Key Concepts Flashcards
If unencrypted files were intercepted, which arm of the CIA triad would be breached or violated?
Confidentiality, because the files weren’t
Encrypted.
If the CIA triad is too restrictive to describe an entire situation, what model should you use?
Pakerian hexad
What is symmetric cryptography?
(AKA: Symmetric key cryptography)
Uses a single key to both encrypt the plaintext and decrypt the ciphertext.
They key must be shared between the sender and receiver and anyone with the key can decipher the text.
Name a chief weakness of symmetrical cryptography.
The key must be shared between sender and recipient. If an attacker gets the key, they can potentially compromise confidentiality and integrity.
What is a block cypher?
Takes a predetermined number of bits (or binary digits which are either a 1 or a 0), known as a block, and encrypts that block. Blocks typically have 64 bits but can be higher or lower.
What is a stream cipher?
Encrypts each bit in the plaintext message one bit at a time.
What two types of ciphers does symmetric cryptography make use of?
Block and stream ciphers
What type of cipher is most frequently used in symmetrical cryptography?
Block ciphers.
What kind of encryption is DES?
Symmetric
What kind of encryption is 3DES?
Symmetric
What kind of encryption is AES?
Symmetric
What is DES
Block cipher using a 56 bit key.
What is AES
Symmetrical cipher using 3 different ciphers: one with a 128 bit key, one with a 192 bit key, and one with a 256 bit key. All of which encrypt blocks of 128 bits.
What kind of encryption is Twofish?
Symmetric block cipher
What kind of encryption is Serpent?
Symmetric block cipher
What kind of encryption is Blowfish?
Symmetric block cipher
What kind of encryption is Cast5?
Symmetric block cipher
What kind of encryption is RC6?
Symmetric block cipher
What kind of encryption is IDEA
Symmetric block cipher
What kind of encryption is RC4
Symmetric stream cipher
What kind of encryption is ORYX?
Symmetric stream cipher
What kind of encryption is SEAL?
Symmetric stream cipher
What is asymmetric key cryptography?
Uses two keys: a public key and a private key.
You use the public key to encrypt the data and the private key to decrypt the data. Anyone can access the public key, only the host can access the private key.
What is the main advantage asymmetric cryptography has over symmetric cryptography?
You don’t need to distribute the key.
What kind of encryption is RSA?
Asymmetric
What kind of encryption is used in Secure Sockets Layer (SSL) protocol?
RSA asymmetric key algorhithm.
SSL
Secure sockets layer protocol
ECC
Elliptic curve cryptography
What is elliptic curve cryptography ECC?
A class of cryptographic algorithms. Can use short keys while maintaining a higher cryptographic strength than many other types of algorithms.
What kind of encryption does SHA-2 use
Elliptic curve cryptography (ECC) (Asymmetric)
SHA-2
Secure hash algorhithm 2
ECDSA
Elliptic curve digital signature algorhithm.
What kind of encryption is ElGamal?
Asymmetric algorithm
What kind of encryption is Diffie-Hellman?
Asymmetric algorithm
What kind of encryption is Digital signature standard (DSS)
Asymmetric algorithm
DSS
Digital signature standard
What kind of encryption does Pretty good privacy (PGP) use?
Asymmetric cryptography
What kind of encryption does Transport Layer Security TLS use?
Asymmetric cryptography
TLS
Transport Layer Security
ITAR
International traffic in arms regulations
What are the 3 types of modern cryptography?
Symmetrical
Asymmetrical
Hash
MD5
Message-direct 5
What kind of encryption is MD5
Hash
What kind of encryption is Sha-3
Hash
What is a digital signature?
Allows you to sign a message so that others can detect any changes to the message after you’ve sent it, ensure that the message was legitimately sent by the expected party, and prevent the sender from denying that they sent the message.
How would you digitally sign a message?
Sender generates a hash of the message then uses their private key to encrypt the hash. The sender then sends this digital signature along with the message, usually by appending it to the message itself.
When the message arrives at the receiving end, the receiver uses the public key corresponding to the senders private key to decrypt the digital signature thus restoring the original hash of the message. Receiver can then verify the message’s integrity by hashing the message again and comparing the two hashes.
What is a digital certificate?
Created by taking the public key and identifying information such as name and address and having them signed by a trusted entity that handles digital certificates called a certificate authority.
Name a well known certificate authority.
VeriSign
PKI
Public key infrastructure
Name 3 free or open source encryption products
VeraCrypt
BitLocker
dm-crypt (Linux only)
What are the two types of compliance?
Regulatory and industry compliance
What is regulatory compliance?
Adherence to the laws specific to the industry in which you’re operating.
What is industry compliance?
Adherence to the regulations that aren’t mandated by law but that can nonetheless have severe impacts on your ability to conduct business.
PCI DSS
Payment card industry data security standard
What are physical controls?
Mitigate risks to physical security.
What 3 kinds of controls will you use to achieve compliance with standards and regulatory requirements?
Physical
Administrative
Technical
What are administrative controls?
Mitigate risks by implementing certain processes and procedures.
What are technical controls?
Manage risk by using tehnical measures such as firewalls, access control lists ACL’s, Intrusion detection systems IDS, etc.
What are Key controls?
The primary controls used to manage risk in your environment
What are the 3 characteristics of key controls?
- They provide a reasonable degree of assurance that the risk will be mitigated
- If the control fails, it is unlikely that another control could take over for it.
- The failure of this control will affect an entire process.
What are compensating controls?
Controls that replace impractical or unfeasible key controls.
What are the 4 steps to maintaining compliance? (In reference to regulations and controls)
- Monitor
- Review
- Document
- Report
FISMA
Federal information security management act
FedRAMP
Federal risk and authorization management program
What is the federal information security management act (FISMA)?
Applies to all US federal government agencies, all state agencies that administer federal programs, and all private companies that support, sell to, or receive grant money from the federal government.
Requires that an organization implement information security controls that use a risk-based approach—one that handles security by enumerating and compensating for specific risks.
ATO
Authority to operate
What is FedRAMP federal risk and authorization management program?
Defines rules for government agencies contracting with cloud providers.
FedRAMP certification consists of a single Authority to Operate ATO that allows an organization to do business with any number of federal agencies.
What is the Sarbanes—Oxley Act SOX?
Regulates financial data, operations, and assets fro publicly held companies.
Places specific requirements on an organizations electronic record keeping, including integrity of records, retention periods for certain kinds of information, and methods of storing electronic communications.
What is the Gramm-Leach-Blilley Act? GLBA
Protects information such as personally identifiable information PII, and financial data belonging to the customers of financial institutions.
You must secure every pertinent record against unauthorized access, track people’s access to these records, and notify customers when you share their information.
What is the children’s internet protection act CIPA?
Requires schools and libraries to prevent children from accessing obscene or harmful content over the internet.
Requires these institutions to have policies and technical protection measures in pace to block or filter such context.
CIPA
Children’s internet protection act
COPPA
Children’s online privacy protection act
what is children’s online privacy protection act COPPA?
Protects the privacy of minors younger than 13 by restricting organizations from collecting their personally identifiable information PII, requiring the organizations to post a privacy policy online, make reasonable efforts to obtain parental consent, and notify parents that information is being collected.
FERPA
Federal educational rights and privacy act
What is FERPA federal education rights and privacy act?
Protects students records, applies to students at all levels. Defines how institutions must handle student records to protect them and how people can view or share them.
GDPR
General data protection regulation
What is the general data protection regulation GDPR?
Covers data protection and privacy for all individuals in the European Union.
Requires that organizations get consent before collecting people’s data, report data breaches, give individuals the right to access and remove collected data, and set specific guidelines for privacy and privacy programs.
ISO
International organization for standardization
What port does IMAP use?
143
What port does File transfer protocol use?
20 and 21
what port does secure shell SSH use?
22
What port does HTTP use?
Port 80
What ports are known as well known ports?
0-1023
What is the Bell-LaPadula Model?
Combines Discretionary access control DAC and mandatory access control MAC.
No read up, no write down
No read up, no write down
Bell-LaPadula Model
Which aspect of the CIA triad is the Bell LaPadula model most concerned with?
Confidentiality.
In the Bell-LaPadula Model, does MAC or DAC take priority?
MAC takes priority, DAC works within MAC controls.
Mandatory access control and discretionary access control
What is the Biba Model?
No write up, no read down
What aspect of the CIA triad is the Biba model most concerned with?
Integrity, even at the expense of confidentiality.
No write up, no read down
Biba model
What is the brewer and Nash model?
Chinese Wall.
Prevents conflicts of interest.
Level of access changes dynamically based on materials previously accessed.
What is OPSEC?
Operations Security.
Process used to protect your information. Not only security measures in place but also identifying what you need to protect and what you need to protect it against.
What is application security?
Securing your applications
What is a sandbox?
An isolated environment containing a set of resources for a given purpose.
ACL
Access control list
What is access control?
A method of implementing authorization tools to allow/deny access.
ABAC
Attribute-based access control
What is attribute-based access control?
Based on specific attributes of a person, resource, or environment. Subject-attributes belong to individuals.
What is mandatory access control?
Owner of a resource doesn’t determine who gets access. A separate group/individual has authority to set access to resources.
What is discretionary access control?
Owner of the resource determines who gets access to it and exactly what level of access they have.
What is mutual authentication?
Authentication mechanism in which both parties in a transaction authenticate each other.
What is network segmentation?
Dividing network into smaller networks called subnets. Controls the flow of traffic between subnets.
What is a hardware token?
Small device, usually the size and shape of a credit card or keychain fob or usb. Contains a certificate or unique identifier.
What is a fuzzer?
A tool used to help find completely unexpected problems. Works by bombarding apps with all kinds of data and inputs from a variety of sources hoping to get the app to fail or do something unexpected.
Name two kinds of port scanners.
OpenVAS
NMAP
What kind of tool is wireshark?
A sniffer
What is a sniffer?
Also known as a packet sniffer.
Network/protocol analyzer
Intercepts (sniffs) traffic on a network.
What is a firewall?
Mechanism for maintaining control over traffic that flows in/out of networks. Placed where level of trust changes.
RAID
Redundant arrays of inexpensive disks.
What is deep packet inspection?
A type of firewall that can reassemble contents of traffic. Opens everything.
Privacy concerns.
What is a stateful firewall?
Functions on the same level/general principle as packet filtering firewalls.
They keep track of traffic at a granular level. Allows only traffic that is part of a new or existing connection and prevents some intentionally disruptive traffic (attacks)
What is a packet filter?
One of the simplest firewalls. Looks at content of each packet individually and allows or denies based on source IP and destination IP, port, and protocol being used.
What is a packet sniffer?
A network / protocol analyzer.
What kind of an attack is SQL injection?
Server side attack
What kind of attack is cross-site scripting?
Client-side attack
What kind of attack is cross-site request forgery?
Client side attack
What kind of an attack is clickjacking?
Client-side attack
What is SQL injection?
Privilege escalation. Input containing SQL commands is submitted to the app. Ex: “or 1=1” input for username. May cause system to automatically record you entered a valid username
What is cross-site scripting?
Attack carried out by placing code written in scripting language into a web page or other media like adobe flash displayed by client browser. When others view this media, it automatically executes the hidden code completing the attack.
What is cross-site request forgery?
Confused deputy. Misuses the browsers authority.
If attacker knows of or can guess a website that’s already authenticated a user, such as amazon, can embed a link in web page or HRML based email generally an image hosted by a site the attacker controls, when browser attempts to retrieve link, executes additional commands
3 types of magnetic media
Hard drives
Tapes
Floppy disks
What physical conditions can harm magnetic media?
Strong magnetic fields.
Jolting magnetic media while it’s in motion can render the media unusable.
Name two types of optical media
CDs DVDs
What physical conditions threaten optical media?
Scratches, temperature sensitive.
Very sensitive and easy to destroy in general.
What is a signature based IDS?
Works like most antivirus systems. Maintain a database of signatures that might signal an attack and compare incoming traffic to these signatures.
What is an anomaly based IDS?
Works by determining the normal kinds of traffic and activity taking place on the network. They then measure present traffic against this baseline in order to detect patterns that aren’t present in the traffic normally.
Can detect new attacks or attacks that have been deliberately designed to avoid IDS detection.
What is Kali?
A penetration testing tool for LINUX specifically.
What is Kismet?
One of the best-known tools for detecting rogue access points and devices.
Commonly used by penetration testers to detect wireless access points and can find them even when they’re well hidden.
Name two tools that can help break through different kinds of encryption in use on wireless networks.
Two more common ones for cracking WEP, WPA, and WPA2 include
CoWPAtty and Aircrack-NG.
What is Tcpdump?
A classic sniffer.
Command line tool.
Runs only on UNIX-like OS.
What is WinDump?
A windows equivalent of Tcpdump.
A packet sniffer.
What is OptiView Portable Network Analyzer from Fluke Networks?
A hardware packet sniffer.
What is Scapy?
Can map the topology of firewalls and help locate vulnerabilities in them.
Can construct specially crafted Internet control message protocol ICMP packets that evade some of the normal measures put in place to prevent you from seeing the devices that are behind a firewall and may allow you to enumerate some of them.
Can manipulate network traffic and test how firewalls and IDS respond.
What port does hypertext transfer protocol secure HTTPS use?
443
What is Rapid7’s Metasploit
An exploit framework / tool.
What is Immunity CANVAS?
An exploit framework / tool
What is Core Impact?
An exploit framework / tool.