Security Flashcards
CIA triad
Applies to data, usually requiring balancing tradeoffs:
_ confidentiality
_ integrity
_ availability
InfoSec
_ information security
SecOps
_ security operations
_ discipline within IT responsible for protecting assets by reducing the risk of attacks
asset
_ person, device, location, or information that SecOps aims to protect from attack
attack
_ action taken by a threat that exploits a vulnerability
risk
_ potential of a threat to exploit a vulnerability via an attack
threat
_ something or someone that can exploit a vulnerability
_ person, software, or natural disaster
vulnerability
_ a weakness in software, hardware, facilities, or humans that a threat can exploit
Advanced persistent threat (APT)
_ when malware remains undetected for a long time waiting for the right time to attack
_ by remaining idle, it infects backups too
zero-day
_ when a vulnerability or exploit is not yet public
_ likely no patch for it
Intrusion prevention system (IPS)
_ can look for suspicious patterns of code, block it immediately, and send it for analysis
Blue, red, white, and purple teams
_ red team attempts to compromise security
_ blue team attempts to defined security
_ white team may observer and referee
_ “purple team” is when red and blue teams come together to debrief and cross-train
White hat, black hat, gray hat hackers
_ white hat - perform attacks when authorized in order to find vulnerabilities
_ black hat - criminals
_ gray hat - no malicious intent, but may not have obtained permission, could be breaking law
Script kiddie
_ copycat criminals
_ hack for curiosity or entertainment
_ unsophisticated
_ may not realize the consequences
wiretapping
_ eavesdropping between communicating people or computers
_ might use a packet sniffer or attach to hardware
_ might use an EMF listener; a reason to use fiber optics
_ ethernet switches make this hard
Vulnerability scanner
_ examines specific ports, so use a port scanner first
NX-bit
_ no-execute bit
_ flags memory for either storage or execution
_ reduces change of buffer overflow vulnerabilities
_ only available in special CPUs
spoofing
_ pretending to be something else in order to gain access
_ man-in-the middle attack - pretending to be client to the actual server and server to the actual client
_ ARP poisoning - causes an Ethernet switch to flood all traffic to every port (including the attacker’s computer)
DoS
_ Denial-of-Service
_ may use features of ICMP, such as ping
_ attacker can make the echo replies go to another computer rather than their computer, minimizing stress on attacker’s computer
_ ping-of-death = obsolete vulnerability whereby server would crash for a malformed ICMP packet
_ ping flood attack = overwhelms computer with pings having randomized source addresses
_ smurf attack = (1) a DDoS, thousands of computers bombard the victim; (2) the attacker sends a forged ICMP echo-request packet to the broadcast address of a large IP subnet so all of the computers on the subnet receive the message; (3) the attacker specifies the victim’s address as the source address
_ SSL attack = wastes computer resources setting up and tearing down SSL encryption sessions
honeypot
_ server designed to look authentic
_ contains fictitious data
_ intended to draw hackers
_ can be used to collect data on the attacker
_ “tar pit” variation is designed to slow the attacker so that the intrusion detection system can do a trace
Rootkit attack
_ software designed to give a user root or admin access and full control over the computer
Backdoor attack
_ means of bypassing authentication or encryption
Trojan horse
_ misleads users into installing
confidentiality
_ part of the CIA triad
_ limits access to information (at odds with availability)
_ goal is to prevent an unauthorized user from accessing, copying, or transmitting information
_ need-to-know policy (aka least privilege policy)
_ reduce exposure by destroying unneeded copies
integrity
_ helps determine the trustworthiness of information
_ includes verification
_ ensures accuracy of the data
_ where information came from
_ whether information was changed en route
_ encryption helps with integrity
_ digital signatures or one-way hashes (e.g. SHA-3) can provide integrity
_ version control can provide integrity
_ e.g. a man-in-the-middle attack violates integrity, intentional or accidental deletion or modification of data, equipment malfunctions, natural phenomena such as EMP
availability
_ ensuring data is always accessible to authorized users
_ includes making server highly available
_ includes minimizing downtime
_ have a disaster recovery plan
_ back up data off site
_ e.g. DoS attacks, unplanned downtime, accidental changes to access controls incorrectly removing authorized users
Packet filter
_ a firewall that operates at layers 3 and 4
_ checks the protocol and the source and destination IP addresses and ports
_ only concerned with the packet address label (header)
_ no filtering on payload
Circuit-level gateway
_ a middleman firewall that helps conceal identity of client and server from each other
_ may change IP address and port numbers
_ uses Network Address Translation (NAT)
_ uses Port address Translation (PAT)