N10-009-Section_4 Flashcards

1
Q

Data in Transit/Motion

A

Data in Transit refers to the process of securing data as it is transmitted between systems, devices, or networks. Usually referred to in the context of security and how to encrypt said data while it’s in motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data at Rest

A

Data at Rest refers to the process of securing stored data by encrypting it to protect it from unauthorized access, theft, or breaches when it is not actively being transmitted or used. This includes data stored on devices such as servers, hard drives, SSDs, USB drives, or cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PKI

A

PKI (Public Key Infrastructure) is a framework (policies, procedures, hardware, software, people) used to manage digital certificates and public-key encryption, enabling secure communication and authentication over networks. Uses key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CA

A

Certificate Authority - A third party that is trusted to sign digital certificates - this is a public entity that is not within your org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM

A

IAM (Identity and Access Management) is a framework of policies, processes, and technologies used to manage digital identities and control access to resources within an organization. It ensures the right individuals have access to the right resources at the right times, while keeping unauthorized access at bay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Least Privilege

A

Users only have the minimum access they need to perform job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RBAC

A

Role-based Access Control. Users are in groups that give them permissions to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Geofencing

A

Geofencing, refers to the use of virtual boundaries, defined by GPS or RFID technology, to control or monitor network access, device usage, or services based on a specific geographic location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identification

A

Part of Authentication. Keeping track of who is who. Who you are, your username/email - this is public information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication

A

Goes hand in hand with Identification. The act of proving you are who you say you are. password, or other MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorization

A

Based on who you, what access do you have?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accounting

A

Resources used, login time, data sent and received, logout time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RADIUS

A

Remote Authentication Dial-in User Service. An AAA protocol supported on many platforms to centralize authentication for users. Can be used for server authentication, routers, switches, firewalls, Remote VPN access, 802.11X network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LDAP

A

Lightweight Directory Access Protocol. Protocol for reading and writing directories over an IP network. Uses the X.500 standard (a directory standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

X.500

A

A standard for organizing directories. Uses attribute=value pairs. CN=Common Name, OU=Organizational Unit and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Container Objects

A

In an X.500 directory, Container Objects store and organize Leaf Objects. An OU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Leaf Objects

A

In an X.500 directory, Leaf Objects represent the users, computers, printers and files themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SAML

A

Security Assertion Markup Language. An open standard for authentication and authorization. Manifests as a service itself that provides authentication to other services. The SAML service will authenticate the user, then pass a SAML assertion to the service provider of the service the user is trying to access. SAML is used a lot when using SSO for web-apps. SAML was not built for mobile devices and is weak in this area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TACACS

A

Terminal Access Controller Access Control System. A remote authentication protocol originally created to control access to dial-up lines to ARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TACACS+

A

Terminal Access Controller Access Control System Plus. The latest version of TACACS. Usually associated with Cisco products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TOTP

A

Time-based One-time Password - random code that changes every few seconds for authentication. Generated from a secret key and the time of day (or something like that). Not really random, both the server and the client have synchronized clocks and the secret key so they will generate the same code at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Honeypot

A

A host designed to be enticing for hackers to try and hack. Hackers can reveal vulnerabilities so the network admins can put preventative measures in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Honeynet

A

A network of honeypots. This will look more “real” to an attacker. Contains servers, workstations, routers, switches etc�

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Risk

A

An exposure to harm or danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Threat

A

Threat: The potential danger. A threat is any potential danger that could harm or disrupt an organization’s network, data, or resources. Threats can come from various sources, including malicious attackers (hackers), natural disasters (such as floods or fires), or even internal users (whether intentional or accidental). In essence, a threat is anything that poses a risk to the confidentiality, integrity, or availability of network resources.

27
Q

Vulnerability

A

Vulnerability: The weakness that could be targeted. A vulnerability is a weakness or flaw in a system, network, software, or process that could be exploited by a threat. Vulnerabilities could exist in outdated software, poor network configurations, weak passwords, or unpatched systems. If a vulnerability is not addressed, it increases the likelihood that a threat could compromise the system or network.

28
Q

Exploit

A

Exploit: The action taken to use the vulnerability maliciously. An exploit is the specific method or technique used to take advantage of a vulnerability in order to carry out an attack. Exploits are often developed by attackers to bypass security controls and gain unauthorized access, manipulate data, or disrupt services. Examples of exploits include malware, phishing attacks, or specially crafted software designed to trigger a vulnerability.

29
Q

CIA

A

Confidentiality, Integrity, Availability. Sometimes (ICA)

30
Q

Confidentiality

A

Prevent disclosure of information to unauthorized individuals or systems

31
Q

Integrity

A

Ensure data remains un-edited when sent across a network (unless there is some kind of detection in place)

32
Q

Availability

A

Data needs to be available for access when its needed

33
Q

Data Localization

A

Any data from a region or country must be stored within that region or country

34
Q

PCI DSS

A

PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment. It was created by the Payment Card Industry Security Standards Council (PCI SSC) to protect cardholder data and prevent fraud.

35
Q

GDPR

A

GDPR (General Data Protection Regulation) is a comprehensive data protection law enacted by the European Union (EU) to regulate the collection, storage, and use of personal data of individuals within the EU. It went into effect on May 25, 2018, and applies to any organization, regardless of location, that processes the personal data of EU residents.

36
Q

List the 6 Control Objectives of PCI DSS

A

1 Build and maintain a secure network and systems, 2 Protect cardholder data, 3 Maintain a vulnerability management program, 4 Implement strong access control measures, 5 Regularly monitor and test networks, 6 Maintain an information security policy

37
Q

SCADA

A

Supervisory Control and Data Acquisition, Designed for long distance stuff like Oil piplines or railways. ICS systems need to be more ready to control cause it may take time before a human can get onsite and interact, SCADA has a remote terminal unit (not used in traditional ICS)

38
Q

OT

A

Operational Technology. Hardware and software for industrial equipment. Electric Grids, traffic lights, manufacturing plants

39
Q

DoS

A

Denial of Service, forces a service to fail

40
Q

Friendly DoS

A

Unintentional DoSing. Layer 2 loop without STP, downloading a large file on a limited bandwidth connection

41
Q

DDoS

A

Distributed Denial of Service. Attack from a large botnet

42
Q

Asymmetric Threat

A

When a hacker/attacker has fewer resources than the victim

43
Q

DDoS Reflection and Amplification

A

An attacker uses a protocol with a small bit of a data. Example, a botnet could send a simple DNS query packet, the DNS server response is much larger than the initial packet, the botnet is also spoofing the source address so the DNS server responses flood back to the web-server (the spoofed address)

44
Q

Switch Spoofing

A

One way to VLAN hop. Some switches are configured to detect a connection from another switch and automatically set up a trunk port. In this case, a bad switch could be plugged in and then have VLAN traffic sent to itself or another malicious clients. Could also be some device impersonating a switch.

45
Q

Double Tagging

A

An extra VLAN tag is placed on packets so when that packet is stripped of its VLAN tag as it passes through the switch, it has the VLAN tag of a VLAN it didn�t come through, then the switch will send that packet on to the “wrong” VLAN. Requires that the attacker know the Native VLAN

46
Q

MAC Flooding

A

An attacker will send a ton of frames to a switch and change its MAC address each time. This will quickly fill up the MAC table on the switch. When a MAC table is full on a switch, the switch just forwards the frames to everything its connected to. Effectively turns the switch into a hub. The attacker can then capture all traffic sent to the switch. Usually there are settings on the switch to prevent flooding from a single interface (switch port)

47
Q

ARP Poisoning (Spoofing)

A

An attacker will send an unsolicited ARP response to the victim saying “I’m 192.168.1.1” (the router). The victim will accept this response and remove the old MAC for the real router from its ARP cache

48
Q

DNS Poisoning

A

An attacker could modify the host file on the client, the host file takes priority over the DNS server, or could hack into the DNS server and change the IP address for certain records. The DNS server will then redirect traffic to the attackers computer.

49
Q

DHCP Snooping

A

A feature on higher-grade switches. Has a list of all known-good MAC addresses for DHCP clients, If an unknown MAC starts sending the DHCP server messages, the server can block it

50
Q

Rogue AP

A

Unauthorized AP plugged into a network. Can give unauthorized access to a network

51
Q

802.11X

A

Network Access Control. Requires clients to authenticate, regardless of the connection type. Could prevent rogue ap connection

52
Q

Evil Twin

A

A Rogue AP with the same SSID as a legitimate network to fool people into connecting - when they are connected you can packet sniff and whatever else. The clients can still access the internet and won’t know the difference. Wireless Evil Twin’s can overpower their antennas to entice clients by using a stronger signal

53
Q

On-Path Attack

A

Man in the middle, Session highjacking, HTTPS Spoofing, WiFi Eavesdropping, ARP poisoning. Encrypting fixes most of these attacks

54
Q

Virus (What makes it different from other malware)

A

Malware that requires human interaction to replicate

55
Q

Worm (What makes it different from other malware)

A

Malware that does not require human interaction to replicate. More dangerous than Virus

56
Q

Rootkit

A

Malware that can hide in the OS itself. Very hard to find and remove

57
Q

Logic Bomb

A

A logic bomb is a type of malicious code or software that triggers a harmful action when specific conditions are met, such as a particular date, time, or action within a system. Unlike other malware that might immediately execute upon entering a system, a logic bomb remains dormant until the specified condition activates it.

58
Q

Trojan

A

Malware that is disguised as legitimate software

59
Q

Port Security

A

Many switches will have the option to auto-disable the port if an unknown MAC is plugged in

60
Q

NAC

A

Network Access Control. You can’t communicate unless you’ve authenticated. This can be applied to more than just WiFi Networks. Switch Interfaces/Ports

61
Q

ACL

A

Access Control List. Allow or disallow traffic based on rule that can be based on MAC addresses, IP addresses, Port numbers, time of day, etc..

62
Q

NGFW

A

Next Generation Firewall

63
Q

Screened Subnet

A

Formerly known as a DMZ

64
Q

Security Zones

A

Firewall configuration. Zoned based security technology. More flexible and secure than IP address ranges. Each area of the network is associated with a zone. Trusted, untrusted, internal, external