Objective 1.2 Flashcards

Summarize fundamentals security concepts

1
Q

CIA Triad

A

C - Confidentiality
I - Integrity
A - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ensures that information is only accessible to those with the appropriate authorization. (Ex: encryption)

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

\\\\\\\\\\\\\\\\\\

Ensures the data remains accurate and unaltered unless modification is required. (Ex: checksums, hashing)

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensures that information resources are accessible and functional when needed by authorized users. (ex: website up and running all the time regardless the traffic it’s receiving.)

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 new elements to CIA triad making it a pentagon

A

N - Non-repudiation
A - Authentication
CIANA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Guaranteeing that specific action or event has taken place and cannot be denied by the parties involved. (Ex: A digitally signed email. That’s going to ensure that I cannot deny sending you that particular message because my digital signature is attached to it)

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Process of verifying the identity of a user or system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of verifying the identity of a user or system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Defines what actions or resources a user can access.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Act of tracking user activities and resources usage, typically for audit or billing purpose.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Controls Categories

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of Security Controls

A

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ZeroTrust: ???

Consists of adaptative identity, threat scope reduction, policy-driven access control, and secured zones.

A

.ZeroTrust: Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ZeroTrust: ???

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.

A

ZeroTrust: Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Confidentiality importance

A
  1. Protect personal privacy
  2. Maintaint a business advantage
  3. Achieve a regulatory compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

5 methods to achieve CONFIDENTIALITY

A
  1. Encryption
  2. Access Control
  3. Data Masking
  4. Physical Secutiry Measures
  5. Training and Awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ensure only authorized personnel can access certain types of data

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Process of converting data into code to prevent unathorized access

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Method that involves obscuring data within a database to make it inacessible for unauthorized users while retaining the real data’s authencity and use for authorized users.

A

Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.

A

Physical Security Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Conduct regular training on the security awareness best practices that employees can use to protect the organization’s sesitive data.

A

Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

most important thing linked to Confidentiality

A

ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Integrity importance

A
  1. Ensure DATA ACCURACY
  2. Maintain TRUST
  3. Maintain SYSTEM OPERABILITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

5 methods to achieve INTEGRITY

A
  1. Hashing
  2. Digital Signatures
  3. Checksums
  4. Access Controls
  5. Regular Audits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Process of converting data into fixed-size value.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

most important thing linked to Integrity

A

HASHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

[Hashing] The result of hashing function is called…

A

Hash Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

[Hashing] The Hash Digest will almost serve like a…

A

Digital Fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Use encryption to ensure integrity and authencity.

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

[Digital Sign.] How is the process of digitally sign a file?

A
  1. Hash the file (Integrity)
  2. Hash Digest is Encrypted using users private key (Authencity)

Now this data is digitally signed and any alterations in the file will drastically change the file’s hash, wich in turn, would invalidate that digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Method to verify the integrity of data during transmission

A

Checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.

A

Regular Audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Availability importance

A
  1. Ensure business continuity.
  2. Maintaining customer trust.
  3. Upholding an organization’s reputation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

most important thing linked to Availability

A

REDUNDANCY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

4 methods to achieve AVAILABILITY

A
  1. Server Redundancy
  2. Data Redundancy
  3. Network Redundancy
  4. Power Redundancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Involves using multiple servers in a load balancer so that if one is overloaded or fails, the other servers can take over the load to continue supporting end users.

A

Server Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Involves storing data in multiple places.

A

Data Redundancy

42
Q

Ensures if one network path fails, the data can travel through another route.

A

Network Redundancy

43
Q

Involves using backup power sources – like generations and uninterrupted powersupplies – to ensure that an organization’s systems remain operational during periods of power disruption or outages within a local service area.

A

Power Redundancy

44
Q

Non-repudiation importance

A
  1. Confirming authenticity of digital transactions.
  2. Ensuring integrity.
  3. Providing accountability.
45
Q

most important thing linked to Non-repudiation

A

DIGITAL SIGNATURES

46
Q

Authentication methods

A
  1. smth you know
  2. smth you have
  3. smth you are
  4. smth yo do
  5. swh you are
47
Q

Relies on information that a user can recall.

A

Smth you know (Knowledge Factor)

48
Q

Relies on the user presenting a physical item to autheticate themselves.

A

Smth you have (Possession Factor)

49
Q

Relies on the user providing a unique physical or behaviorial characteristic of the person to validate that they are who they claim to be.

A

Smth you are (Inherence Factor)

50
Q

Relies on the user conducting a unique action to prove who they are.

A

Smth you do (Action Factor)

51
Q

Relies on the user being in the certain geographic location before access is granted.

A

Swh you are (Location Factor)

52
Q

2 autentication methods.

A

2FA - Two Factor Authentication

53
Q

2 or more autentication methods.

A

MFA - Multi Factor Authentication

54
Q

Importance of Authentication

A
  1. Prevent unauthorized access.
  2. Protect user data privacy.
  3. Ensure resource validity.
55
Q

most important thing linked to Authentication

A

MFA - Multi Factor Authentication

56
Q

[Authetication] Knowledge Factor

A

Smth you know
Ex: login and password.

57
Q

[Authetication] Possession Factor

A

Smth you have
Ex: OTP (One Time Password)

58
Q

[Authetication] Inherence Factor

A

Smth you are
Ex: Iris or fingerprint.

59
Q

[Authetication] Action Factor

A

Smth you do
Ex: handwriten samples.

60
Q

[Authetication] Location Factor

A

Swh you are
Ex: Just open the door if you are within 20meters.

61
Q

Which are the types of Authorization mechanisms controls?

A
  • role-based
  • rule-based
  • attribute-based
62
Q

Importance of Authorization

A
  1. Protect sesitive data
  2. Maintain system integrity in organizations
  3. Create more streamlined user experiences
63
Q

Importance of ACCOUNTING

A
  1. Logging into the system
  2. Accessing files
  3. Modifying configuration settings
  4. Downloading or installing software
  5. Attempting unauthorized actions on systems and networks
64
Q

5 things to a robust audit system

A
  1. Audit Trail
  2. Regulatory Compliance
  3. Forensic Analysis
  4. Resource Optimization
  5. User Accountability
65
Q

[Accounting] Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a specific user or point in time.

A

Audit Trail

66
Q

[Accounting] Maintains a comprehensive record of all the users’ activities.

A

Regulatory Compliance

67
Q

[Accounting] Uses detailed accounting and event logs that can help cybersecurity experts understand what happened , how it happened, and how to prevent similar incidents from ocurring again in the future.

A

Forensic Analysis

68
Q

[Accounting] Organization can ……….. system performance and minimize costs by tracking ……….. utilization and allocation decisions.

A

Resource Optimization

69
Q

[Accounting] Thorough accounting system ensures users’ actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies.

A

User Accountability

70
Q

Tools related to Accountability

A
  • Syslog servers
  • Network analysis tools
  • SIEMs (Security Information and Event Management systems)
71
Q

CIA Triad

A

C - Confidentiality
I - Integrity
A - Availability

72
Q

2 new elements to CIA triad making it a pentagon

A

N - Non-repudiation
A - Authentication
CIANA

73
Q

most important thing linked to Confidentiality

A

ENCRYPTION

74
Q

most important thing linked to Integrity

75
Q

most important thing linked to Availability

A

REDUNDANCY

76
Q

most important thing linked to Non-repudiation

A

DIGITAL SIGNATURES

77
Q

most important thing linked to Authentication

A

MFA - Multi Factor Authentication

78
Q

Deception and Disruption Technologies

A
  • Honeypots
  • Honeynets
  • Honeyfiles
  • Honeytoken
79
Q

Decoy systems or servers designed to attract and deceive potential attackers, simulating real-world IT assets to study their techniques.

80
Q

Creates an entires network of decoy systems to observe complex, multi-stage attacks.

81
Q

Decoy files placed within systems to detect unauthoried access or data breaches.

A

Honeyfiles

82
Q

Fake pieces of data, like a fabricated user credential, inserted into databases or systems to alert administrators when they are accessed or used.

A

Honeytoken

83
Q

How could I learn from the different threat actors that are your network is to set up an utilized DECEPTION and DISRUPTION technologies, like?

A
  • Honeypots
  • Honeynets
  • Honeyfiles
  • Honeytokens
84
Q

The DECEPTION and DISRUPTION technologies will log, monitor and track threat actors so that we can learn about their…… ?

A

Tactics, techniques and procedures. (TTPs)

85
Q

Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.

A

Deceptive and Disruption Technologies

86
Q

Decoy system or network set up to attract potential hackers. Can also be used against insider threats to detect internal fraud, snooping, and malpractice.

87
Q

Must be placed within a screened subnet or isolated segment that is easily accessed by potential attackers.

88
Q

Network of honeypots to create a more complex system that is designed to mimic an entire network of systems, including servers, routers, and switches. Also logs all activities to provide a wealth of data about successful and unsuccessful atacks.

89
Q

Have risks that the attacker could use to learn how production systems are configured

A

Honeypots and honeynets

90
Q

Decoy file placed within a system to lure potential attackers. Are typically embedded with unique identifiers or watermarks to help track if it is stolen or copied, and it is usually placed under loose or less strict defenses that files that contain sensitive data might have.

A

Honeyfiles

91
Q

Kind of files that can be used as a honeyfiles:

A
  • Word-processing documents
  • Spreadsheets
  • Presentation files
  • Images
  • Database files
  • Executables
92
Q

Piece of data or a resource that has no legitimate value or use but is monitored for access or use. Useful for detecting insider threats.

A

Honeytokens

93
Q

An windows systems account deployed as ‘admin’ or ‘root’ just to monitor if a user would log into that account. Considering no legitimate user would ever log into that account, what kind of deception and disruptive technology we are talking about?

A

Honeytoken

94
Q

Other Deceptive and Disrution Technologies:

A
  • Using bogus DNS entries
  • Creating decoy directories
  • Generating dynamic page
  • Using port triggering
  • Spoofing fake telemetry data
95
Q

Fake DNS entries introduced into a system’s DNS server

96
Q

Fake folders and files placed within a system’s storage

A

Decoy Directories

97
Q

Used in websites to present ever-changing content to web crawlers to confuse and slow down the threat actor.

A

Dynamic Page Generation

98
Q

Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected

A

Port Triggering

99
Q

System can respond to an attacker’s network scan attempt by sending out fake data.

A

Fake Telemetry Data

100
Q

Prevent people from accessing your facilities

101
Q

Prevent vehicles from getting too close to your facilities