Managing Security 3 Flashcards

0
Q

Describe defense in depth

A

A tactic that leverages a layered approach to security used to plan personnel training, policy adoption, physical protection and other comprehensive strategies. An excellent fail safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Describe layered security

A

securing systems and their data that incorporates many different venues of defense and implementing controls to mitigate each type of threat. Provides optimum protection for organization vulnerable to a wide variety of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data security

A

Refers to the security controls and measure taken to keep an organizations data safe and accessible and prevent unauthorized access. Must be applied at every level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe data security vulnerabilities.

A

Can include the increased use of cloud computing, lack of restricted physical access to data storage systems, and lack of user awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List some data storage methods

A

Traditional network servers. Referred to DAS direct attach storage
Network attached storage NAS. multiple hard dives
Storage area networks SAN dedicated networks providing block level storage
Cloud based storage. Service based storage hosted by a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the data encryption methods

A
Full disk encryption 
Database encryption 
File encryption 
Mobile device encryption
Email encryption 
Voice encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain hardware based encryption devices

A
Encryption, decryption, and access control are enforced by a cryptographic module called HSM. hardware security module.  
Does not allow the execution of external programs attempting to reset counters or access their memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Benefits of hardware based encryption

A

Prevents storage mapping from drive to file system
Prevents copying drive contents without the assigned HSM
self governed and not dependent on the OS
provides org proof that each machine is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the types of hardware based encryption devices

A

TPM trusted platform module
HSM hardware security module
USB encryption
Hard drive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trusted platform module TPM is

A

Hardware based encryption that can generate cryptographic keys securely and used to authenticate hardware for disc encryption and other encryption enabled application. Uses crypto processor to secure computing environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HSM

A

Hardware Security Module

A cryptoprocessor device attached to severs and computers to provide digital key security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

USB encryption

A

Hardware based encryption implemented on USB devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hard drive encryption

A

Hardware based encryption that is a full disk encryption method used to encrypt and protect data on the entire disk. Effective on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the three data states

A

At rest. Refers to data in storage
In transit. Refers to data moving across a network
In use. Data being generated, changed, erased or viewed at one network node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ACLs enable you to

A

Access Control Lists enable you to restrict access to resources. commonly implemented as MAC address filters on wireless routers and access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Big data refers to

A

Data collections so large and complex traditional database tools find it difficult to manage. Generally restrict authorized users visibility from seeing the data as a whole. Design to work only with trusted parties and integrate non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data policies might be created for

A

Wiping data
Disposing of data
Retention types of data to be retained
Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is application security

A

Ensures that the proper software is in place to protect applications from threat and vulnerabilities.
Applied to every phase of the software development process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Patch management is

A

The practice of monitoring for, obtaining, evaluating, testing, and deploying software patches and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List common application security methods.

A

Configuration baseline. Composed of the minimum security requirements needed for an application to be completed.

Application hardening. Used to configure default application to prevent security threats and vulnerabilities.

Patch management. System for third party software to ensure ever app is running the latest security requirements and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is input validation

A

Involves ensuring that the data entered into a field in an application is within acceptable bounds for the object that will receive the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is command injection

A

An attacker sends additional commands to an application through an unchecked input field
Exploits input validation vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Client side validation

A

Involves performing all input validation and error recovery from within the browser using JavaScript, Asynchronous JavaScript and XML (AJAX), VBScript or HTML 5
Provides an enhanced user experience.

23
Q

Server side validation

A

Involves performing all input validations and error recovery at the server by using a script language such as Perl, PHP, or ASP.
Provides Enhanced security.

24
Q

Explain Error and exception handling

A

A strategy organization use to design and develop security measures that are targeted as possible errors in an application
Prevents attackers from gathering and using sensitive data presented in an error

25
Q

What is XSS

A

Cross site scripting attack. Takes advantage of scripting and input validation vulnerabilities in an interactive website in two ways
Stored attack. malicious code or links injected into a websites forums, databases or other data
Reflected attack. Attacker poses as legitimate user and sends info to a web server in the form of s page request or form submission

26
Q

What is XSRF attack

A

Cross site request forgery attack take advantage of the trust established between an authorized user of a website and the website itself. Exploits a web browsers trust in unexpired browser cookies or when user select remember password option

27
Q

List some cross site attack prevention methods.

A

Restrict HTML hypertext markup language formatting in form fields

Use input validation in all fields

Limit expiration time for cookies

Encrypt data communications between clients and severs

Inform users not to use remember me options.

28
Q

What is fuzzing

A

A testing method used to identify security vulnerabilities in applications by sending random input and noting any failures. Performed in the final phases of the application development process.

29
Q

Name some web browser security features

A

Pop-up blocker
Parental controls
Automated updating
Encryption
Proxy support. HTTP, HTTPS, FTP, SOCKS, Gopher, RSTP rapid spanning tree protocol
Web content. Enable disable JavaScript
Advanced security. Remove cookies, web cache, history, offline website data, saved passwords, authenticated sessions.

30
Q

List some guidelines to ensure web browser security.

A

Harden host machine or device
Install latest software and patches versions
Configure security settings
Disable scripting when appropriate
Disable auto complete and password saving features
Install anti-malware software

31
Q

A NoSQL database provides

A

Data storage and retrieval in a non-relational manner. Uses a variety of models to organize and group data. Supports the creation and maintenance of s global user profile. Suited for storing data from web applications.

32
Q

Are the NoSQL database models

A

Key value stores. Basic type of NoSQL database. Stored as attribute and associated value.
Document stores. Document with standard XML coding
Graph stores. Info about networks
Column store. Info from very large datasets.

33
Q

For relational databases security measures include

A

Role based security configuration parameters
Encrypted communications
Access control for rows and fields
User level permissions for stored procedures.

34
Q

Guidelines for managing application security

A

Establish security configuration baselines for applications
Harden and implement max security measures for applications
Patch management system for applications
Input validation controls
Implement combo of client side validation and server side validation
Implement error and exception handling for on-house applications
Protect against XSS and XSRF attacks
Protect relational and NoSQL database and the applications they rely on

35
Q

NoSQL databases may or may not support

A

Authentication
Authorization
Data encryption

36
Q

Hardening is a general term for

A

Any security technique where the configuration of a system is altered to close vulnerabilities and protect the system against attacks. Must be balanced against access requirements

37
Q

List the operating System security settings

A
Managing running services
Configuring the OS firewall
Configuring Internet security options
Managing all automatic updates and patches
Enabling auditing and logging functions
38
Q

What is TCB

A

Trusted computing base. responsible for ensuring that the security policy is implemented and the system is secure

39
Q

How is TCB implemented

A

Implemented in the hardware through processor privileges
In the firmware through driver and resource protection
In the OSs isolation of resources and services from applications TOS Trusted Operating System

40
Q

What is a security baseline

A

A collection of security and configuration settings applied to a specific host

41
Q

Name the four types of software updates

A

Patch. Small unit of supplemental code
Hot fix. Emergency patch
Rollup. Collection of previously issued patches and hotfixes.
Service pack. Comprehensive updates with new features

42
Q

Explain application blacklisting

A

list the applications to be denied system access and prevent them from being installed or run on the target system. Used in many antivirus and anti spam utilities as well as IDS intrusion detection system and IPS intrusion prevention systems

43
Q

Explain application whitelisting

A

Maintaining a list of approved application permitted to be installed or run on the target system. Ex of implicit deny.

44
Q

What does logging mean

A

Using an OS to record data about activity in a computer. Log files are usually stored as text tiles in known locations. Can rapidly consume large amounts of storage space.

45
Q

Security auditing is

A

The process of performing an organized assessment of the security strengths and weaknesses of a system. Can include reviewing log files, testing password strength, scanning the network for open ports or rogue servers, reviewing user and group permission, and reviewing the physical security related to the system

46
Q

Anti-malware software is

A

Protective software that scans systems and networks for known viruses, Trojans, worms and other malicious programs

47
Q

5 Types of anti-malware software

A

Antivirus software scans for known executable code
Anti-spam scan for specific keywords
Anti-spyware
Pop-up blockers prevent transfer of unwanted code through automatic loading windows
Host-based firewalls.

48
Q

Three types of windows firewall rules

A

Inbound rules. Defines action performed on data entering the system
Outbound rules. Defines action performed on data going out of the system
Connection security rules. Define the type of authentication needed to allow communication between systems

49
Q

Name the virtualization security techniques

A

Patch management system
Least privilege
Logging
Secure design for components
Snapshots
Host availability host elasticity adapt to system change
Sand boxing. isolate for security testing

50
Q

List hardware security controls

A
Proper logoff and shutdown procedures
Approval of wireless devices
Store and secure mobile devices properly 
Cable locks installed and used 
Strong password policy enforced.
51
Q

Describe non standard hosts

A

Hosts and devices with static environments
SCADA systems. Supervisory control and data acquisitions. These are industrial control system
Embedded software systems. Software not normally updated by IT dept. Game consoles, printers etc
Mainframe computers. Bulk data processing computers
Some mobile devices. Older Smartphones and tablets

52
Q

List some security controls for non standard hosts

A

Layered security including network segmentation and application firewalls
Manual updates for older version of iOS and android
Firmware version control for SCADA and embedded systems
Wrappers. Enable legacy code wrapped in other data to operate in newer environments

53
Q

List some mobile device security controls

A
Use device management
Enable screen lock
Use strong password
Configure device encryption
Require remote wipe/lockout 
Enable GPS tracking
Enforce access control 
Enforce application control 
Use asset tracking and inventory control 
Limit removable storage capabilities 
Implement storage segmentation 
Disable unused features
54
Q

Mobile application security controls

A
Encryption and key management 
Credential management 
Authentication and transitive trust 
Restrict Geo-tagging
Application whitelisting
55
Q

List BYOD controls

A

Bring your own device controls to mitigate security issues
Corporate policies and acceptable use policies
On-boarding and off-boarding employees
Data ownership and support ownership
Patch management and antivirus management
Consider architecture and infrastructure needs
Forensics
Privacy
Control for on-board camera, microphone, and video use