Securing against Threats (Ch. 5,6,7) Flashcards

1
Q

VM escape

A

_ attack on host system from within a virtual guest system (running on the host)
_ protect by keeping host system up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VM sprawl

A

_ when VMs are spun up and forgotten
_ don’t get patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

endpoint

A

_ a computing device on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EDR

A

_ endpoint detection and response
_ monitors endpoints for threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

XDR

A

_ extended detection and response
_ more comprehensive than EDR
_ extends security to cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPS

A

_ host intrusion prevention system
_ prevents intrusion on a single endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure baseline

A

_ known secure starting image for a system
_ maintained over time
_ facilitates deployment of new installations
_ can check systems for deviations from baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FDE

A

_ full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SED

A

_ self-encrypting drive
_ aka hardware-based FDE drive
_ credentials created upon setting up drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UEFI

A

_ replacement for BIOS
_ can boot from large disks
_ CPU-independent
_ stored on firmware
_ overwritable with flashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TPM

A

_ trusted platform module
_ chip on motherboard that stores cryptographic keys
_ secures boot process
_ most computers have them
_ can be used to encrypt disk
_ contains a burned-in endorsement key
_ can store additional keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HSM

A

_ hardware security module
_ peripheral for storing cryptographic keys
_ provides security methods of TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EOL

A

_ end-of-life (hardware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DLP

A

_ data loss prevention
_ can prevent use of USB flash drives
_ can block unauthorized data transfers
_ can examine content for terms that can’t be exported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secure enclave

A

_ aka trusted execution environment (TEE)
_ uses hardware to provide an isolated system for processing sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PaaS vs IaaS

A

_ PaaS provides OS and apps, fully managed
_ IaaS provides hardware (perhaps virtual), customer installs and manages the OS and up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

XaaS

A

_ anything as a service
_ umbrella term that refers to the delivery of products, services, or resources as a service over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Multi-cloud system

A

_ uses multiple cloud providers
_ increases resiliency and redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hybrid cloud system

A

_ partly public, partly private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DLP

A

_ data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MSSP

A

_ managed security service provider
_ provided by a third party
_ can be an appliance
_ patch management
_ vulnerability scanning
_ spam/virus filtering
_ data loss prevention (DLP)
_ VPN
_ proxy services for filtering the web
_ IDS and IPS
_ UTM appliances
_ next-generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MSP

A

_ managed service provider
_ doesn’t just focus on security, but IT generally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSP

A

_ cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CASB

A

_ cloud access security broker
_ runs between an organization’s network and the cloud provider
_ monitors traffic and enforces security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cloud-based DLP
_ cloud-based data-loss prevention _ implements policies for cloud-based data _ e.g. detect PII or PHI, blocking and sending alerts
26
SWG
_ secure web gateway _ proxy server + stateless firewall _ typically cloud-based _ URL filtering to block unauthorized sites _ packet monitoring for malicious traffic _ malware detection and filtering
27
Security group
_ means by which a firewall on a virtual cloud network allows you to specify your customer-specific security rules _ customers can’t change firewall directly or cloud security rules directly because this would affect other customers
28
IaC
_ infrastructure as code _ managing data centers with code defining VMs and virtual networks _ allows for script-based management
29
Data plane
_ logic that forwards or blocks traffic
30
Control plane
_ logic that identifies path for data to take
31
SDN
_ software-defined networking _ uses virtual technology to route traffic instead of using hardware routers and switches _ common in cloud solutions _ separates data and control planes
32
Edge computing
_ storing and processing data close to the devices that generate and use the data _ typically stores and processes data on a single node
33
Fog computing
_ using networks at the edge
34
CSA
_ cloud security alliance _ non-profit promoting cloud best practices
35
Mobile device
_ smartphone or tablet _ has a full operating system _ excludes laptops because they don’t include GPS _ excludes most IoT for lacking an OS
36
COPE
_ corporate-owned, personally enabled _ mobile device policy _ employees are free to use devices for personal purposes
37
BYOD
_ bring your own device _ must comply with corporate policies to connect to network
38
CYOD
_ choose your own device _ company provides list of acceptable devices
39
MDM
_ mobile device management _ ensures devices have security controls in place _ at a minimum, blocks jailbroken Apple devices or rooted Android devices _ assigns unique IDs to the endpoints
40
UEM
_ unified endpoint management _ vendor-provided solution _ keeps devices up-to-date with patches _ provides anti-virus _ secured by standard practices
41
Mobile device containerization
_ runs corporate app in a container on device _ isolates app from device _ container is encrypted
42
geofencing
_ establishes a geographical fence _ corporate apps might only run within the fence or only connect to network within the fence
43
jailbreaking
_ removing all software restrictions form an Apple device _ can thereafter install software from 3rd party sources
44
rooting
_ gives user root-level access to an Android device
45
OTA
_ over-the-air software updates
46
tethering
_ sharing a device’s mobile Internet connection with other devices _ can be used to bypass corporate firewalls and proxy servers
47
Wi-Fi Direct
_ local wireless network among devices _ not connected to the Internet
48
SoC
_ system-on-chip _ many components of a computer on a single chip
49
Embedded system security
_ limited power limits use of cryptography _ often not possible to patch
50
APT
_ advanced persistent threat _ organized group of threat actors targeting organizations _ typically sponsored by nation-states
51
Threat vector
_ path attacker uses to gain access to computers and networks
52
Shadow IT
_ unauthorized systems or apps in an organization _ can include cloud services
53
virus
_ malware that runs when the host app runs (by virtue of being added to the app)
54
worm
_ self-replicating malware that travels through a network without the assistance of a host app or user _ can greatly slow network bandwidth
55
Logic bomb
_ event-initiated malware found in an app or script
56
scareware
_ a form of trojan scares users into downloading _ e.g. “virus detected, download anti-virus now”
57
rootkit
_ provides root access to a system _ can manage hooks so that anti-virus won’t detect _ RAM inspection tools can discover them
58
Potential indicators of malware
_ extra traffic _ data exfiltration _ encrypted traffic _ traffic to specified IPs _ outgoing spam (lots of email)
59
Access vestibule
_ aka mantrap _ physically guarded buffer between secure and unsecured areas
60
Watering hole attack
_ places malware on websites the targeted people are likely to visit
61
BEC
_ business email compromise _ exploits trust in high-level executives _ requests info recipient should not send
62
elicitation
_ social engineering techniques for getting information without asking for it directly _ e.g. make false statements to be corrected _ e.g. “bracket” – asserting ranges of numbers, awaiting correction
63
pretexting
_ attacker makes of a convincing story to manipulate target into providing info or granting access _ can be detailed and well-researched
64
Spear phishing
_ targets a specific group or individual _ digital signatures can discourage
65
whaling
_ spear fishing that targets high-level executives
66
vishing
_ voice message left asking you to call, whereupon it asks you to confirm your identity _ can also call directly and ask for identifying info
67
smishing
_ phishing via text instead of email
68
File integrity monitor
_ periodically checks files against saved hashes
69
OSINT
_ open-source intelligence _ info available to general public
70
TAXII
_ trusted automated eXchange of intelligence information _ open standard for exchanging messages that share info _ used to share cyber-threat info
71
STIX
_ structured threat information eXpression _ open standard identifying cyber threat info that organization should share _ provides a common language for use with TAXII
72
Dark web
_ alt Internet requiring credentials to access _ criminal marketplace
73
IoC
_ indicator of compromise
74
Threat map
_ visual representation of active threats _ shows replays of recent attacks
75
Reflected DDoS
_ Sends request to third party _ Spoofs the return address _ Third party sends response to the spoofed address
76
Amplified DDoS
_ a reflected DDoS attack in which the third party’s response is large, producing greater volume
77
On-path attack
_ aka man-in-the-middle attack _ forwards traffic between two target computers _ used for eavesdropping, interrupting traffic, or inserting malicious code _ SSH is subject to attack, but only if warnings are ignored _ Upon creating keys, SSH creates “fingerprints”, which are verified on every subsequent connection, issuing warnings if they don’t match
78
SSL stripping
_ changes an HTTPS connection into HTTP _ also applies to TLS _ HTTP connections are set up in the clear and can be intercepted and manipulated during initialization
79
Pharming attack
_ as with DNS poisoning, directs user to a false website _ but this attack occurs on the user’s system, not on the server _ e.g. modifies “hosts” file
80
DNS filtering
_ controls what websites users can visit
81
DNS sinkhole
_ a DNS server that refuses to forward to certain sites _ used by authorities to take down access to sites
82
TOCTOU
_ time of check to time of use race condition _ aka state attack _ attack tries to accomplish something between the time the system verifies that a target is allowed to do something and the system doing that something (e.g. between DAC check and DAC action)
83
OWASP recommended HTTP headers
_ applies to response headers _ HTTP Strict-Transport-Security – tells browser to only display page if it was sent via HTTPS _ Content-Security-Policy – what to expect in content _ X-Frame-Options – whether X-frames are allowed (X-frames aren’t used any more due to vulnerabilities)
84
Secure cookie
_ can only be sent over HTTPS
85
SQLi
_ SQL injection attack
86
Memory injection
_ taking advantage of buffer overflows to inject code into memory
87
DLL injection
_ attacker puts a DLL into system memory and causes it to run
88
LDAP injection
_ extends an LDAP query
89
XML injection
_ embeds XML in data intended for embedding in XML _ often used to create additional accounts by injecting new account data
90
Directory traversal attack
_ adds traversal to a filename to access a different file
91
Cross-site scripting
_ injects scripts into web pages
92
Reflected XSS
_ aka non-persistent XSS _ URL embedded in email or website _ clicking on URL opens page with malicious code
93
Stored XSS
_ aka persistent XSS _ malicious code stored in database or web page
94
User provisioning
_ automated process of creating, updating, and removing user accounts and permissions _ reduces mistakes _ improves reaction time _ applies principle of least privilege
95
Resource provisioning
_ automating creation, configuration, and removal of resources _ reduces mistakes _ improves reaction time