Security Flashcards
PKI
Public Key Infrastructure
CA
Certificate Authority
Digitally signs the certificate
Self-Signed Certificate
If only used internally at an organization, no need for a public CA
IAM
Identity and Access Management
Give right permissions to right users to prevent unauthorized access
- Identity Management
- Access Control
- Authentication
- Authorization
MFA
Multi-Factor Authentication
RBAC
Role Based Access Control
SSO
Single Sign-On
Only need to sign in one time then have access all day to many resources
RADIUS
Remote Authentication Dial-In User Service
Centralize authentication for users
- Routers, switches, firewalls, servers, VPN, 802.1X net access
LDAP
Lightweight Directory Access Protocol
Read/write from directory on net
like phone book
Username, PW
Also other data to use in setting permissions
- CN = Common name - person or unit
- OU = Org Unit
- O = Org
- L = Location
- ST = State
- C = Country
- DC = Domain Component
Example:
CN=WIDGETWEB, OU=Marketing, O=Widget, L=London, C=GB, DC=widget, DC=com
SAML
Security Assertion Markup Language
XML-based
Open standard for Authentication/Authorization
Can auth through 3rd party
TACACS+
Terminal Access Controller Access Control System Plus
Remote authentication
TOTP
Time-based One-Time Password
Use secret key and time of day to generate temp PW
Synch via NTP
CIA
Confidentiality
Integrity
Availability
Honeypot
Attract bad actors
Virtual world for attackers to explore
Honeynet
Larger fake network to attract attackers
Data Locality
Regulation that data gathered in country must remain in that country
GDPR
General Data Protection Regulation
European regulation
- PII kept in EU
- Users decide and can request removal
PCI DSS
Payment Card Industry Data Security Standard
Industry standard
Standard for protecting credit/debit card info/network
IIOT
Industrial Internet of Things
Machine to machine comms
SCADA
Supervisory Control and Data Acquisition
ICS
Industrial Control System
OT
Operational Technology
Tech that continued ops depend on - critical infrastructure
Guest Network
Guests can access but no access to organizational resources
VLAN Hopping
Switch Spoofing
- Pretend to be a switch
- Send trunk negotiation
Double Tagging
- Create a packet with two VLAN tags
- First tag is removed as it goes through a trunk, now second tag is visable and packet is forwarded to target
- One way trip, no response back out of network
- Change the native VLAN ID, Force tagging of all traffic on native VLAN
MAC Flooding
Switch maintains a list of MACs on the network and interface to comm with the MAC
Attacker sends many frames with different MACs, fill up MAC table
If MAC not found on table, packet is forwarded to all interfaces on switch
Turns switch into hub
Prevent in switch’s port security settings
ARP Poisoning
IP Spoofing
Attacker pretending to be another IP address
ARP: Who has 192.168.1.1
Device responds with its MAC
Client caches MAC
Client communicates assuming that MAC = 192.168.1.1
DNS Poisoning
Same as DNS Spoofing
Rogue DHCP server
IP addresses assigned by an unauthorized server
No security built into DHCP
Countermeasure:
- Enable DHCP snooping on switch
- Manage authorized DHCP servers in Active Directory
- Renew IP leases of devices on network
Rogue Access Point
Unauthorized wireless access point
May be added by an employee or attacker
Creates vulnerable backdoor onto net
Countermeasure:
- Periodic survey of RF with tools like WiFi Pineapple
- Use 802.1X (Network Access Control)
– Must authenticate regardless of how you connected
Evil Twin
Access Point set up to look identical to legitimate access point
May increase power output to overpower legitimate APs
Countermeasures:
- Always encrypted traffic/VPN
On-Path network attack
Man in the Middle
Rootkit
Malware that hides within your OS
NAC
Network Access Control
Prompt for authentication any time a device plugs in
Username, PW
Port Security
Prevent new device being plugged into interface
Based on MAC
Configure specific MACs, Number of MACs
ACL
Access Control List
Control accesses by Source/Destination IP, Port Number, Time of Day, Application, etc
Implicit Deny
Last firewall rule should be to deny any traffic that doesn’t match any of the previous rules
DAC
Discretionary Access Control
give user access/admin on machine
MAC
Mandatory Access Control
mostly used by gov agencies
RBAC
Roll-Based Access Control
ABAC
Attribute-Based Access Control
based on attributes like time of day, geo location, etc
DLP
Data Loss Prevention
Monitor data at rest, in motion, in use
Analyze net traffic
Identify sensitive data, blocks transmission
Prevent sensitive data leakage
OAuth
Open Authorization
Auth protocol to grant 3rd party apps access without sharing their password
Kerberos
Authentication protocol developed in the 80s
Which of the existing SNMP versions support(s) encryption? (Select all that apply)
SNMPv1
SNMPv2c
SNMPv3
SNMPv4
SNMPv3
There is no v4
Which SNMP version(s) use(s) community strings for authentication? (Select all that apply)
SNMPv1
SNMPv2
SNMPv3
SNMPv4
SNMPv1
SNMPv2
Which SNMP version(s) send(s) authentication data in an unencrypted form? (Select all that apply)
SNMPv1
SNMPv2c
SNMPv3
SNMPv4
SNMPv1
SNMPv2c
Which of the following answers refer(s) to (a) dedicated software tool(s) designed to monitor and examine the contents of network traffic? (Select all that apply)
Port scanner
Network mapper
Protocol analyzer
Data flow controller
Packet sniffer
Protocol analyzer
Packet sniffer
Which of the following answers refers to one of the core functionalities of SIEM?
Monitors bandwidth usage across the network
Conducts vulnerability assessments
Enforces security policies on endpoints
Collects, aggregates, and analyzes log data
Collects, aggregates, and analyzes log data
Which of the following tools is used for evaluating network efficiency and identifying potential bottlenecks (network performance monitoring)?
SNMP
Ping
Nmap
Syslog
SNMP
Which of the tools listed below is used to send echo requests to network devices and services to confirm their availability?
ICMP
Traceroute
RDP
SNMP
ICMP
ping is an ICMP message
Examples of protocols specifically designed to provide confidentiality and privacy for DNS data include: (Select all that apply)
DNSSEC
DoH
DTLS
DoT
SSL/TLS
DoH
DoT