Module 4: Endpoint & Application Development Security Flashcards

1
Q

Define Key Risk Indicator (KRI)

A

A metric of the upper & lower bounds of specific indicators of normal network activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Indicator of Compromise (IOC)

A

Shows that a malicious activity is occurring but it still in the early stages of an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Predictive Analysis

A

Discovering an attack before it occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do Key Risk Indicators (KRIs) include?

A

1) Total network logs per second
2) Number of failed remote logins
3) Network bandwidth
4) Outbound email traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Indicator of Compromise (IOC) show?

A

That a malicious activity is occurring but is still in the early stages of an attack

Aids in predicitve anaysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Open Source.

A

Refers to anything that could be freely used w/o restriction, such as open source film or open source curriculum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Open Source Intelligence (OSINT)?

A

Open source threat intelligence information that is freely available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 4 services that CISCP provides?

A

1) Analyst-to-analyst technical exchanges
2) CISCP analytical products
3) Cross industry orchestration
4) Digital malware analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are analyst-to-analysst technical exchanges?

A

A CISCP service:

Partners can share & receive information on threat actor tactics, techniques, & procedures (TTPs) & emerging trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are CISCP analytical products?

A

A CISCP service:

A portal can be accessed through which partners can receive analysis of products & threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cross industry orchestration?

A

A CISCP service:

Partners can share lessons learned & their expertise w/ peers across common sectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is digital malware analysis?

A

A CISCP service:

Suspected malware can be submitted to be analyzed & then used to generate malware analysis reports to mitigate threats & attack vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 2 concerns around public information sharing centers?

A

1) Privacy
2) Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Automated Indicator Sharing (AIS) do?

A

Enables the exchange of cyberthreat indicators b/t parties through computer-to-computer communication, not email communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 4 CISCP privacy protections?

A

1) Cybersecurity Information Sharing Act (CISA)
2) Freedom of Information Act (FOIA)
3) Traffic-Light Protocol (TPL)
4) Protected Critical Infrastructure Information Act (PCII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cybersecurity Information Sharing Act (CISA)?

A

Federal law passed in 2015 that provides authority for cybersecurity information sharing b/w the private sector, state, & local governments, & the federal government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Freedom of Information Act (FOIA)?

A

Passed in 1967 & provides the public the right to request access to records from any federal agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Traffic-Light Protocol (TLP)?

A

Set of designations used to ensure that sensitive information is shared only w/ the appropriate audience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Protected Critical Infrastructure Informatoin Act (PCII)?

A

2002 act that protects private sector infrastructure information that is voluntarily shared w/ the government for the purposes of homeland security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Structured Threat Information Expression (STIX)?

A

A language & format used to exchange cyberthreat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Trusted Automated Exchange of Intelligence Information (TAXII)?

A

An application protocol for exchanging cyberthreat intelligence over HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Closed Source?

A

Opposite of open source; proprietary, meaning it is owned by an entity that has an exclusive right to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are private information sharing centers?

A

Organizations participating in closed source information that restrict both access to data & participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are 4 sources of threat intelligence?

A

1) Vulnerability database
2) Threat maps
3) File and code repositories
4) Dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the 3 tasks that securing endpoint computers primarily involves?
1) Confirming that the computer has started securely 2) Protecting the computer from attacks 3) Hardening it for even greater protection
26
What is BIOS?
A chip integrated into the computer’s motherboard; when computer was powered on, the BIOS software would “awaken” & perform a legacy BIOS boot
27
What is Unified Extensible Firmware Interface (UEFI)?
An improved firmware interface was developed to replace the BIOS
28
What are the 4 enhancements of UEFI over BIOS?
1) Ability to access hard drives that are larger than 2 TB 2) Support for an unlimited number of primary hard drive partitions 3) Faster booting 4) Support for networking functionality in the UEFI
29
What is the chain of trust?
Each element relies on the confirmation of the previous element to know that the entire process is secure
30
What is the Hardware Root of Trust?
The strongest starting point in the chain of trust is hardware, which cannot be modified like software
31
What are the 5 Boot Security Modes?
1) Legacy BIOS Boot 2) UEFI Native Mode 3) Secure Boot 4) Trusted Boot 5) Measured Boot
32
Description/Advantages/Disadvantages of Legacy BIOS Boot.
Description: Uses BIOS for boot functions Advantages: Compatible w/ older systems Disadvantages: No security features
33
Description/Advantages/Disadvantages of UEFI Native Mode.
Description: Uses UEFI standards for boot functions Advantages: Security boot modules can be patched or updated as needed Disadvantages: No validation or protection of the boot process
34
Description/Advantages/Disadvantages of Secure Boot.
Description: Each firmware & software executable at boot time must be verified as having prior approval Advantages: All system firmware, bootloaders, kernels, & other boot-time executables are validated Disadvantages: Custom hardware, firmware, & software may not pass w/o first being submitted to system vendors like Microsoft
35
Description/Advantages/Disadvantages of Trusted Boot.
Description: Windows OS checks the integrity of every component of boot process before loading it Advantages: Takes over where Secure Boot leaves off by validating the Windows 10 software before loading it Disadvantages: Requires using Microsoft OS
36
Description/Advantages/Disadvantages of Measured Boot.
Description: Computer’s firmware logs the boot process so the OS can send it to a trusted server to assess the security Advantages: Provides highest degree of security Disadvantages: Could slow down the boot process
37
What are 4 ways endpoints are protected?
1) Antivirus Software 2) Antimalware 3) Web Browser Protections 4) Monitoring & Response Systems
38
How does Antivirus Software protect endpoints?
- Can examine a computer for file-based virus infections & monitor computer activity (such as scanning new documents that might contain a virus) - Log files created by AV products can provide beneficial info regarding attacks - Many AV products use signature-based monitoring, called static analysis - A newer approach to AV is heuristic monitoring, called dynamic analysis
39
How does Antimalware protect endpoints?
- Suite of software intended to provide protections against multiple types of malware - Antimalware spam protection is often performed using a technique called Bayesian filtering  Filters by analyzing every word in each email & determines how frequently a word occurs in a spam pile versus a nonspam pile - Another component of an antimalware suite is antispyware, which helps prevent computers from becoming infected by spyware  Uses pop-up blocker, which allow the user to select the level of blocking, ranging from blocking all pop-ups to allowing specific pop-ups
40
How Do Web Browsers protect endpoints (2)?
1) Secure Cookies 2) HTTP Headers - Secure cookies are sent to a web server w/ an encrypted request over the secure HTTPS protocol * This prevents an unauthorized person from intercepting a cookie that is being transmitted between the browser & the web server - HTTP Response Header are headers that tell the browser how to behave while communicating w/ the website
41
What is stateless protocol vs stateful protocol?
Stateless - “Forgets” what occurs when the session is interrupted or ends Stateful - “Remembers” everything that occurs b/t the browser client & the server
42
What are 3 ways the stateless protocol can mimic stateful protocol?
1) Using a URL extension so the state is sent as part of the URL as a response 2) Using “hidden from fields” in which the state is sent to the client as part of the response & returned to the server as a part of a form’s hidden data 3) Storing user-specific information in a file on the user’s local computer & then retrieve is later in a file called a cookie
43
What are the 3 types of Monitoring & Response Systems?
1) Host Intrusion Detection Systems (HIDS) 2) Host Intrusion Prevention Systems (HIPS) 3) Endpoint Detection & Response (EDR)
44
What is Host Intrusion Detection Systems (HIDS)?
Software-based application than runs on an endpoint computer & can detect an attack has occurred
45
What is Host Intrusion Prevention Systems (HIPS)?
Monitor endpoint activity to immediately block a malicious attack by following specific rules
46
What is Endpoint Detection & Response (EDR)?
Tools are considered more robust than HIDS & HIPs: * An EDR can aggregate data from multiple endpoint computers to a centralized database * EDR tools can perform more sophisticated analytics that identify patterns & detect anomalies
47
What are the 4 types of HTTP Response Headers?
1) HTTP Strict Transport Security (HSTS) 2) Content Security Policy (CSP) 3) Cross Site Scripting Protection (X-XSS) 4) X-Frame-Options
48
Description/Protection of HTTP Strict Transport Security (HSTS).
Description: Forces browser to communicate over more secure HTTPS instead of HTTP Protection: Encrypts transmissions to prevent unauthorized user from intercepting
49
Description/Protection of Content Security Policy (CSP).
Description: Restricts the resources a user is allowed to load within the website Protection: Protects against injection attacks
50
Description/Protection of Cross Site Scripting Protection (X-XSS).
Description: Prohibits a page from loading if it detects a cross-site scripting attack Protection: Prevents XSS attacks
51
Description/Protection of X-Frame-Options.
Description: Prevents attackers from “overlaying” their content on the webpage Protection: Foils a threat actor’s attempt to trick a user into providing personal information
52
What are 3 ways HIDs typically monitor installed agents/types of endpoint computer functions?
1) System calls 2) File system access 3) Host input/output
53
What does Hardening Endpoints involve (2)?
1) Patch management 2) OS Protections
54
Patch management involves what 2 types of patch management tools to administer patches?
1) Patch distribution 2) Patch reception
55
What are 3 advantages of automated patch update service?
1) Downloading patches from a local server instead of using the vendor’s online update service can save bandwidth & time because each computer does not have to connect to an external server 2) Administrators can approve or decline updates for client systems, force updates to install by a specific date, & obtain reports on what updates each computer needs 3) Administrators can approve updates for “detection” only; this allows them to see which computers require the update w/o installing it
56
What 3 options does patch reception in Microsoft Windows 10 include?
1) Forced updates 2) No selective updates 3) More efficient distribution
57
What are 3 security configurations a typical OS should include?
1) Disabling unncessary ports & services 2) Disabling default accounts/passwords 3) Employing least functionality
58
What are 6 OS types?
1) Network OS 2) Server OS 3) Workstation OS 4) Appliance OS 5) Kiosk OS 6) Mobile OS
59
Uses & Example of Network OS.
Uses: Software that runs on a network device like a firewall, router, or switch Examples: Cisco Internetwork Operating System (IOS), Juniper JUNOS, MikroTik RouterOS
60
Uses & Example of Server OS.
Uses: OS that runs on a network server to provide resources to network users Examples: Microsoft Windows Server, Apple macOS Server, Red Hat Linux
61
Uses & Example of Workstation OS.
Uses: Software that manages hardware & software on a client computer Examples: Microsoft Windows, Apple macOS, Ubuntu Linux
62
Uses & Example of Appliance OS.
Uses: OS in firmware that is designed to manage a specific device like a digital video recorder or video game console Examples: Linpus Linux
63
Uses & Example of Kiosk OS.
Uses: System & user interface software for an interactive kiosk Examples: Microsoft Windows, Google Chrome OS, Apple iOS, Instant WebKiosk, KioWare (Android)
64
Uses & Example of Mobile OS.
Uses: OS for mobile phones, smartphones, tablets, & other handheld devices Examples: Google Android, Apple iOS, Apple iPadOS
65
Confinement Tools - 3 tools that can be used to restrict malware.
1) Application whitelisting/blacklisting 2) Sandbox 3) Quarantine
66
What are 3 attacks based on application vulnerabilities?
1) Executable files attack 2) System tampering 3) Process spawning control
67
Description/Defense of Executable files attack.
Description: Trick the vulnerable application into modifying or creating executable files on the system Defense: Prevent the application from creating or modifying executable files for its proper function
68
Description/Defense of System tampering.
Description: Uses the vulnerable application to modify special sensitive areas of the OS (Microsoft Windows registry keys, system startup files, etc.) & take advantage of those modifications Defense: Do not allow applications to modify special areas of the OS
69
Description/Defense of Process spawning control.
Description: Trick the vulnerable application into spawning executable files on the system Defense: Take away the process spawning ability from the application
70
What does a directory traversal attack take advantage of?
Vulnerability in the web application program or the web server software so that a user can move from the root directory to other restricted directories
71
What is a command injection?
The ability to move could allow an unauthorized user to view confidential files or enter commands to execute on a service
72
What are poor memory management vulnerabilities?
Other dangerous weaknesses in an application can create vulnerabilities in computer memory or buffer areas that can be easily exploited
73
What results in poor memory management vulnerabilities (4)?
1) Buffer overflow 2) Integer overflow 3) Pointer/object dereference 4) DLL injection attacks
74
What are 2 levels of application development concepts?
1) General concepts that apply to all application development 2) General concepts that apply to rigorous security-based approach
75
What are the 4 stages an application requires completing during development?
1) Development 2) Testing 3) Staging 4) Production
76
What happens in the Development Stage of an application?
The requirements for the application are established, & it is confirmed that the application meets the intended business needs before the actual coding begins
77
What happens in the Testing Stage of an application?
Thoroughly tests the application for any errors that could result in a security vulnerability
78
What happens in the Staging Stage of an application?
Tests to verify that the code functions as intended
79
What happens in the Production Stage of an application?
The application is released to be used in its actual setting
80
What is Software Diversity?
A software development technique in which 2 or more functionally identical variants of a program are developed from the same specification but by different programmers or programming teams
81
What are the 3 intents that Software Diversity provide?
1) Error detection 2) Increased reliability 3) Additional documentation
82
What is Provisioning?
The enterprise-wide configuration, deployment, & management of multiple types of IT system resources
83
What is Deprovisioning?
Application development is removing a resource that is no longer needed
84
What is Integrity Measurement?
An “attestation mechanism” designed to be able to convince a remote party that an application is running only a set of known & approved executables
85
What is an application development lifecycle model?
A conceptual model that describes the stages involved in creating an application & are usually one of the following 2: 1) Waterfall model 2) Agile model
86
What is the design of the waterfall model?
Uses a sequential design process; as each stage is fully completed, the developers move on to the next stage
87
What is the design of the agile model?
Designed to overcome the disadvantages of the waterfall model; takes an incremental approach
88
What is SecDevOps?
The process of integrating secure development best practices & methodologies into application software development & deployment processes using the agile model
89
What terms is SecDevOps often promoted to?
1) Elasticity 2) Scalability
90
What is the cornerstone of SecDevOps?
Automation
91
What 5 things does automation enable r/t SecDevOps?
1) Continuous monitoring 2) Continuous validation 3) Continous integration 4) Continuous delivery 5) Continuous deployment
92
What is Continuous Monitoring?
Examining processes in real time instead of at the end of a stage
93
What is Continuous Validation?
Ongoing approvals of the code
94
What s Continuous Integration?
Ensuring that security features are incorporated at each stage
95
What is Continuous Delivery?
Moving the code to each stage as it is completed
96
What is Continuous Deployment?
Continuous code implementation
97
What are immutable systems?
Once a value or configuration is employed as a part of an application, it is not modified; if changes are necessary, a new system must be created
98
What is infrastructure as code?
Managing a hardware & software infrastructure using the same principles as developing computer code
99
What is baselining?
Creating a starting point for comparison purposes in order to apply targets & goals to measure success
100
What coding techniques are used to create secure applications & limit data exposure or disclosing sensitive data to attackers (2)?
1) Determining how encryption will be implemented 2) Ensuring that memory management is handled correctly so as not to introduce memory vulnerabilities
101
What are 3 secure software development lifecycle sources?
1) OWASP (Open Web Application Security Project) 2) SANS (SysAdmin, Audit, Network & Security Institute) 3) CIS (Center of Internet Security)
102
Description/Materials Available of OWASP.
Description: A group that monitors web attacks Materials Available: Maturity models, development guides, testing guides, code review guides, & application security verification standards
103
Description/Materials Available of SANS (SysAdmin, Audit, Network, & Security Institute).
Description: A company that specializes in cybersecurity & secure web application development Materials Available: White papers, research reports, & best practices guidelines
104
Description/Materials Available of Center for Internet Security (CIS).
Description: Not-for-profit organization that compiles CIS security controls Materials Available: Training, assessment tools, & consulting services
105
What is one of the most important steps in SecDevOps?
Testing!
106
When should testing be done r/t SecDevOps?
During the implementation & verification phases of a software development process
107
What 2 codes analysis are involved with testing SecDevOps?
1) Static Code Analysis 2) Dynamic Code Analysis
108
What is static code analysis?
Tests ran before the source code is even compiled & may be accompanied by manual peer reviews
109
What is dynamic code analysis?
Security testing performed after the source code is complied
110
What is Fuzzing?
Used by dynamic code analysis tools & provides random input to a program in an attempt to trigger exceptions
111
What are the 8 secure coding techniques?
1) Proper input validation 2) Normalization 3) Stored procedure 4) Code signing 5) Obfuscation/camouflaged code 6) Dead code 7) Server-side execution & validation or Client-side execution & validation 8) Code reuse of third-party libraries & SDKs
112
Description/Security Advantage of Proper Input Validation.
Description: Accounting for errors such as incorrect user input (entering a file name for a file that does not exist) Security Advantage: Can prevent Cross-site scription (XSS) and Cross-site forgery (CSRF)
113
Description/Security Advantage of Normalization.
Description: Organizing data within a database to minimize redundancy Security Advantage: Reduces footprint of data exposed to attackers
114
Description/Security Advantage of Stored Procedure.
Description: A subroutine available to applications that access a relational database Security Advantage: Eliminates the need to write a subroutine that could have vulnerabilities
115
Description/Security Advantage of Code Signing.
Description: Digitally signing applications Security Advantage: Confirms the software author and guarantees the code has not been altered or corrupted
116
Description/Security Advantage of Obfuscation/Camouflaged Code.
Description: Writing an application in such a way that its inner functionality is difficult for an outsider to understand Security Advantage: Helps prevent an attacker from understanding a program’s function
117
Description/Security Advantage of Dead Code.
Description: A section of an application that executes but performs no meaningful function Security Advantage: Provides an unnecessary attack vector for attackers
118
Description/Security Advantage of Server-Side Execution & Validation or Client-Side Execution & Validation.
Description: Input validation generally uses the server to perform validation but can also have the client perform validation by the user’s web browser Security Advantage: Adds another validation to the process
119
Description/Security Advantage of Code Reuse of Third-Party Libraries and SDKs.
Description: Code reuse is using existing software in a new application; a software development kit (SDK) is a set of tools used to write applications Security Advantage: Existing libraries that have already been vetted as secure eliminate the need to write new code
120
What does Windows 10 Tamper Protection do?
Windows 10 Tamper Protection security feature prevents Windows security settings from being changed or disabled by a threat actor who modifies the registry