Sec Two Flashcards
What is a use case?
A goal that an organization wants to achieve
What is confidentiality?
ensuring data is only viewable by authorized users
What is steganography
hiding data inside other data, such as hiding messages inside a picture
What is integrity?
ensuring that data has not been modified, tampered with, or corrupted through unauthorized or unintended changes
What is non-repudiation?
prevents entities from denying they took an action
What is availability?
Ensuring data and services are available when needed
What is risk?
the possibility of a threat exploiting a vulnerability and resulting in loss
What is a threat?
any circumstance or event that has the potential to compromise CIA
What is a vulnerability?
a weakness in hardware, software, configuration, or users operating the system
What is risk mitigation?
Reduces risk by reducing the chances that a threat will exploit a vulnerability or reducing impact of the risk
What are security controls
things that reduce risk, such as antivirus software
What are the 3 primary security control types
technical (implemented w/ tech)
administrative (implemented w/ admin or management methods)
physical (controls you can physically touch)
What are preventive controls
controls that attempt to prevent security incidents
What are detective controls?
controls that attempt to detect when a vulnerability has been exploited
What are corrective controls
controls that attempt to reverse the impact of an incident after it has occurred
What are deterrent controls
controls that attempt to prevent incidents by discouraging threats
what are compensating controls
alternative controls used when it isn’t feasible to use a primary control
what is authentication
allows entities to prove their identity by using credentials known to another entity
what is identification
occurs when a user claims or professes an identity with username, email, PIV, biometrics, etc
What are the five factors of authentication?
something you know (username/password)
something you have (smart card, token)
something you are (fingerprint, retina scan)
somewhere you are (geolocation, MAC address)
something you do (gestures)
What are the open source standards used for one-time passwords?
HOTP - creates OTP that doesn’t expire
TOTP - creates OTP that expires after 30 seconds
What are FAR, FRR, and CER in regards to biometrics?
FAR - false acceptance rate (false positive match)
FRR - false rejection rate (false negative match)
CER - crossover error rate (the point on a sensitivity vs. rate graph where FAR and FRR cross - indicates quality of biometric system)
What is kerberos?
network authentication protocol using tickets issued by KDC or TGT server
What is LDAP?
specifies formats and methods to query directories such as Active Directory. LDAPS encrypts transmissions with SSL or TLS
What is SAML?
an XML based standard used to exchange authentication and authorization info between parties
what is a federated identity?
links a user’s credentials from different networks or OSs, but treats it as one identity
what is shibboleth?
open source federated identity solution
what is OAuth and OpenID Connect?
commonly used authentication solutions allowing users to log on to many web sites with another account
What are the general account management best practices?
- Least privilege
- No account sharing
- Admin should have 2 accounts (one non-admin account)
- Account disablement policy for users that leave
- routinely delete accounts that are no longer needed
What are common access control models?
role-BAC (RBAC) - grants access based on user roles such as jobs, functions, or assigned tasks
- rule-BAC (RBAC) - grants access based on approved instructions such as rules triggered in response to detected attack
- discretionary (DAC) - every object has an owner, that owner can determine everyone else’s access - major flaw is susceptibility to trojan horses
- Mandatory access control (MAC) - uses sensitivity labels to identify objects and users, users with matching labels can access
- attribute-based (ABAC) evaluates attributes and grants access based on the value of the attributes. often used in software-defined networks
Which protocols are used for voice and video?
Real time transport protocol (RTP) and secure real time transport protocol (SRTP) - SRTP provides encryption, message authentication, and integrity
What protocol is commonly used to transfer files over networks?
File transfer protocol (FTP)
What are the encryption protocols used to encrypt data-in-transit?
File Transfer Protocol Secure (FTPS - uses TLS)
Secure File Transfer Protocol (SFTP - uses SSH)
Secure Shell (SSH)
Secure Socket Layer (SSL - Deprecated)
Transport Layer Security (TLS)
What port does SMTP use to send mail?
TCP 25
What port does POP3 use to receive mail?
TCP 110
What port does IMAP4 use?
TCP 143
What port does Secure POP use?
995 (legacy) or with STARTTLS on port 110
What port does IMAP use TLS?
port 993 (Legacy) or with STARTTLS on port 143
What port does HTTP use?
80
what port does HTTPS use?
443
What port does LDAP use?
TCP 389
What port does LDAP secure use?
TCP 636
What port does RDP use?
TCP 3389
What do admins typically use to remote into systems?
SSH or RDP
What does network time protocol (NTP) do?
provides time synchronization services
What does DNS zone A records contain?
IPv4 addresses
What do DNS zone AAAA records contain?
IPv6 addresses
How is DNS Zone data updated?
zone transfers and secure zone transfers
What port does DNS use?
TCP 53 for zone transfers and UDP 53 for DNS Client queries
What is the purpose of DNSSEC?
provides validatin for DNS responses and helps prevent DNS poisoning attacks
What are the command line commands for querying DNS?
nslookup (windows) and dig (Linux)
what does the axfr switch do?
download all zone data from DNS server, unless it is blocked
What do switches do?
map MAC addresses to physical ports
What are two examples of port security?
limiting number of MAC addresses per port, and disabling unused ports
what is an aggregation switch?
connects multiple switches together in a network
What do routers do?
connect networks and direct traffic based on the destination IP address
use rules within access control lists (ACLs) to allow or block traffic
What is implicit deny?
indicates that unless something is explicitly allowed, it is denied. it is the last rule in an ACL
What do network-based firewalls do?
filter traffic in and out of a network
placed on border of network
What is a stateless firewall?
controls traffic between networks using rules within an ACL
What is a stateful firewall?
filters traffic based on the state of a packet within a session
What is a web application firewall?
protects a web server against web application attacks. Typically placed in the DMZ and alerts admins of suspicious activity
What is a demilitarized zone (DMZ)?
provides a layer of protection for servers that are accessible from the internet
typically sits between two different firewalls
What is an intranet?
an internal network used to communicate and share content with each other
what is an extranet?
part of a network that can be accessed by authorized entities from outside the network
What is NAT?
translates public IP addresses to private IP addresses and vice versa
What is an airgap?
a metaphor for physical isolation, indicating a system or network is completely isolated from another system or network
What are forward proxy servers?
forward requests for services from a client
can cache and record users’ internet activity
What is a transparent vs nontransparent proxy server?
transparent accepts and forwards requests without modifying them
nontransparent can modify or filter requests, such as filtering based on the URL
What is a reverse proxy server?
proxy server which accepts traffic from the internet and forwards it to one or more internal servers, then returns the result to the requester
What is a UTM?
unified threat management. a security appliance which includes multiple layers of protection, such as URL filters, content inspection, malware inspection, and DDoS mitigator
What is a mail gateway?
gateway placed between an email server and the internet. examines and analyzes all traffic and can block unsolicited email. may include data loss prevention (DLP) and encryption capabilities
What is loop protection?
protects against switching loop problems, such as when a user connects two switch ports together with a cable.
what protocol protects against loops?
Spanning Tree Protocol (STP)
what are flood guards?
prevent MAC flood attacks on switches
What are VLANs
logically separated computers or logically grouped computers regardless of their physical location. can be created with layer 3 switches
What network device has antispoofing capabilities?
router using rules within ACLs
What is SNMPv3?
used to monitor and configure network devices and uses notification messages known as traps. Uses strong authentication mechanisms and uses UDP ports 161 and 162
Which network device can Linux iptables be configured to replaces?
firewall
What are IDSs and IDPs?
intrusion detection systems and intrusion prevention systems
inspect traffic using the same functionality as a protocol analyzer
What’s the difference between HIDS and NIDS?
HIDS can detect attacks on local systems and protect local resources on the host. Can also detect some malware not detected by traditional antivirus
NIDS detects attacks on the network
How do signature-based IDS/IPS work?
uses a signatures to detect known attacks or vulnerabilities
How do heuristic-based or behavioural IDSs work?
require a baseline and detect attacks based on anomalies or when traffic is outside of expected boundaries compared to the baseline
What’s the difference between an IPS and an active IDS?
IPS is placed inline with traffic while an active IDS is out of band
What is a SSL/TLS accelerator?
dedicated hardware device that handles TLS traffic, allowing other devices to offload TLS traffic
What is an SSL decryptor?
allows an organization to inspect traffic, even when traffic is using SSL or TLS
What is a software defined network?
(SDN) uses virtualization tech to route traffic instead of using hardware routers or switches. separates the data and control planes
What are honeypots/honeynets?
servers that appear to have valuable data in an attempt to divert attackers from live networks. honeynet is a group of honeypots that looks like a full network
can also be used to observe current attack methodologies
What is an 802.1x server?
provides strong port security using port-based authentication. prevents rogue devices from connecting to a network by ensuring only authorized clients can connect
What’s difference between fat AP and thin AP?
fat AP has everything needed to connect wireless clients to wireless network.
thin AP is controller-based. multiple thin APs are typically configured and managed by one controller
What is a weakness of MAC filtering?
attackers can easily discover authorized MACs and spoof an authorized MAC address
how do directional antennas differ from omnidirectional antennas?
they have narrower beams and longer ranges
What is an ad hoc wireless network?
network set up between two or more devices connected together without an AP
what encryption protocol does WPA use?
TKIP (temporal key integrity protocol)
what encryption protocol does WPA2 use?
counter mode cipher block chaining message authentication code protocol (CCMP) which is based on AES
what protocol do 802.1x servers use?
one of the extensible authentication protocol (EAP) versions such as Protected EAP (PEAP), EAP Tunneled TLS (EAP-TTLS), EAP-TLS, or EAP-Flexible Authentication via Secure Tunneling (EAP-FAST)
Which EAP version is most secure?
EAP-TLS - requires a certificate on the server and each of the wireless clients
PEAP and EAP-TTLS only require certificate on the server
PEAP is often implemented with MS-CHAPv2
LEAP is proprietary to Cisco and does not require a certificate. EAP-FAST replaces LEAP
What is a captive portal?
forces wireless clients to complete a process such as acknowledging a policy or paying for access before being granted access to the network
What is a dissociation attack?
effectively removes a wireless client from a wireless network, forcing it to reauthenticate
What is WPS?
allows users to set up a WAP to allow access by pressing a button or entering a short PIN. WPS PINs can be discovered within hours and are not secure. The PIN can then be used to discover the passphrase
What is a rogue AP?
an AP placed within a network without official authorization.
what is an evil twin?
a rogue AP with the same SSID as a legitimate access point
What is a jamming attack?
floods a wireless frequency with noise, blocking wireless traffic
what is an IV attack?
initialization vector attack. Attempts to discover the IV and uses it to discover the passphrase. WPA2 isn’t susceptible to an IV attack
What is an NFC attack?
near field communication attack. uses an NFC reader to read data from mobile devices
What is bluejacking?
the practice of sending unsolicited messages to a phone
What is bluesnarfing?
the unauthorized access to, or theft of information from, a bluetooth device
What is a wireless replay attack?
an attacker captures data sent between two entities, modifies it, and then impersonates one of the parties by replaying the data. WPA2 using CCMP and AES prevents wireless replay attacks
What is RFID attack?
radio frequency identification attack. includes eavesdropping, replay, and DoS
What is a vpn?
provides secure access to private networks via a public network, such as the internet.