Módulo 06 - Resiliency and Site Security Flashcards
Define:
Environmental Design (Physical Security)
Security approach that uses the built environment to enhance security
List:
Environmental Design options
- Barricades and Entry/Exit point
- Fencing
- Lights
- Bollards (Coisa de ferro ou cimento controlado remotamente que impede a passagem de veículos)
List:
Lock types
- Physical
- Electronic
- Biometric
Define:
PACS - Physical Access Control System
Designed to control who can access specific locations within a building, essential to protect access badges (NFC cards)
List:
The use of AI and camera systems
- Motion Recognition
- Object Detection
- Drones/UAV
List:
Type of alarms
- Circuit
- Motion Detection
- Noise Detection
- Proximity
- Duress
List:
Types of sensors
- Infrared
- Pressure
- Microwave
- Ultrasonic
Acronym:
RFID
Radio Frequency ID
List:
Common Physical Attacks
- Brute Force
- Environmental
- RFID Cloning
What’s the fundamental concept in network monitoring?
Know which computer are the big receivers and senders of information in the network.
List
Network Monitoring Tools
ping
tracert/traceroute
pathping
netstat
route
arp
nslookup/dig
ipconfig/ifconfig
hping
netcat
IP scanners
nmap
Define:
Passive reconnaissance
Gathering information on the target with no direct interaction
List:
Passive reconnaissance methods
- Packet sniffing
- Eavesdropping
- OSINT - Open Source Intelligence
- Network Traffic analysis
Acronym:
OSINT
Open Source Intelligence
Define:
OSINT - Open Source Intelligence
Collecting data from public sources
Define:
Active reconnaissance
Gathering information on a target by probing and interacting
List:
Active reconnaissance techniques
- Port scanning
- Service enumeration
- OS fingerprinting
- DNS enumeration
- Web Application Crawling
List:
Type of reconnaissance
- Passive
- Active
List:
Target information to extract
- Security posture (Physical and network)
- Narrow the focus for attack
- Potential vulnerabilities
- Create a network map
List:
Reconnaissance tools
- OSINT framework
- theHarvester
- Shodan
- DNSenum
- curl and wget
- Scanless
- Nessus
Acronym:
IPS
Intrusion Prevention System
Acronym:
IDS
Intrusion Detective System
Define:
Intrusion Prevention System
Detects attacks and suspicious activity and automates responses to the malicious actitivity
Define:
Intrusion Detection System
Detect attacks and suspicious activity
List:
Threat traffic label
- Positive
- False positive
- Negative
- False negative
List:
Detection methods
- Signature-based
- Heuristic-based
List:
IDS/IPS implementation types
- Host-based H(IDS)
- Network-based (NIDS)
Acronym:
HIDS
Host-based IDS
Acronym:
NIDS
Network-based IDS
Define:
Trend Analysis
Consists on understanding an environment over time, identifying patterns.
Easily identifying false positives or unnecessary alerts.
Define:
Q: Protocol analyzer
A tool (hardware or software) used to monitor and analyze network traffic, also known as packet sniffer or network analyzer.
List:
Q: Common protocol analyzer tools
- Wireshark.
- Tcpdump.
- Ettercap.
- Dsniff.
- Cain and Abel.
- Windump.
Define:
Q: SecOps protocol analyzer usage
Identifies network vulnerabilities, such as malformed packets, open ports, or sensitive data sent in cleartext.
Define:
Q: System fingerprinting
Identifying a system’s operating system by analyzing how it responds to different types of network traffic.
Define:
Q: TCP handshake flags
Indicators within TCP packets that help identify the state of a connection during the handshake process.
Define:
Q: Packet sniffing
Using a protocol analyzer to capture and analyze network packets.
Acronym:
NIC
Network Interface Card
True or false:
A protocol analyzer is always capable of listening to every packet on the collision domain
False.
Except when the NIC is on p-mode (Promiscous mode)
Define:
Q: Network attack
A: A strategy or technique used by threat actors to disrupt or gain unauthorized access to systems via a network.
List:
Q: Stages of the cyberattack lifecycle
- Reconnaissance.
- Credential harvesting.
- Denial-of-service (DoS).
- Weaponization, delivery, and breach.
- Command and control (C2).
- Lateral movement and privilege escalation.
- Data exfiltration.