Section 3 - Security Engineering & Cryptography Flashcards
What describes the suite of policies and technology tools designed to enable centralized management and control of mobile devices in a corporate setting?
Enterprise Mobility Management (EMM)
What are the difference between Trust and User Specific Certificates
Trust are used to globally identify trusted devices within an organization using a single certificate pushed to multiple devices which is different then specific user based rolled out by a MDM to uniquely identify for granular control
What is a firmware update delivered on a cellular data connection
Over the Air (OTA)
can be exploited - evil base station
What encryption standard does WPA2 use and what does it replace
Advanced Encryption Standard with 128 bit keys
replaced WPA where replacing RC4 and Cipher Block Chaining Message Authentication Code Protocol (CCMP) replacing TKIP
What are the main features of WPA 3
Simultaneous Authentication of Equals (SAE) which was introduced to address vulnerabilities in the WPA-PSK method.
Enterprise authentication uses 192-bit AES while personal uses 128-bit
Updated Cryptographic Protocols - replaced AES CCMP with AES Galois Counter Mode Protocol (GCMP) - high performance mode of operation for symmetric encryption and provided a special characteristic called Authentication Encryption with associated data (AEAD)
Protection Frames to prvent against recovery ttacks
What is WPA3 also called and and what standard is it
Wi-Fi 6 and 802.11ax
What is a standard for peer-to-peer (2-way) radio communications over a very short distance is
Near Field Communication and around 4”
most common application is for contactless payments
Not encrypted so vulnerable
What is a recent attack against Bluetooth
BlueBorne
What is the security control that enforces a virtual boundary based on real world geography
Geofencing
Is DNS communications secure?
No and DNS over HTTPS (DoH) was developed as a response to incidents.
What is the terms for obtaining root privileges in both IOS and Android
Jailbreaking for IOS
Rooting for Android
Is Android or IOS more secure?
IOS and Android allows sideloading to install and app without using an app store
What is the access control that is based on the idea of security clearance
Mandatory Access Control (MAC)
Labels objects and subjects and not changeable by user
What is the process of determining what additional software may be needed installed on a client or server beyond its baseline and what OS is a good example of this
Execution Control
Using a Linux Security Module (LSM)
SELinux
AppArmor - used by Ubuntu
SUSE Linux
Which version of Android is based on Security Enhanced LInux
SEAAndroid
Use MAC
Describe the differences between BIOS (Basic Input/Output System) and UEFI (unified Extensible Firmware Interface)
Both are firmware designed to assist a computer/device boot an OS. BIOS uses a Master Boot Record whereas UEFI used a GUID Partition table. UEFI is more advanced and has more security features such as Secure boot or measure boot.
What is an appliance for generating and storing cryptographic keys
Hardware Security Module (HSM)
FIPS 140-2 provided accreditation for cryptographically strong products
T or F Key management and key use can be incorporated into the same function and cloud location
False - should use a KMS that is being generated separately from cloud provider
What is serverless computing billed on and does this paradigm have risks?
Execution time rather than hourly charges. This is commonly called Function as a Service (FaaS)
New Paradigm and use cases and best practices are not mature
Depends heavily on event-drive orchestration to facilitate operations
AWS Lambda
Google Cloud Functions
Azure Functions
What is the term for provisioning architecture in which deployment of resources is performed by scripted automation and orchestration
Infrastructure as a Code (IaC)
Used for Software Defined Networking
What is an enterprise management system software designed to mediate access to cloud services by users across all types of devices
Cloud Access Security Broker (CASB)
Enable SSO
Scan for Malware, rogue and non-compliant devices
Monitor and audit user and resource activity
Mitigate data exfiltration
What are the 3 implmentation methods of CASB
Forward Proxy - security appliance/host positioned at the client network edge that forwards traffic to the cloud network. users can evade and connect directly
Reverse Proxy - at network edge and can direct traffic in policy is in compliance and does not require configuration on user device but does require cloud application support
API - this is between the cloud service and cloud consumer. works best for post security incidents where inline interception is not possible/desirable. Not in real time such as the above proxy options
What is the name of the practice of splitting encrypted data output into multiple parts which are subsequently stored in disparate locations
Bit or Cryptographic Splitting
What are some examples of Microcontrollers that perform sequential operations from a dedicated instruction set
Application-specific integrated circuits (ASICs) - used for ethernet switching
Field Programmable Gate Array (FPGA) - a processor that can be programmed to perform a specific function by customer than at the time of manufacture
What is the system that practically integrates all components (CPU, RAM, Storage, etc.) into one
System on a Chip (SoC)
Name the components of an Industrial Control Systems
Human Machine Interfaces (HMI) - input/output controls on a PLC allowing users to configure and monitor
Supervisory Contral and Data Acquisition - manages large scale, multi-site devices and equipment spreach over geographically large areas
Programmable Logic Controller (PLC) - form of a digital computer and interact with a wide range of sensors
HVAC
Name the common protocols used by ICS
Controller Area Network - serial network designed to allow communication between embedded PLC - cars are susceptible to attack due to this design using wireless or direct connection
Modbus - component of an ICS and is described as an OT and its protocol
It uses Common Industrial Protocol (CIP) and Distributed network Protocol (DNP3)
Data Distribution Services (DDS) - enables interrogability for connected machines and facilitates scalability, performance, and QoS
Safety Instrumented Systems (SIS) - comprised of sensors, logic solvres and final control elements - horns, flashing lights, and sirens.
What is the function that converts an arbitrary length string to a fixed string output called
Hashing
1. Output is of fixed length regardless of input size
- Same input to a hashing algorithm will generate the same output every time is hashed
- Output of the hashing function cannot be used to recreate the input in any way referred to as one-way function