Security Flashcards

1
Q

CIA triad

A

Applies to data, usually requiring balancing tradeoffs:
_ confidentiality
_ integrity
_ availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

InfoSec

A

_ information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SecOps

A

_ security operations

_ discipline within IT responsible for protecting assets by reducing the risk of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

asset

A

_ person, device, location, or information that SecOps aims to protect from attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attack

A

_ action taken by a threat that exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

risk

A

_ potential of a threat to exploit a vulnerability via an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

threat

A

_ something or someone that can exploit a vulnerability

_ person, software, or natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vulnerability

A

_ a weakness in software, hardware, facilities, or humans that a threat can exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advanced persistent threat (APT)

A

_ when malware remains undetected for a long time waiting for the right time to attack
_ by remaining idle, it infects backups too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

zero-day

A

_ when a vulnerability or exploit is not yet public

_ likely no patch for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion prevention system (IPS)

A

_ can look for suspicious patterns of code, block it immediately, and send it for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blue, red, white, and purple teams

A

_ red team attempts to compromise security
_ blue team attempts to defined security
_ white team may observer and referee
_ “purple team” is when red and blue teams come together to debrief and cross-train

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

White hat, black hat, gray hat hackers

A

_ white hat - perform attacks when authorized in order to find vulnerabilities
_ black hat - criminals
_ gray hat - no malicious intent, but may not have obtained permission, could be breaking law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Script kiddie

A

_ copycat criminals
_ hack for curiosity or entertainment
_ unsophisticated
_ may not realize the consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

wiretapping

A

_ eavesdropping between communicating people or computers
_ might use a packet sniffer or attach to hardware
_ might use an EMF listener; a reason to use fiber optics
_ ethernet switches make this hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability scanner

A

_ examines specific ports, so use a port scanner first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NX-bit

A

_ no-execute bit
_ flags memory for either storage or execution
_ reduces change of buffer overflow vulnerabilities
_ only available in special CPUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

spoofing

A

_ pretending to be something else in order to gain access
_ man-in-the middle attack - pretending to be client to the actual server and server to the actual client
_ ARP poisoning - causes an Ethernet switch to flood all traffic to every port (including the attacker’s computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DoS

A

_ Denial-of-Service
_ may use features of ICMP, such as ping
_ attacker can make the echo replies go to another computer rather than their computer, minimizing stress on attacker’s computer
_ ping-of-death = obsolete vulnerability whereby server would crash for a malformed ICMP packet
_ ping flood attack = overwhelms computer with pings having randomized source addresses
_ smurf attack = (1) a DDoS, thousands of computers bombard the victim; (2) the attacker sends a forged ICMP echo-request packet to the broadcast address of a large IP subnet so all of the computers on the subnet receive the message; (3) the attacker specifies the victim’s address as the source address
_ SSL attack = wastes computer resources setting up and tearing down SSL encryption sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

honeypot

A

_ server designed to look authentic
_ contains fictitious data
_ intended to draw hackers
_ can be used to collect data on the attacker
_ “tar pit” variation is designed to slow the attacker so that the intrusion detection system can do a trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Rootkit attack

A

_ software designed to give a user root or admin access and full control over the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Backdoor attack

A

_ means of bypassing authentication or encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trojan horse

A

_ misleads users into installing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

confidentiality

A

_ part of the CIA triad
_ limits access to information (at odds with availability)
_ goal is to prevent an unauthorized user from accessing, copying, or transmitting information
_ need-to-know policy (aka least privilege policy)
_ reduce exposure by destroying unneeded copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

integrity

A

_ helps determine the trustworthiness of information
_ includes verification
_ ensures accuracy of the data
_ where information came from
_ whether information was changed en route
_ encryption helps with integrity
_ digital signatures or one-way hashes (e.g. SHA-3) can provide integrity
_ version control can provide integrity
_ e.g. a man-in-the-middle attack violates integrity, intentional or accidental deletion or modification of data, equipment malfunctions, natural phenomena such as EMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

availability

A

_ ensuring data is always accessible to authorized users
_ includes making server highly available
_ includes minimizing downtime
_ have a disaster recovery plan
_ back up data off site
_ e.g. DoS attacks, unplanned downtime, accidental changes to access controls incorrectly removing authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Packet filter

A

_ a firewall that operates at layers 3 and 4
_ checks the protocol and the source and destination IP addresses and ports
_ only concerned with the packet address label (header)
_ no filtering on payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Circuit-level gateway

A

_ a middleman firewall that helps conceal identity of client and server from each other
_ may change IP address and port numbers
_ uses Network Address Translation (NAT)
_ uses Port address Translation (PAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Stateful inspection

A

_ state of the connection between two computers
_ can identify traffic as “conversational” and automatically create temporary firewall rules that permit two-way traffic for the duration of the connection
_ minimizes the number of rules otherwise needed by a packet filter

30
Q

Application-aware firewall

A

_ aka layer-7 firewall
_ a proxy server
_ act as middlemen reading packet application payloads

31
Q

Intrusion detection systems (IDS) and intrusion prevention systems (IPS)

A

_ based on a DB of known behaviors and payload signatures
_ IDS monitors to detect threats
_ IPS intercepts and blocks threats
_ both have a “tap mode”, where they only listen to a network, which suffices for IDS
_ “in line mode” = positioned to intercept and block traffic
_ IPS supports many network ports that operate as input/output pairs
_ some IPS devices block based on file type, such as to exclude .EXE files
_ either software or physical devices

32
Q

OSI layer 1 security

A

_ security varies by physical medium (e.g. CAT6 cabling can be monitored for EMF, but fiber optic cabling can’t)
_ includes locks on doors, equipment
_ radio jamming

33
Q

OSI layer 2 security

A

_ e.g. capturing a WAP encrypted password for decryption
_ e.g. ARP poisoning - attacker sends special Ethernet frames that overwhelm the switch’s “forwarding information base (FIB)” database, forcing the switch to send traffic to everyone, including someone’s packet sniffer
_ e.g. VLAN hopping attack, taking advantage of an Ethernet switch configured in trunk mode (aka tagging mode), allowing computers to send/receive traffic on any VLAN
_ e.g. spoofing that impersonates another computers MAC

34
Q

OSI layer 3 security

A

_ e.g. ping DoS attacks
_ e.g. pinging to find available computers
_ e.g. spoofing that impersonates another computer’s IP
_ intrusion prevention systems can prevent these attacks

35
Q

OSI layer 4 security

A

_ e.g. port scanner to find open ports

_ a packet filtering firewall can defend against attacks

36
Q

OSI layer 5 security

A

_ e.g. RPC attacks

37
Q

OSI layer 6 security

A

_ e.g. man-in-the-middle attacks where attacker fools victim into accepting a false security certificate
_ can be mitigated using an application-layer proxy or an IPS
_ important to train users about fake security certificates

38
Q

OSI layer 7 security

A

_ every app has its own vulnerabilities
_ e.g. injection attacks, buffer overrun attacks
_ vulnerability scanners can find known problems
_ a reverse proxy or IPS can scan packet payloads

39
Q

ciphertext

A

Encrypted data

40
Q

Symmetric key encryption

A

_ aka private key encryption
_ send and receiver must have the same cipher key
_ exchange of key is point of greatest vulnerability
_ the German Enigma machine used a symmetric key cipher that took years to break
_ much faster to encrypt and decrypt than asymmetric ciphers

41
Q

Asymmetric key encryption

A

_ e.g. public key infrastructure (PKI)
_ anyone can use the public key to encrypt data
_ only the private key can decrypt the data
_ the public key can can decrypt data encrypted with the private key to verify the source of the data, providing a digital signature
_ no need to share a private key first and risk exposure
_ lots of computation required for large blocks of data
_ the public key gets transferred in the form of a certificate issued by a certificate authority (CA)

42
Q

non-repudiation

A

_ inability to deny the source of data

43
Q

Elliptic curve cryptography (ECC)

A

_ uses algebraic elliptic curves to create keys that a smaller than traditional keys but more difficult to crack

44
Q

End-to-end encryption

A

_ when data is stored both in transit and at rest

_ data is never stored or transmitted in the clear

45
Q

SSL/TLS handshake

A

_ client encrypts a token with the server’s public key
_ server decrypts the token using its private key
_ the token is then used as the private key in a symmetric key cipher for data exchange

46
Q

IPSec

A

_ internet protocol security
_ a way to encrypt IP traffic at layer 3
_ common in VPN tunnels (PPTP - point-to-point tunneling)
_ tunneling = “encapsulation” within an untrusted network
_ also used in site-to-site encryption such as between devices such as firewalls or routers
_ devices can offload the encryption processing from computers
_ uses the Authentication Header (AH) protocol for data integrity, the encapsulating security payload (ESP) for encryption, and the security associations (SA) for key exchange.
_ often used with internet key exchange (IKE and IKEv2)
_ can be used with pre-shared symmetric keys

47
Q

Advanced Encryption Standard (AES)

A

_ the current most secure algorithm for storing and encrypting data at rest
_ symmetric key cipher
_ uses different key and block sizes
_ up to 14 transformations on data
_ AES-128, AES-192, AES-256 (latter used in banking) – different key lengths
_ most devices use AES-256 today

48
Q

AES-NI

A

_ AES new instructions
_ hardware acceleration supporting AES encryption
_ up to 10 GB/sec
_ particularly useful on wireless devices

49
Q

Retention policy

A

_ policy on how long a piece of data should be available, whether accessible or archived
_ regulations may dictate
_ regulations may also indicate the governmental district in which the data must reside

50
Q

DEK

A

_ data encryption key

_ key used to encrypt and decrypt data at rest

51
Q

Protecting DEKs

A

_ rotate/change DEKs regularly to limit time available for an attacker to use a stolen key
_ use a method that does not require disclosing the key: encrypt the DEK using a KEK and only temporarily decrypt the DEK

52
Q

KEK

A

_ Key encryption key
_ asymmetric key
_ used to protect DEKs
_ stored in a KMS

53
Q

KMS

A

_ key management system
_ stores DEKs encrypted with KEKs
_ grants access to keys based on the provided KEK
_ app decrypts DEKs for temporary use, but does not store decrypted DEKs
_ the system itself does the encryption and decryption, so the keys are never revealed
_ controlled by a master key, which must be protected
_ protect the master key by encrypting it, and then protect that encrypted key by encrypting it again; each encryption requires effort to break, so little need for more than 3 or 4 key encryptions

54
Q

Federated identity management

A

_ allows internet users to authenticate to your app via federated identity servers at Google, Facebook, Twitter
_ a federated identity server creates a token that is unique to the user for your app so the app can base identity on this token, without disclosing private information
_ your app therefore does not need a unique username and password for the user

55
Q

IAM

A

_ identity and access management

_ provides identity and access control services

56
Q

Multifactor identification

A

_ aka “MFA” or “2-factor” or “2FA”
_ use of multiple authentication requirements
_ second could be providing information only you know, using your biometrics, or using a physical device you have (e.g. cell phone)
_ text and email are NOT considered strong MFA
_ virtual MFA apps (to generate a code) or physical tokens are better

57
Q

Service account authentication

A

_ typically does not use username and password

_ uses API keys

58
Q

Wireless encryption standards, weakest to strongest

A

_ WEP
_ WPA
_ WPA2
_ WPA3

59
Q

3DES

A

_ “triple DES”
_ symmetric algorithm that uses obsolete DES algorithm 3 times to encrypt data
_ uses 3 keys
_ 56-bit encryption
_ modern hardware can crack it by brute force in less than a day
_ most organizations have phased it out

60
Q

WAP

A

_ wireless access port

61
Q

WEP

A

_ Wired Equivalent Privacy
_ one of the first wireless standards, by IEEE in 1997
_ key either 10 or 26 hex digits (40 bits or 104 bits)
_ modern computers can crack in under a day
_ deprecated in 2004, replaced by WPA

62
Q

WPA

A

_ Wi-Fi protected access
_ defined jointly by the Wi-Fi Alliance and the IEEE
_ created as short-term solution, awaiting the more secure 802.11i standard
_ based on the draft 802.11i standard at the time
_ uses variable-length alphanumeric passphrase, 8-63 characters
_ uses TKIP, which generates a new 128-bit encryption key for each packet sent
_ but had security vulnerabilities

63
Q

WPA2

A

_ aka IEEE 802.11i
_ published in 2004 by Wi-Fi Alliance and IEEE
_ the wireless standard for 15 years
_ mandatory support for CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol), which is part of AES, providing confidentiality, authentication, and access control to the network
_ still had weaknesses

64
Q

WPA3

A

_ released in January 2018
_ minimum key strength is 192 bits for enterprise connections
_ also has a personal mode with lower key strength
_ no more passphrase: now uses SAE (simultaneous authentication of equals) to exchange the network key (part of the 802.11-2016 standard); eliminates the need to tell other people of the passphrase in personal mode
_ implements PFS (perfect forward secrecy), ensuring that no more than one session can ever be compromised at a time
_ uses encryption management frames of 802.11w

65
Q

Ad-hoc mode

A

_ wireless communication mode
_ peer-to-peer
_ does not use WAP
_ mainly used for initially setting up devices instead of requiring connection with a physical cable
_ also sometimes for transferring files between devices, such as a camera and a laptop
_ does not require a wireless router or access point

66
Q

Wireless infrastructure

A

_ devices connect via a wireless router, which is a combined WAP and router
_ router acts like an Ethernet switch

67
Q

802.1x

A

_ also 802.11x
_ works wired or wireless
_ clients (“supplicants”) connect to an “authenticator” to request access to the network; the authenticator may be a wireless device
_ the authenticator delegates the decision to an authentication server, which indicates what ports the user can access; this server runs RADIUS (remote authentication dial-in user service) or EAP (extensible authentication protocol)
_ authentication is either by username/password or by PKI certificates
_ grants the user access only to authorized ports
_ 802.1x clients can also check the versions of antivirus scanners to make sure they conform to corporate requirements

68
Q

Deauth attack

A

_ deauthentication attack on a wireless network
_ a DoS attack that can force any or all clients off the network
_ the attacker doesn’t even need to be on the network
_ users can simply reconnect, but attacker may continue the attack or force users to reconnect through a false access point or to capture the 4-way handshake to gain info on the network
_ WPA3 prevents this attack
_ WPA2 makes it difficult for the attacker to read encrypted data

69
Q

Fake access point

A

_ attack on a wireless network
_ attacker sets up a wireless network having no security
_ attacker watches all data in the clear
_ can redirect an unwitting user to a different location
_ can modify data
_ if you must use an unsecured network, create a VPN tunnel
_ avoid using unsecured Wi-Fi hotspots

70
Q

AAA

A

_ authentication - verifying identity
_ authorization - what user may access
_ accounting (auditing) - verifies restrictions, providing a forensic trail; should be stored in a different location from the data being audited write-only to make it harder for the attacker to cover his tracks

71
Q

Device hardening

A

The process of:
_ reviewing security settings
_ updating device software
_ testing security such as by attempting to breach defenses

72
Q

How to harden devices

A

_ change the default passwords
_ remove unnecessary logins after periodic review
_ enforce a strong password policy (enforce if possible)
_ require users to change passwords frequently
_ implement MFA
_ remove unnecessary services
_ keep patches up to date on all devices (manufacturers often patch 90 days before public disclosure of the vulnerability)
_ limit physical access to the device
_ only allow changes from a trusted network – none from the public side; disallow changes to a WAP from other wireless devices
_ require encryption on wireless networks (WPA2 or WPA3)
_ audit all access (e.g. using Syslog); get alerts too
_ back up and store a copy remotely