LP - Computing Resources security techniques Flashcards
What are the baseline processes?
Project mandate
Project definition (Baseline 1)
Business requirements documents
System requirements specificaations
Revised project plan (baseline 2)
COPE stands for
Corporate-owned, personally-enabled
CYOD stands for
choose your own device
EMM stands for
enterprise mobility management
The three core competencies for EMM are
- visibility
- Secure access
- Data protection
UBA stands for
User behaviour analytics
WPA2 uses what for security
CCMP
WPA2 can use pre-shared key (PSK) and
enterprise authentication
MFP stands for
Management frame protection
WPA3 require the use of PMF which is what?
Protected management frames
WPA3 has the following cryptographic mechanisms
GCMP-256
384-bit HMAC
HMAC-SHA384
ECDH
ECDSA
BIP-MAC 256
Functionality Testing flowchart
Design Qualification (DQ)
Installation Qualification (IQ)
Operaterational Qualification (OQ)
Performance Qualification (PQ)
Methods for securing cookies
- SSL the cookies can only be sent over a secure SSL
- HttpOnly flag will tell the browser that this cookie can only be accessed by the server
- use_only_cookies parameter will tell your website to use only cookies to store session data
SAST stands for
Static Application Security Testing - the code is not executed
SAST can be used to find
SQL injections, cross-site scripting errors, buffer overflows, unhandled error conditions and probable back doors into the application
DAST stands for
dynamic application security testing
DAST is a
black-box test where the tool must find distinct execution paths in the appliction being analyzed
DAST is used against application in their
running state
DAST is effective when testing exposed
HTTP and HTML interfaces of web applications
Assessment management will use accounting methods like
RADUIS, DIAMETER or LDAPS
Assesst Management: Monitoring/Tracking May use the following
SIEM or SOAR
What is PMF?
PMF is a security feature defined in the IEEE 802.11w standard that protects management frames in Wi-Fi networks from being intercepted or forged by attackers. It is particularly important in mitigating deauthentication and disassociation attacks (such as Wi-Fi deauthentication attacks used in network disruptions).