Security+ Flashcards
What is a phishing campaign?
Testing your team by sending out a phishing test and recording the results.
What are the best practices to tell your team when it comes to security training?
Have guidance and training provided for members of your organization and third-parties through various means, including policy handbooks, and training on situational awareness. Maintain password management. Don’t leave cords and USBs laying around. Alert your people to social engineering. Let your people know what data attackers are looking for (operational security). Don’t let anyone other than the specified person access their systems if they’re working from home.
What is an insider threat?
Someone in your organization attacking you. Defend against it by adding multiple approvals for critical processes, monitor your files and systems as much as possible, and make it difficult for anyone to make an unauthorized change.
In terms of security awareness, what is anomalous behavior?
Evidence of modifying host files, uploading sensitive files, replacing core OS files, logins from other countries, increased data transfers, etc.
What is active reconnaissance?
Information needed before an attack that is gathered by going into the devices and systems themselves. Ping scans, port scans, DNS queries, etc. for example.
What is passive reconnaissance?
Information needed before an attack that is gathered by learning as much as you can from open sources. Social media, websites, online forums, and social engineering, for example.
In terms of pen tests, what is a partially known environment?
Partial disclosure. The pen test attacker is given only some information about the systems before the test begins. Focused on only certain systems.
In terms of pen tests, what is an unknown environment? Blind. The pen test attacker is given no information about the systems before the test begins.
What are integrated penetration tests?
Red Vs Blue going together.
In terms of pen tests, what is a known environment? Full disclosure. The pen test attacker is given all of the information about the systems before the test begins.
What are defensive penetration tests?
A pen test where a group (The Blue Team) attempts to identify pen test attacks in real-time and tries to prevent unauthorized access.
What are offensive penetration tests?
A pen test where your systems are attacked and vulnerabilities are looked for to exploit (The Red Team).
In terms of penetration tests, what makes them physical?
Making a device’s OS operate the way you want it to by physically modifying it, so lock your stuff up. A physical pen test is literally someone trying to physically gain access to your stuff.
What is an independent third-party audit?
An audit performed by an external third-party that has no connection to the organization.
In terms of external audits, what are assessments?
The third-party’s results of the examination (“You could make more money with a flop than with a hit”)
In terms of external audits, what are examinations?
Hands-on researching in which records are viewed, reports are compiled, and details are gathered. (Leo Bloom).
What is a regulatory audit?
An independent third-party performing an audit based upon an individual organization’s regulations and frequency requirements.
What are external audits?
Audits done by a third-party.
What are self-assessments?
Having the organization perform their own checks, and then consolidating the self-assessments into ongoing reports.
What is an audit committee?
A committee of people that oversees risk management activities. They determine whether audits start or not.
What is compliance?
Following the rules and regulations set up. Duh.
What is attestation and acknowledgement?
Someone signing off that the compliance is in good standing. Also the guy responsible if documentation is incorrect.
What is the right to be forgotten?
The user having the power, control, and decision of where their data goes and can request the removal of that data from search engines if they so choose.
What is data inventory and retention?
Specific data that your organization stores and an inventory of that data (a listing of all managed data).
Who is the data processor?
The person who processes and uses the data on behalf of the data controller. Often a third-party or different group, for example, a payroll company that processes and stores employee information.
Who is the data controller?
The person who manages the purposes and means by which the data is processed. Manages how the data will be used, for example, the payroll department defines payroll amounts and timeframes.