shared key
How does the Diffie-Hellman key exchange work?
- First agree on an arbitrary staring key
- Then pick a private key
- Mix the (public) starting key with the secret key
- Exchange the keys with each other
- Mix the other shared key with their own secret key
What is error detecting codes?
A fast and reliable way of finding out if an error in a transmission have happened
Name some simple error detecting codes?
- Parity checks
- Cyclic redundancy checks
Name some cryptographic error detecting codes?
- One-way hash functions
- Cryptographic checksums
- Digital signatures
What’s in Shannon’s characteristics of good ciphers?
- The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption
- The set of keys and the enciphering algorithm should be free from complexity
- The implementation of the process should be as simple as possible
- Errors in ciphering should not propagate and cause corruption of further information in the message
- The size of the enciphered text should be no larger than the text of the original message
What is Interception?
Unauthorized viewing
CIA: Confidentiality
Network security examples: Eavesdropping or wiretapping
What is Modification?
Unauthorized change
CIA: Integrity
Network security examples: Integrity failures - insertion
What is Fabrication?
Unauthorized creation
CIA: Integrity
Network security examples: Integrity failures - replay
What is Interruption?
Preventing authorized access
CIA: Availability
Network security examples: DoS/DDoS
What vulnerabilities is there to Wi-Fi?
- It’s prone to eavesdropping
- Shared media = easy insertion and easy disruption (DoS)
What is the standard Wireless protocol?
WPA2/802.11i
What does CYOD mean?
The company lists acceptable devices (that is, those that meet company security requirements) and allows each employee to choose his or her own device.
What is COPE?
The company owns and provides the equipment. This clearly offers the most security, but also comes at the highest cost.
What is segmentation?
Dividing a network into smaller segments.
What is important for network security countermeasures?
- System architecture
- Segmentation
- DMZ
- Redundancy
- Encryption
What is a Virtual Private Network (VPN)?
I provides a way to the Internet. It creates a virtual connection between a remote user and the central location.
What two approaches are it to VPN?
- Remote access - one fixed side (What you get if you buy a VPN Service)
- Site-to-site - two fixed sites
What is a firewall?
A device that filters all traffic between a protected or “inside” network and less trustworthy or “outside” network
Firewalls implement security policies or rule-sets that determine what traffic can or cannot pass through
What is a firewall an example of?
A reference monitor
* Always invoked (cannot be circumvented)
* Tamperproof
* Small and simple enough for rigorous analysis
What is a demilitarized zone?
- A perimeter network or screened subnet
- Physical or logical subnetwork
- DMZ is a form of network architecture
- Services dedicated to outside use separated
- The idea is that intrusion of DMZ hosts lead
to only limited damage to the internal hosts
What is a Intrusion Detection System (IDS)?
It monitors activity malicious or suspicious events
What is an IDS detection methods?
- Signature-based
- Heuristic
What is the Capability of IDS?
- Passive –sound the alarm
- Active, that’s when it become IPS
How does a IPS respond to an alarm?
- Monitor and collect data
- Protect
- Signal an alert to other protection components
What is capacity planning?
- Know what cause spikes in traffic and plan for them
What is network tuning?
- Adjusting the number of segments, machines, uplinks…
- Rate limiting - countermeasure that reduces the impact of an attack by limiting capacity to a host/network
What is shunning?
Reducing service given to traffic from certain address ranges
What is blacklisting?
Blocking all traffic to/from a specific host
What is sinkholing?
Incoming traffic is analyzed, and bad traffic rejected
What is a honeypot?
A virtual machine meant to lure an attacker into an environment that can be both controlled and monitored
What is a kernel?
- A kernel is the part of the OS that performs the lowest-level functions
What is a security kernel?
- A security kernel is responsible for enforcing the security mechanisms of the entire OS
- Typically contained within the kernel
What is kernel-mode?
Kernel-mode - executing code has complete and unrestricted access to the underlying hardware and memory
What is User-mode?
User-mode - executing code has no direct access to hardware or reference memory
What is a reference monitor?
- A reference monitor mediates access by subjects to objects (e.g., to let a user read a file)
What is Discretionary access control (DAC)?
Access control model based on the identity of the user
* The owner decides who is allowed to access the object
and what privileges they have
* Rights can be delegated at users’ discretion
* Most common model
What is Role-based access control (RBAC)?
- Controls based on a subject’s (user’s or program’s) role, not their identity
- Subject’s rights can change depending on their current role
- access is controlled at the system level, outside of the user’s control
- Used in, e.g., Microsoft Azure
What does reconnaissance mean?
The hacker research their target
What does reconnaissance (passive) mean?
- Before an attack is executed the hacker attempt to find out information about the target system
What does Reconnaissance (Active) mean?
Port scanning (Nmap) Scans to see which ports are open
- Ping scan
- Connect scan
- SYN scan
- FIN scan
What is a Ping scan?
A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers).
What is a SYN scan?
- Stealthy scan
- Also called half-open scan
You send a SYN packet but you never respond to the SYN/ACK
What is an SQL attack?
You enter SQL commands into login forms to trick the server into executing those commands.
What is Bluesnarfing?
Unauthorized access of information from a Bluetooth device
What is Blue jacking?
Using another blue tooth device within range and sending messages to the target
What is Bluebugging?
Accesses and uses all phone features
What is Pod slurping?
Using a device such as an iPod to steal confidential data by directly plugging it into a computer where the data are held
What is Malware?
Software planted by an agent with malicious intent to cause unanticipated or undesired effects
What is a Virus?
A program that can replicate itself and pass on malicious code to other non-malicious programs by modifying them
What is a Worm?
A program that spreads copies of itself through a network
What is a Trojan Horse?
A application/software that looks legit but contains code that, in addition to its stated effect, has a second, nonobvious, malicious effect
What is a Rabbit?
Code that replicates itself without limit to exhaust resources
What is a Logic Bomb?
Code that triggers when a predetermined condition occurs
What is a Time Bomb?
Code that triggers action when a predetermined time occurs
What is a Dropper?
Transfer agent code only to drop other malicious code, such as virus or Trojan horse
What is Hostile mobile code agent?
Code communicated semi-autonomously by programs transmitted through the web
What is a cross-site script attack?
- Tricking a client or server into executing scripted code by including the code in data inputs
What is a RAT (remote access Trojan)?
Trojan horse that, once planted, gives access from remote location
What is Spyware?
Program that intercepts and covertly communicates data on the user or user’s activity
What is a bot?
Semi-autonomous agent, under control of a (usually remote) controller or “herder”; not necessarily malicious
What is a Zombie?
Code or entire computer under control of a (usually remote) program
What is a Browser hijacker?
Code that changes browser settings, disallows access to certain sites, or redirects browser to other
What is a Rootkit?
A collection of tools that a hacker uses to mask their intrusion and obtain admin-level access to a computer or network.
What is trapdoor or backdoor?
Code feature that allows unauthorized access to a machine or program; bypasses normal access control and authentication
What is a tool or toolkit?
Program containing a set of tests for vulnerabilities; not dangerous itself, but each successful test identifies a vulnerable host that can be attacked
What is Scareware?
Not code; false warning of malicious code attack
How does virus scanners work?
Virus scanners look for signs of malicious code infection using signatures in program files and memory
What is a Denial-of-Service Attacks?
A way to prevent legitimate access to a system, by flooding the system with so many false connection requests that the system cannot respond to legitimate requests
What is DHCP Starvation?
If enough requests flood a network, the attacker could completely exhaust the address space allocated by the DHCP servers for an indefinite period of time
What are some DoS weaknesses?
- The flood must be sustained.
- When machines are disinfected, the attack stops.
- Hacker’s own machine are at risk of discovery
How does a SYN Attack/Flood work?
- The client sends a SYN.
- Server responds with SYN+ACK
The client should now respond with an ACK, but through non –responsiveness and continues sending of a SYN from other clients the server ends up in a busy state.
What is Low Orbit Ion Cannon? (LOIC)
- A common tool for DoS attacks
- Requires the user to put in the target URL or IP address and then begin the attack
What is XOIC?
- XOIC is another DoS attacking tool.
- Performs a DoS attack on any server with an IP address, a user-selected port, and a user-selected protocol.
What is Ping of Death?
- A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer.
What is a Man-in-the-Browser?
- Malicious code in browser/add-ons
What is a Keystroke logger?
- Hardware or software that records all keystrokes
What is Page-in-the-Middle
- The user is directed to a different page than believed or intended
What is a download substitution?
- The attacker creates a page with seemingly harmless and desirable programs for download
- Instead of, or in addition to, the intended functionality, the user installs malware
What is clickjacking?
- A way of tricking user into providing desired input, like personal information
What is Drive-by download?
Code is downloaded, installed, and executed on a computer without the user’s knowledge.
What is SQL injection?
Injecting SQL code into an exchange between an application and its database server
What is Phishing?
A message that tries to trick a victim into providing private information or taking some other unsafe action
What is Spear phishing?
A more personalized attack to a particular recipient or set of recipients
What is Whaling?
Attacks directed at high-profile targets such as CEO:s…
What is Rate limiting?
countermeasure that reduces the impact of an attack by limiting capacity to a host/network