Security Flashcards

1
Q

Availability

A

Ensures the accessibility of data to users who should have access to it.
Threats to this can be accidental, such as someone accidentally deleting a file of unplugging a server, or even a natural disaster. Always have had measures in place to protect data from these events.
In Last Decade:
Deliberate Attacks called “denial of service” that attack Availability. engages a virus to use other comps to access a website and overwhelm it with traffic so actual users can’t use the site
Threats can also be deliberate, such as attacks which block access to legitimate users by overwhelming a server, viruses, etc.
Now security must be able to keep websites running in the face of these attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat and Risk Management

A

Practice of Identifying security problems (from an attack or accident), Prioritizing risks based on their likelihood of occurring and potential for damage, Identifying means by which a risk may be mitigated or avoided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk

A

possibility of something happening either good or bad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Mitigation

A

focus of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Categories

A

Risk Avoidance, Acceptance, Mitigation, Transfer, Residual Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Avoidance

A

Actions to prevent a potential event from happening

e.g. backup generators for power outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Acceptance

A

When you decide to not do anything about the risk.

possibility is remote, or too expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Mitigation

A

a plan put in place to MINIMIZE the impact of an event.
May not be much to avoid risk but can be mitigated; i.e. for flooding (can’t be prevented but can prepare for it) have a backup location with servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Transfer

A

when you move responsibility for the event to someone better-equipped to handle it.
Let a specialist take care of handling the risk, let them set up the plan of action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Residual Risk

A

the risk that still remains even after you’ve done one or more of these actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PoLP (Principle of Least Privilege)

A

Idea you can access comp resources using an identity that has the absolute minimum permissions to do what you need and nothing more.
In reality, we tend to have accounts with more privileges than we need at the given moment for the task we are completing because we may have many tasks to complete in the day and having a separate account limited to permissions for each task is not practical. Therefore, PoLP can be difficult to implement in detail and no one wants dozens of user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PoLp prevents…

A

makes it less likely that you will accidentally damage something or that malware will “piggyback” on your access to do damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One of the most important principles of security

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to get around difficulty of implementing PoLP

A

Can tier out PoLP to create general categories of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ways to Implement PoLP

A

Groups,
Administrators,
Standardization,
Third-Party Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

User Groups as a polp implementation

A

Can help categorize access needs. So rather than having to assign privileges granularly you can apply them to a whole group. Put ppl in multiple groups based on their privilege needs

17
Q

Administrators as a polp implementation

A

Often a second account for admins that need higher privilege accounts

18
Q

Standardization of user accounts

A

simplifies user management by creating a class or a template that establishes user account should be able to do

19
Q

Third-Party Applications

A

provide more detailed or situation-specific capabilities that the base windows OS. Not unusual to see COs that need more granular access permissions to implement a Third-Party Application. Use them to supplement the capabilities of Windows

20
Q

Attack Surface

A

Describes the range of things that are exposed to security risk. Often divided into three areas: Application, NW, User

21
Q

Application Attack Surface

A

Amount of code- more code = more potential bugs that can be exploited.
Number of inputs- every input is a piece of data that needs to be processed by the app. The more data an app accepts, the more possibility for some of it to be exploited.
The number of services the app consists of- roughly analogous to the amount of code.
The number of open communication ports- each one providing an opportunity for an attacker to communicate with and compromise the application.

22
Q

Network Attack Surface

A

Is the overall design built to be secure? NW built to be secure are: start by building an NW that does nothing and then add pieces to increase its functionality (rather than building a NW that does everything and creating security to protect everything).
As you add functionality you add security.