My Questions Flashcards
Protect Documents that can be used in evidence from being altered
Legal Hold
Authentication Header (AH)
provides a mechanism for authentication only. Because AH does not perform
encryption, it is faster than ESP.
Encapsulation Security Payload ESP
provides data confidentiality (encryption) and authentication (data integrity, data
origin authentication, and replay protection). ESP can be used with confidentiality only,
authentication only, or both confidentiality and authentication.
Data owner
Usually a member of senior management. Can delegate some day-to-day duties.
Cannot delegate total responsibility.
Data Controller
Manages the purposes and means by which
personal data is processed
Data processor
Processes data on behalf of the data controller
Data custodian/steward
Responsible for data accuracy, privacy, and security
– Associates sensitivity labels to the data
– Ensures compliance with any applicable laws and standards
– Manages the access rights to the data
– Implements security controls
Data protection officer (DPO)
Responsible for the organization’s data privacy
– Sets policies, implements processes and procedures
Incident Response Lifecycle
- Preparation
- Detection & Analysis
- Containment, Eradication and Recovery
- Post Incident Activity
Cyber Kill Chain
- Recon
- Weaponisation
- Delivery
- Exploitation
- Installation
- Command & Control
- Action on Objectives
Diamond Model
This is an analysis framework
1. Adversary Develops Capability
2. Adversary Uses Infrastructure
3. Infrastructure Connects To Victim
4. Capability Exploits Victim and deployed via Infrastructure
Managerial Control
Address security design and implementation through policies and SOP’s
Operational Control
Implemented by People e.g. security guards and awareness programs
Technical Control
Implemented using systems
Physical Security
Deter - Deny - Detect - Delay
DER Cert Format
Distinguished Encoding Rules
- Binary Format
- Common Format used in Java Certs
PEM Cert Format
Privacy Enhanced Mail
- Base 64 encoded DER (ASCII)
- Format Provided by CA’s
PKCS#12 Cert Format
Public Key Cryptography Standard #12
- Personal Information Exchange (PFX) syntax standard
- Often used in transfer of public and private key pairs
- p12 or pfx file ecxtension
CER Cert Format
Certificate
- Encoded as binary DER or ASCII PEM
- Common format for windows
PKCS#7 Cert Format
- p7b file
- ASCII format
- Private keys not included in p7b file
- Used in Windows and Java Tomcat