Messer test 2 review Flashcards
of instances that an event would occur in a year
ARO (annualized rate of occurrence)
expected cost of all events in a single year
ALE (annual loss expectancy)
monetary loss if a single event occurs
SLE (single loss expectancy)
time required to repair a product or system after a failure
MTTR (mean time to repair)
state what is the SLE, ARO and ALE:
if it costs $1,000 to replace a single laptop and you expect to lose 7 in a year, the ___ for laptop theft is $7,000
SLE (single loss expectancy): $1,000 cost of one laptop
ARO (annualized rate of occurrence): 7 laptops in a year
ALE (annual loss expectancy): for laptop theft is $7,000
process of gathering info from outside sources, like social media sites and online forums usually for pen test
passive scan
associated with development life cycle model that focuses on rapid development and constant collaboration
agile
commonly used to control flow of people through particular area. unlocking one door restricts the other from opening
access control vestibule
used to block electromagnetic fields, useful in environments where electromagnetic and radio signals are an issue
faraday cage
physically secure cabled network
protected distribution system (PDS)
describes relationship with IT and their customers
stakeholder management
list of everyone who needs to be contacted during an incident
communication plan
specify the type and amount of data that must be backed up and stored
retention policies
security control commonly implemented on routers to allow or restrict traffic flows through the network
access control list (ACL)
method of modifying the source and/or destination IP addresses of network traffic
NAT (network address translation)
series of security levels (public, private, secret) assigns those levels to EACH object in OS. Users are assigned a security level and only would have access to objects that meet or are below that assigned security level
mandatory access control
determines access based on a series of system enforced rules
rule based AC
assigns a user’s permissions based on their role in the organization
role based
EMI
electromagnetic interference
high end cryptographic hardware designed for large scale secured storage on the network. usually it’s own server
hardware security module (HSM)
hardware that is part of computer’s motherboard is designed to assist and protect with cryptographic functions. full disk encryption (FDE) can use burned in ____ keys to verify that the local device hasn’t changed and there are security features in ___ that prevent brute force or dictionary attacks against full disk encryption login crews
trusted platform module (TPM)
describes how company assets are to be used, especially computers, internal connections and mobile devices
acceptable use policy (AUP)
preparation, identification, containment, eradication, recovery and lessons learned
incident response (IR)
systems designed to identify sensitive data transfers. if ___ finds suspicious forwarding of data, ___ can block it
data loss prevention (DLP)
when 3rd party holds decryption keys for data
key escrow
keys transferred between people or systems over network (in band) or outside the normal network communication (out of band)
key exchange
provides summary of network traffic application usage and details of network conversations. logs show all conversations from this device to any others in the network
NetFlow
true or false: vulnerability scan only identifies known vulnerabilities, it doesn’t exploit
true
______ uses smaller keys, has smaller storage and transmission requirements. efficient option for mobile devices
elliptic curve cryptography (ECC)
_______ used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.
has two algorithms: RSA (considered unbreakable, but slow) and Diffie-Hellman
Up to the user to use it correctly
Alternative to S/MIME encryption
pretty good privacy (PGP)
–located in the core of the network
*Web security gateway
* URL filter / Content inspection
* Malware inspection
* Spam filter
* CSU/DSU
* Router, Switch
* Firewall
* IDS/IPS
* Bandwidth shaper
* VPN endpoint
unified threat management (UTM)–all in one security compliance
HIPS
host based intrusion prevention system
Confidentiality agreement / Legal contract – Prevents the use and dissemination of
confidential information
non disclosure agreement (NDA)
removes electromagnetic field of storage media and electronics
degaussing
places papers into a large washing tank to remove ink, paper broken down into pulp and recycled
pulping
does not have access to OS and may not provide method of upgrading system firmware
embedded system
DES
data encryption standard
used to authenticate devices using Mirosoft’s point to point tunneling protocol (PPTP). security issues related to DES (data encryption standard) eliminates ____
MS-CHAP (microsoft challenge handshake authentication protocol)
PPTP
point to point tunneling protocol (PPTP)
simple network management protocol used to manage servers and infrastructure devices
SNMPv3 (simple network management protocol)
protocol needed for 802.1X authentication (4 options)
LDAP, RADIUS, TACAS+ or Kerberos
alert of any changes to file
file integrity check
protects web based applications from malicious attacks
web application firewall (WAP)
associated with moving around the file system of a server
directory traversal
created by US intelligence as a way to standardize attack reporting and analysis of intrusions. scientific principles to intrusion analysis: measurements, testability and repeatability.
points: adversary, capability, infrastructure, victim.
diamond model of intrusion
knowledgeable of attack types, techniques and mitigation options
MITRE ATT&CK framework
standard focuses on the implementation and maintenance of a privacy information management system (PIMS)
ISO 27701
focuses on protecting personal data and informational privacy. focuses on collection, use, storage, and disposal. based on ISO 27701
privacy information management system (PIMS)
alternative is ISMS
guide to understand, manage and rate risks found in an organization
NIST RMF (national institute of standards and technology risk management framework)
identify if a device has been opened
physical tamper seal
easy exploit of memory leak
DDoS. unused memory is not properly released, eventually leak uses all available memory, system crashes
a private network that only users within an org can access
intranet
hides sensitive data by hiding the info or replacing it with non sensitive alternative
obfuscation/data masking
encrypted data is drastically different than the plaintext
confusion
changing one character of the input will cause many characters to change in the output
diffusion
provides user with hardware to get up and running, end user is responsible for the OS, application and ongoing maintenance tasks
IaaS (infrastructure as a service)
requires end user purchase, install and maintain application hardware and software
private