Module 4: Endpoint & Application Development Security Flashcards
Define Key Risk Indicator (KRI)
A metric of the upper & lower bounds of specific indicators of normal network activity
Define Indicator of Compromise (IOC)
Shows that a malicious activity is occurring but it still in the early stages of an attack
Define Predictive Analysis
Discovering an attack before it occurs
What do Key Risk Indicators (KRIs) include?
1) Total network logs per second
2) Number of failed remote logins
3) Network bandwidth
4) Outbound email traffic
What does Indicator of Compromise (IOC) show?
That a malicious activity is occurring but is still in the early stages of an attack
Aids in predicitve anaysis
Define Open Source.
Refers to anything that could be freely used w/o restriction, such as open source film or open source curriculum
What is Open Source Intelligence (OSINT)?
Open source threat intelligence information that is freely available
What are 4 services that CISCP provides?
1) Analyst-to-analyst technical exchanges
2) CISCP analytical products
3) Cross industry orchestration
4) Digital malware analysis
What are analyst-to-analysst technical exchanges?
A CISCP service:
Partners can share & receive information on threat actor tactics, techniques, & procedures (TTPs) & emerging trends
What are CISCP analytical products?
A CISCP service:
A portal can be accessed through which partners can receive analysis of products & threats
What is cross industry orchestration?
A CISCP service:
Partners can share lessons learned & their expertise w/ peers across common sectors
What is digital malware analysis?
A CISCP service:
Suspected malware can be submitted to be analyzed & then used to generate malware analysis reports to mitigate threats & attack vectors
What are 2 concerns around public information sharing centers?
1) Privacy
2) Speed
What does Automated Indicator Sharing (AIS) do?
Enables the exchange of cyberthreat indicators b/t parties through computer-to-computer communication, not email communication
What are 4 CISCP privacy protections?
1) Cybersecurity Information Sharing Act (CISA)
2) Freedom of Information Act (FOIA)
3) Traffic-Light Protocol (TPL)
4) Protected Critical Infrastructure Information Act (PCII)
What is Cybersecurity Information Sharing Act (CISA)?
Federal law passed in 2015 that provides authority for cybersecurity information sharing b/w the private sector, state, & local governments, & the federal government
What is Freedom of Information Act (FOIA)?
Passed in 1967 & provides the public the right to request access to records from any federal agency
What is Traffic-Light Protocol (TLP)?
Set of designations used to ensure that sensitive information is shared only w/ the appropriate audience
What is Protected Critical Infrastructure Informatoin Act (PCII)?
2002 act that protects private sector infrastructure information that is voluntarily shared w/ the government for the purposes of homeland security
What is Structured Threat Information Expression (STIX)?
A language & format used to exchange cyberthreat intelligence
What is Trusted Automated Exchange of Intelligence Information (TAXII)?
An application protocol for exchanging cyberthreat intelligence over HTTPS
Define Closed Source?
Opposite of open source; proprietary, meaning it is owned by an entity that has an exclusive right to it
What are private information sharing centers?
Organizations participating in closed source information that restrict both access to data & participation
What are 4 sources of threat intelligence?
1) Vulnerability database
2) Threat maps
3) File and code repositories
4) Dark web
What are the 3 tasks that securing endpoint computers primarily involves?
1) Confirming that the computer has started securely
2) Protecting the computer from attacks
3) Hardening it for even greater protection
What is BIOS?
A chip integrated into the computer’s motherboard; when computer was powered on, the BIOS software would “awaken” & perform a legacy BIOS boot
What is Unified Extensible Firmware Interface (UEFI)?
An improved firmware interface was developed to replace the BIOS
What are the 4 enhancements of UEFI over BIOS?
1) Ability to access hard drives that are larger than 2 TB
2) Support for an unlimited number of primary hard drive partitions
3) Faster booting
4) Support for networking functionality in the UEFI
What is the chain of trust?
Each element relies on the confirmation of the previous element to know that the entire process is secure
What is the Hardware Root of Trust?
The strongest starting point in the chain of trust is hardware, which cannot be modified like software
What are the 5 Boot Security Modes?
1) Legacy BIOS Boot
2) UEFI Native Mode
3) Secure Boot
4) Trusted Boot
5) Measured Boot
Description/Advantages/Disadvantages of Legacy BIOS Boot.
Description:
Uses BIOS for boot functions
Advantages:
Compatible w/ older systems
Disadvantages:
No security features
Description/Advantages/Disadvantages of UEFI Native Mode.
Description:
Uses UEFI standards for boot functions
Advantages:
Security boot modules can be patched or updated as needed
Disadvantages:
No validation or protection of the boot process
Description/Advantages/Disadvantages of Secure Boot.
Description:
Each firmware & software executable at boot time must be verified as having prior approval
Advantages:
All system firmware, bootloaders, kernels, & other boot-time executables are validated
Disadvantages:
Custom hardware, firmware, & software may not pass w/o first being submitted to system vendors like Microsoft
Description/Advantages/Disadvantages of Trusted Boot.
Description:
Windows OS checks the integrity of every component of boot process before loading it
Advantages:
Takes over where Secure Boot leaves off by validating the Windows 10 software before loading it
Disadvantages:
Requires using Microsoft OS
Description/Advantages/Disadvantages of Measured Boot.
Description:
Computer’s firmware logs the boot process so the OS can send it to a trusted server to assess the security
Advantages:
Provides highest degree of security
Disadvantages:
Could slow down the boot process
What are 4 ways endpoints are protected?
1) Antivirus Software
2) Antimalware
3) Web Browser Protections
4) Monitoring & Response Systems
How does Antivirus Software protect endpoints?
- Can examine a computer for file-based virus infections & monitor computer activity (such as scanning new documents that might contain a virus)
- Log files created by AV products can provide beneficial info regarding attacks
- Many AV products use signature-based monitoring, called static analysis
- A newer approach to AV is heuristic monitoring, called dynamic analysis
How does Antimalware protect endpoints?
- Suite of software intended to provide protections against multiple types of malware
- Antimalware spam protection is often performed using a technique called Bayesian filtering
Filters by analyzing every word in each email & determines how frequently a word occurs in a spam pile versus a nonspam pile - Another component of an antimalware suite is antispyware, which helps prevent computers from becoming infected by spyware
Uses pop-up blocker, which allow the user to select the level of blocking, ranging from blocking all pop-ups to allowing specific pop-ups
How Do Web Browsers protect endpoints (2)?
1) Secure Cookies
2) HTTP Headers
- Secure cookies are sent to a web server w/ an encrypted request over the secure HTTPS protocol
- This prevents an unauthorized person from intercepting a cookie that is being transmitted between the browser & the web server
- HTTP Response Header are headers that tell the browser how to behave while communicating w/ the website
What is stateless protocol vs stateful protocol?
Stateless - “Forgets” what occurs when the session is interrupted or ends
Stateful - “Remembers” everything that occurs b/t the browser client & the server
What are 3 ways the stateless protocol can mimic stateful protocol?
1) Using a URL extension so the state is sent as part of the URL as a response
2) Using “hidden from fields” in which the state is sent to the client as part of the response & returned to the server as a part of a form’s hidden data
3) Storing user-specific information in a file on the user’s local computer & then retrieve is later in a file called a cookie
What are the 3 types of Monitoring & Response Systems?
1) Host Intrusion Detection Systems (HIDS)
2) Host Intrusion Prevention Systems (HIPS)
3) Endpoint Detection & Response (EDR)
What is Host Intrusion Detection Systems (HIDS)?
Software-based application than runs on an endpoint computer & can detect an attack has occurred
What is Host Intrusion Prevention Systems (HIPS)?
Monitor endpoint activity to immediately block a malicious attack by following specific rules
What is Endpoint Detection & Response (EDR)?
Tools are considered more robust than HIDS & HIPs:
- An EDR can aggregate data from multiple endpoint computers to a centralized database
- EDR tools can perform more sophisticated analytics that identify patterns & detect anomalies
What are the 4 types of HTTP Response Headers?
1) HTTP Strict Transport Security (HSTS)
2) Content Security Policy (CSP)
3) Cross Site Scripting Protection (X-XSS)
4) X-Frame-Options
Description/Protection of HTTP Strict Transport Security (HSTS).
Description:
Forces browser to communicate over more secure HTTPS instead of HTTP
Protection:
Encrypts transmissions to prevent unauthorized user from intercepting