Security 101 Flashcards
What does CIA stand for ?
Confidentiality, Integrity and Availability
What is confidentiality ?
It relates to the concept of keeping things (objects) private and available to only those people that have an requirement to know about it
What is integrity ?
The assurance that assets have not been tampered with ? Hashing is a good example of a control that ensures integrity
What is availability ?
Making sure that people can access those assets ? Hardware failure is a good example of something that undermines availability
What is the AAA model ?
Extends the CIA triad with Authentication, Authorization and Accounting
What services cover the AAA model ?
Authentication - IAM
Authorization - Permission Policies
Accounting - Cloudtrail
What are the five main areas of Physical and Environmental Security covered by AWS ?
- Fire Detection and Suppression
- Power
- Climate and Temperature
- Management
- Storage Device Decommissioning
What are the four areas of business continuity management handled by Amazon ?
- Availability
- Incident Response
- Company Wide Executive Review
- Communication
What are the six areas of network security that are the responsibility of Amazon AWS ?
- Secure Network Architecture
- Secure Access Points
- Transmission Protection
- Amazon Corporate Segregation
- Fault Tolerant Design
- Network Monitoring and Protection
What does the phrase Security is neither a product or a service mean ?
There is no single product or service that can act as a magic black box
What does the phrase security is not a technology mean ?
Security does not depend on a single technology but a grouping of technologies to provide a defence in depth
What doe the phrase security is not static mean ?
It is not something you do once and forget
What does the phrase security is not a check box mean ?
It means that we should constantly be aware of why we are doing the security control
What are the four main items that drive a security policy ?
- Business Requirements/Objectives
- Regulatory Requirements
- Risk Evaluation (Agree Acceptable Level of Risk by Senior Execs)
- Cost Benefit Analysis (Determines if the control cost is justified against the risk its protecting against)
If the organizational policy is written in broad terms what are the four common document types that implement its vision in concrete terms ?
- Standards (Mandatory rules and Regulations)
- Guideline (Recommendation for areas not covered by standards)
- Baseline (Define minimum level of security for a given system)
- Procedures (step by step instructions)
What are the eight most common attack types ?
- Reconnaissance
- Password
- Eavesdropping
- IP Spoofing
- Man in the Middle
- Denial of Service
- Malware
- Phishing
What is the reconnaissance phase ?
Underlying goal is to obtain as much information as possible about targets with techniques such as ping sweep and social engineering
What are password attacks ?
Either brute force or dictionary attacks aimed at creating a new priveleged account or compromising an existing account and elevating its privilege
What is an eavesdropping attack ?
Aka sniffing such as port scans