Managing Security 3 Flashcards

0
Q

Describe defense in depth

A

A tactic that leverages a layered approach to security used to plan personnel training, policy adoption, physical protection and other comprehensive strategies. An excellent fail safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Describe layered security

A

securing systems and their data that incorporates many different venues of defense and implementing controls to mitigate each type of threat. Provides optimum protection for organization vulnerable to a wide variety of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data security

A

Refers to the security controls and measure taken to keep an organizations data safe and accessible and prevent unauthorized access. Must be applied at every level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe data security vulnerabilities.

A

Can include the increased use of cloud computing, lack of restricted physical access to data storage systems, and lack of user awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List some data storage methods

A

Traditional network servers. Referred to DAS direct attach storage
Network attached storage NAS. multiple hard dives
Storage area networks SAN dedicated networks providing block level storage
Cloud based storage. Service based storage hosted by a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the data encryption methods

A
Full disk encryption 
Database encryption 
File encryption 
Mobile device encryption
Email encryption 
Voice encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain hardware based encryption devices

A
Encryption, decryption, and access control are enforced by a cryptographic module called HSM. hardware security module.  
Does not allow the execution of external programs attempting to reset counters or access their memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Benefits of hardware based encryption

A

Prevents storage mapping from drive to file system
Prevents copying drive contents without the assigned HSM
self governed and not dependent on the OS
provides org proof that each machine is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the types of hardware based encryption devices

A

TPM trusted platform module
HSM hardware security module
USB encryption
Hard drive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trusted platform module TPM is

A

Hardware based encryption that can generate cryptographic keys securely and used to authenticate hardware for disc encryption and other encryption enabled application. Uses crypto processor to secure computing environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HSM

A

Hardware Security Module

A cryptoprocessor device attached to severs and computers to provide digital key security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

USB encryption

A

Hardware based encryption implemented on USB devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hard drive encryption

A

Hardware based encryption that is a full disk encryption method used to encrypt and protect data on the entire disk. Effective on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the three data states

A

At rest. Refers to data in storage
In transit. Refers to data moving across a network
In use. Data being generated, changed, erased or viewed at one network node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ACLs enable you to

A

Access Control Lists enable you to restrict access to resources. commonly implemented as MAC address filters on wireless routers and access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Big data refers to

A

Data collections so large and complex traditional database tools find it difficult to manage. Generally restrict authorized users visibility from seeing the data as a whole. Design to work only with trusted parties and integrate non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data policies might be created for

A

Wiping data
Disposing of data
Retention types of data to be retained
Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is application security

A

Ensures that the proper software is in place to protect applications from threat and vulnerabilities.
Applied to every phase of the software development process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Patch management is

A

The practice of monitoring for, obtaining, evaluating, testing, and deploying software patches and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List common application security methods.

A

Configuration baseline. Composed of the minimum security requirements needed for an application to be completed.

Application hardening. Used to configure default application to prevent security threats and vulnerabilities.

Patch management. System for third party software to ensure ever app is running the latest security requirements and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is input validation

A

Involves ensuring that the data entered into a field in an application is within acceptable bounds for the object that will receive the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is command injection

A

An attacker sends additional commands to an application through an unchecked input field
Exploits input validation vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Client side validation

A

Involves performing all input validation and error recovery from within the browser using JavaScript, Asynchronous JavaScript and XML (AJAX), VBScript or HTML 5
Provides an enhanced user experience.

23
Q

Server side validation

A

Involves performing all input validations and error recovery at the server by using a script language such as Perl, PHP, or ASP.
Provides Enhanced security.

24
Explain Error and exception handling
A strategy organization use to design and develop security measures that are targeted as possible errors in an application Prevents attackers from gathering and using sensitive data presented in an error
25
What is XSS
Cross site scripting attack. Takes advantage of scripting and input validation vulnerabilities in an interactive website in two ways Stored attack. malicious code or links injected into a websites forums, databases or other data Reflected attack. Attacker poses as legitimate user and sends info to a web server in the form of s page request or form submission
26
What is XSRF attack
Cross site request forgery attack take advantage of the trust established between an authorized user of a website and the website itself. Exploits a web browsers trust in unexpired browser cookies or when user select remember password option
27
List some cross site attack prevention methods.
Restrict HTML hypertext markup language formatting in form fields Use input validation in all fields Limit expiration time for cookies Encrypt data communications between clients and severs Inform users not to use remember me options.
28
What is fuzzing
A testing method used to identify security vulnerabilities in applications by sending random input and noting any failures. Performed in the final phases of the application development process.
29
Name some web browser security features
Pop-up blocker Parental controls Automated updating Encryption Proxy support. HTTP, HTTPS, FTP, SOCKS, Gopher, RSTP rapid spanning tree protocol Web content. Enable disable JavaScript Advanced security. Remove cookies, web cache, history, offline website data, saved passwords, authenticated sessions.
30
List some guidelines to ensure web browser security.
Harden host machine or device Install latest software and patches versions Configure security settings Disable scripting when appropriate Disable auto complete and password saving features Install anti-malware software
31
A NoSQL database provides
Data storage and retrieval in a non-relational manner. Uses a variety of models to organize and group data. Supports the creation and maintenance of s global user profile. Suited for storing data from web applications.
32
Are the NoSQL database models
Key value stores. Basic type of NoSQL database. Stored as attribute and associated value. Document stores. Document with standard XML coding Graph stores. Info about networks Column store. Info from very large datasets.
33
For relational databases security measures include
Role based security configuration parameters Encrypted communications Access control for rows and fields User level permissions for stored procedures.
34
Guidelines for managing application security
Establish security configuration baselines for applications Harden and implement max security measures for applications Patch management system for applications Input validation controls Implement combo of client side validation and server side validation Implement error and exception handling for on-house applications Protect against XSS and XSRF attacks Protect relational and NoSQL database and the applications they rely on
35
NoSQL databases may or may not support
Authentication Authorization Data encryption
36
Hardening is a general term for
Any security technique where the configuration of a system is altered to close vulnerabilities and protect the system against attacks. Must be balanced against access requirements
37
List the operating System security settings
``` Managing running services Configuring the OS firewall Configuring Internet security options Managing all automatic updates and patches Enabling auditing and logging functions ```
38
What is TCB
Trusted computing base. responsible for ensuring that the security policy is implemented and the system is secure
39
How is TCB implemented
Implemented in the hardware through processor privileges In the firmware through driver and resource protection In the OSs isolation of resources and services from applications TOS Trusted Operating System
40
What is a security baseline
A collection of security and configuration settings applied to a specific host
41
Name the four types of software updates
Patch. Small unit of supplemental code Hot fix. Emergency patch Rollup. Collection of previously issued patches and hotfixes. Service pack. Comprehensive updates with new features
42
Explain application blacklisting
list the applications to be denied system access and prevent them from being installed or run on the target system. Used in many antivirus and anti spam utilities as well as IDS intrusion detection system and IPS intrusion prevention systems
43
Explain application whitelisting
Maintaining a list of approved application permitted to be installed or run on the target system. Ex of implicit deny.
44
What does logging mean
Using an OS to record data about activity in a computer. Log files are usually stored as text tiles in known locations. Can rapidly consume large amounts of storage space.
45
Security auditing is
The process of performing an organized assessment of the security strengths and weaknesses of a system. Can include reviewing log files, testing password strength, scanning the network for open ports or rogue servers, reviewing user and group permission, and reviewing the physical security related to the system
46
Anti-malware software is
Protective software that scans systems and networks for known viruses, Trojans, worms and other malicious programs
47
5 Types of anti-malware software
Antivirus software scans for known executable code Anti-spam scan for specific keywords Anti-spyware Pop-up blockers prevent transfer of unwanted code through automatic loading windows Host-based firewalls.
48
Three types of windows firewall rules
Inbound rules. Defines action performed on data entering the system Outbound rules. Defines action performed on data going out of the system Connection security rules. Define the type of authentication needed to allow communication between systems
49
Name the virtualization security techniques
Patch management system Least privilege Logging Secure design for components Snapshots Host availability host elasticity adapt to system change Sand boxing. isolate for security testing
50
List hardware security controls
``` Proper logoff and shutdown procedures Approval of wireless devices Store and secure mobile devices properly Cable locks installed and used Strong password policy enforced. ```
51
Describe non standard hosts
Hosts and devices with static environments SCADA systems. Supervisory control and data acquisitions. These are industrial control system Embedded software systems. Software not normally updated by IT dept. Game consoles, printers etc Mainframe computers. Bulk data processing computers Some mobile devices. Older Smartphones and tablets
52
List some security controls for non standard hosts
Layered security including network segmentation and application firewalls Manual updates for older version of iOS and android Firmware version control for SCADA and embedded systems Wrappers. Enable legacy code wrapped in other data to operate in newer environments
53
List some mobile device security controls
``` Use device management Enable screen lock Use strong password Configure device encryption Require remote wipe/lockout Enable GPS tracking Enforce access control Enforce application control Use asset tracking and inventory control Limit removable storage capabilities Implement storage segmentation Disable unused features ```
54
Mobile application security controls
``` Encryption and key management Credential management Authentication and transitive trust Restrict Geo-tagging Application whitelisting ```
55
List BYOD controls
Bring your own device controls to mitigate security issues Corporate policies and acceptable use policies On-boarding and off-boarding employees Data ownership and support ownership Patch management and antivirus management Consider architecture and infrastructure needs Forensics Privacy Control for on-board camera, microphone, and video use