Securing against Threats (Ch. 5,6,7) Flashcards

1
Q

VM escape

A

_ attack on host system from within a virtual guest system (running on the host)
_ protect by keeping host system up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VM sprawl

A

_ when VMs are spun up and forgotten
_ don’t get patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

endpoint

A

_ a computing device on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EDR

A

_ endpoint detection and response
_ monitors endpoints for threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

XDR

A

_ extended detection and response
_ more comprehensive than EDR
_ extends security to cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPS

A

_ host intrusion prevention system
_ prevents intrusion on a single endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure baseline

A

_ known secure starting image for a system
_ maintained over time
_ facilitates deployment of new installations
_ can check systems for deviations from baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FDE

A

_ full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SED

A

_ self-encrypting drive
_ aka hardware-based FDE drive
_ credentials created upon setting up drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UEFI

A

_ replacement for BIOS
_ can boot from large disks
_ CPU-independent
_ stored on firmware
_ overwritable with flashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TPM

A

_ trusted platform module
_ chip on motherboard that stores cryptographic keys
_ secures boot process
_ most computers have them
_ can be used to encrypt disk
_ contains a burned-in endorsement key
_ can store additional keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HSM

A

_ hardware security module
_ peripheral for storing cryptographic keys
_ provides security methods of TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EOL

A

_ end-of-life (hardware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DLP

A

_ data loss prevention
_ can prevent use of USB flash drives
_ can block unauthorized data transfers
_ can examine content for terms that can’t be exported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secure enclave

A

_ aka trusted execution environment (TEE)
_ uses hardware to provide an isolated system for processing sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PaaS vs IaaS

A

_ PaaS provides OS and apps, fully managed
_ IaaS provides hardware (perhaps virtual), customer installs and manages the OS and up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

XaaS

A

_ anything as a service
_ umbrella term that refers to the delivery of products, services, or resources as a service over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Multi-cloud system

A

_ uses multiple cloud providers
_ increases resiliency and redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hybrid cloud system

A

_ partly public, partly private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DLP

A

_ data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MSSP

A

_ managed security service provider
_ provided by a third party
_ can be an appliance
_ patch management
_ vulnerability scanning
_ spam/virus filtering
_ data loss prevention (DLP)
_ VPN
_ proxy services for filtering the web
_ IDS and IPS
_ UTM appliances
_ next-generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MSP

A

_ managed service provider
_ doesn’t just focus on security, but IT generally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSP

A

_ cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CASB

A

_ cloud access security broker
_ runs between an organization’s network and the cloud provider
_ monitors traffic and enforces security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cloud-based DLP

A

_ cloud-based data-loss prevention
_ implements policies for cloud-based data
_ e.g. detect PII or PHI, blocking and sending alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SWG

A

_ secure web gateway
_ proxy server + stateless firewall
_ typically cloud-based
_ URL filtering to block unauthorized sites
_ packet monitoring for malicious traffic
_ malware detection and filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Security group

A

_ means by which a firewall on a virtual cloud network allows you to specify your customer-specific security rules
_ customers can’t change firewall directly or cloud security rules directly because this would affect other customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IaC

A

_ infrastructure as code
_ managing data centers with code defining VMs and virtual networks
_ allows for script-based management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Data plane

A

_ logic that forwards or blocks traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Control plane

A

_ logic that identifies path for data to take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

SDN

A

_ software-defined networking
_ uses virtual technology to route traffic instead of using hardware routers and switches
_ common in cloud solutions
_ separates data and control planes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Edge computing

A

_ storing and processing data close to the devices that generate and use the data
_ typically stores and processes data on a single node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Fog computing

A

_ using networks at the edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CSA

A

_ cloud security alliance
_ non-profit promoting cloud best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Mobile device

A

_ smartphone or tablet
_ has a full operating system
_ excludes laptops because they don’t include GPS
_ excludes most IoT for lacking an OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

COPE

A

_ corporate-owned, personally enabled
_ mobile device policy
_ employees are free to use devices for personal purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

BYOD

A

_ bring your own device
_ must comply with corporate policies to connect to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CYOD

A

_ choose your own device
_ company provides list of acceptable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

MDM

A

_ mobile device management
_ ensures devices have security controls in place
_ at a minimum, blocks jailbroken Apple devices or rooted Android devices
_ assigns unique IDs to the endpoints

40
Q

UEM

A

_ unified endpoint management
_ vendor-provided solution
_ keeps devices up-to-date with patches
_ provides anti-virus
_ secured by standard practices

41
Q

Mobile device containerization

A

_ runs corporate app in a container on device
_ isolates app from device
_ container is encrypted

42
Q

geofencing

A

_ establishes a geographical fence
_ corporate apps might only run within the fence or only connect to network within the fence

43
Q

jailbreaking

A

_ removing all software restrictions form an Apple device
_ can thereafter install software from 3rd party sources

44
Q

rooting

A

_ gives user root-level access to an Android device

45
Q

OTA

A

_ over-the-air software updates

46
Q

tethering

A

_ sharing a device’s mobile Internet connection with other devices
_ can be used to bypass corporate firewalls and proxy servers

47
Q

Wi-Fi Direct

A

_ local wireless network among devices
_ not connected to the Internet

48
Q

SoC

A

_ system-on-chip
_ many components of a computer on a single chip

49
Q

Embedded system security

A

_ limited power limits use of cryptography
_ often not possible to patch

50
Q

APT

A

_ advanced persistent threat
_ organized group of threat actors targeting organizations
_ typically sponsored by nation-states

51
Q

Threat vector

A

_ path attacker uses to gain access to computers and networks

52
Q

Shadow IT

A

_ unauthorized systems or apps in an organization
_ can include cloud services

53
Q

virus

A

_ malware that runs when the host app runs (by virtue of being added to the app)

54
Q

worm

A

_ self-replicating malware that travels through a network without the assistance of a host app or user
_ can greatly slow network bandwidth

55
Q

Logic bomb

A

_ event-initiated malware found in an app or script

56
Q

scareware

A

_ a form of trojan scares users into downloading
_ e.g. “virus detected, download anti-virus now”

57
Q

rootkit

A

_ provides root access to a system
_ can manage hooks so that anti-virus won’t detect
_ RAM inspection tools can discover them

58
Q

Potential indicators of malware

A

_ extra traffic
_ data exfiltration
_ encrypted traffic
_ traffic to specified IPs
_ outgoing spam (lots of email)

59
Q

Access vestibule

A

_ aka mantrap
_ physically guarded buffer between secure and unsecured areas

60
Q

Watering hole attack

A

_ places malware on websites the targeted people are likely to visit

61
Q

BEC

A

_ business email compromise
_ exploits trust in high-level executives
_ requests info recipient should not send

62
Q

elicitation

A

_ social engineering techniques for getting information without asking for it directly
_ e.g. make false statements to be corrected
_ e.g. “bracket” – asserting ranges of numbers, awaiting correction

63
Q

pretexting

A

_ attacker makes of a convincing story to manipulate target into providing info or granting access
_ can be detailed and well-researched

64
Q

Spear phishing

A

_ targets a specific group or individual
_ digital signatures can discourage

65
Q

whaling

A

_ spear fishing that targets high-level executives

66
Q

vishing

A

_ voice message left asking you to call, whereupon it asks you to confirm your identity
_ can also call directly and ask for identifying info

67
Q

smishing

A

_ phishing via text instead of email

68
Q

File integrity monitor

A

_ periodically checks files against saved hashes

69
Q

OSINT

A

_ open-source intelligence
_ info available to general public

70
Q

TAXII

A

_ trusted automated eXchange of intelligence information
_ open standard for exchanging messages that share info
_ used to share cyber-threat info

71
Q

STIX

A

_ structured threat information eXpression
_ open standard identifying cyber threat info that organization should share
_ provides a common language for use with TAXII

72
Q

Dark web

A

_ alt Internet requiring credentials to access
_ criminal marketplace

73
Q

IoC

A

_ indicator of compromise

74
Q

Threat map

A

_ visual representation of active threats
_ shows replays of recent attacks

75
Q

Reflected DDoS

A

_ Sends request to third party
_ Spoofs the return address
_ Third party sends response to the spoofed address

76
Q

Amplified DDoS

A

_ a reflected DDoS attack in which the third party’s response is large, producing greater volume

77
Q

On-path attack

A

_ aka man-in-the-middle attack
_ forwards traffic between two target computers
_ used for eavesdropping, interrupting traffic, or inserting malicious code
_ SSH is subject to attack, but only if warnings are ignored
_ Upon creating keys, SSH creates “fingerprints”, which are verified on every subsequent connection, issuing warnings if they don’t match

78
Q

SSL stripping

A

_ changes an HTTPS connection into HTTP
_ also applies to TLS
_ HTTP connections are set up in the clear and can be intercepted and manipulated during initialization

79
Q

Pharming attack

A

_ as with DNS poisoning, directs user to a false website
_ but this attack occurs on the user’s system, not on the server
_ e.g. modifies “hosts” file

80
Q

DNS filtering

A

_ controls what websites users can visit

81
Q

DNS sinkhole

A

_ a DNS server that refuses to forward to certain sites
_ used by authorities to take down access to sites

82
Q

TOCTOU

A

_ time of check to time of use race condition
_ aka state attack
_ attack tries to accomplish something between the time the system verifies that a target is allowed to do something and the system doing that something (e.g. between DAC check and DAC action)

83
Q

OWASP recommended HTTP headers

A

_ applies to response headers
_ HTTP Strict-Transport-Security – tells browser to only display page if it was sent via HTTPS
_ Content-Security-Policy – what to expect in content
_ X-Frame-Options – whether X-frames are allowed (X-frames aren’t used any more due to vulnerabilities)

84
Q

Secure cookie

A

_ can only be sent over HTTPS

85
Q

SQLi

A

_ SQL injection attack

86
Q

Memory injection

A

_ taking advantage of buffer overflows to inject code into memory

87
Q

DLL injection

A

_ attacker puts a DLL into system memory and causes it to run

88
Q

LDAP injection

A

_ extends an LDAP query

89
Q

XML injection

A

_ embeds XML in data intended for embedding in XML
_ often used to create additional accounts by injecting new account data

90
Q

Directory traversal attack

A

_ adds traversal to a filename to access a different file

91
Q

Cross-site scripting

A

_ injects scripts into web pages

92
Q

Reflected XSS

A

_ aka non-persistent XSS
_ URL embedded in email or website
_ clicking on URL opens page with malicious code

93
Q

Stored XSS

A

_ aka persistent XSS
_ malicious code stored in database or web page

94
Q

User provisioning

A

_ automated process of creating, updating, and removing user accounts and permissions
_ reduces mistakes
_ improves reaction time
_ applies principle of least privilege

95
Q

Resource provisioning

A

_ automating creation, configuration, and removal of resources
_ reduces mistakes
_ improves reaction time