Security Basics Flashcards
What are the seven layers of the OSI model ?
Physical, Data Link, Network, Transport, Session, Presentation and Application
What layer of the OSI model handles the transmission of information across the wire ?
Physical
What is the Data Link layer responsible for ?
This handles addressing within your network via the use of frames and mac addresses
What is the layer 3 responsible for in the OSI model ?
The networking layer Handles the addressing outside of your network via the use of packets and ip addresses
What layer is responsible for the delivery of packets ?
Transport - UDP/TCP
What are the four layers in the TCP IP model ?
Application, Transport, Internet and Network
How are ethernet frames constructed ?
From the inside out using information passed by each layer
What are the seven parts of an ethernet frame ?
Preamble, Start Frame Delimiter, Destination Address, Source Address, Length, Data and Frame Check sequence
What information does the Source Address and Destination Address hold?
MAC (6 bytes)
What are the three types of message flows in a TCPIP network
SYN SYN/ACK ACK
What are the five types of network segmentation ?
DMZ, Internet, Intranet, Production and Management
What are the three stages of a Pen test ?
Preparation, Evaluation and Conclusion
What type of Pen Test asssumes no prior knowledge ?
Black box testing
What is a vulnerability ?
A vulnerability is simply a weakness that can be exploited by an attacker to perform unauthorized actions within a computer or network system
What is CVSS ?
Common vulnerabilities scoring system is a way to characterise vulnerabilities it gives a numerical score that can then be translated into a high medium or low category
What are the nine categories of vulnerability ?
Misconfiguration Default Installations Buffer Overflows Missing Patches Design Flaws OS Flaws App Flaws Open Services Default Passwords
What is a SIEM ?
Security Incident and Event Management a tool that can help identify monitor record and audit security incidents
What are the five hacking phases ?
Reconnaissance, Scanning and Enumeration, Gaining Access, Maintaining Access, Covering Tracks
What is a typical action in the covering tracks phase
Deletion or Manipulation of logs
What is hack value ?
is the notion used by hackers to express that something is worth doing or is interesting.
What is a zero day attack
is a computer-software vulnerability unknown to those who should be interested in its mitigation
What is doxing ?
search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.
What is daisy chaining ?
it involves gaining access to a network and /or computer and then using the same information to gain access to multiple networks and computers that contains desirable information
What is annualized loss expectancy ?
Annual Rate of Occurance * Single Loss Expectance
What are the three types of security control ?
Physical, Technical, Administrative
What does CIA cover ?
Confidentiality, Integrity, Availability
What is the difference between Standards, Baselines, Guidelines and Procedures ?
Standards - Mandatory rules designed to achieve consistency Baselines - Provide Minimum Security Guidelines - Flexible recommendation actions Procedures - Detailed step by step instructions for accomplishing a task or goal
What is a promiscuous security policy ?
Wide open
What is the difference between a prudent and a paranoid security policy?
Paranoid lock everything down