Security Concepts Flashcards

1
Q

CIA Triad

A

Confidentiality: Certain information only known by certain people
Integrity: Data is stored and transferred was intended without modification
Availabilty: Information is accessible to those authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A
  • Weakness that could be accidentally triggered or intentionally exploited to cause security breach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A
  • Potential for vulnerability to be exploited and security breached
  • Intentional or unintentional
  • Thing posing threat is threat actor or agent
  • Pather or tool used is attack vector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk

A

Likelihood and impace of threat actor exercising vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Management

A
  • Process for identifying, assessing and mitigating vulnerabilities and threats.
  • ERM: Enterprise Risk Managment policies based on published frameworks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Controls

A
  • Procedures, activities and tools designed to give a system or data asset the CIA properties
  • Aim is to mitigate risk factors to affordable level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Posture

A
  • Overall status of risk management

- Shows which risk response options can be identified and prioritized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Posture Assessment

A
  • Used ot assess organizations maturity level in its use of security policies and contols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MEF

A

Mission Essential Function

  • Function org must be able to perform as close to continually as possible
  • If there is disruption, must be restored with priority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BIA

A

Business Impact Analysis

  • Process of assessing what losses might occur from a range of threat scenarios
  • Gives context for making decisions on what security controls are worth investment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploit

A
  • Specific code or method of using vulnerability to gain control of or damage system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-Day

A
  • Vulnerability that is exploited before it is patched or known
  • Can be extremely destructive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability Assessment

A
  • Evaluation of a system’s security and ability to meet compliance requirements based on configuration state of the system.
  • How close it is to ideal configuration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVE

A

Common Vulnerabilities and Exposures

- Dictionary of vulnerabilities that is published

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TTP

A

Tactics, Techniques and Procedures of threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Behavioral threat research

A
  • Narrative commentary describing examples of attacks and TTPs
17
Q

Reputational threat intelligence

A
  • Lists of IP addresses and domains associated with malicious behavior
  • signature of file based malware
18
Q

Threat Data

A
  • Computer data that can correlate events observed on customers own networks and logs with known TTP indicators
19
Q

SIEM

A

Security Information and Event Management

  • Security Control designed to integrate assessment efforts with automated collection and analysis
  • Links events or data points to indicators of risk or compromise
  • Can drive an alert system based on findings
20
Q

Penetration Testing

A
  • Authorized hacking techniques to discover exploitable weaknesses
  • Active test of security controls
21
Q

Vendor Management

A
  • Process of selecting supplier companies and evaluating risks inherent in relying on third party products or services.
  • Risk cannot be fully transferred to vendors
22
Q

ACL

A

Access Control List

- List of subjects and rights or permissions they have access to

23
Q

Local Authentication provider

A

Software architecture and code that underpins the mechanism by which the user is authenticated before starting a shell.
- Microsoft or Linux sign in

24
Q

Hash

A
  • Function that converts any string to a unique, fixed-length code
  • Cannot be converted back to plaintext string
  • Passwords are stored in the credential database as hash
  • One-way cryptographic function
25
SSO
- Allows user to authenticate once to local device and be otherized to access compatible application servers without having to authenticate again - In Windows, usually provided by Kerberos Framework
26
Kerberos
- Provides SSO authentication to active directory - Authentication service approves user logon requests - KDC (Key Distribution Center) presents user with Ticket Granting Ticket - To access domain resources, client requests Service Ticket by supplying Ticket Granting Ticket to Ticket Granting Service
27
Digital Certificate
- Used to authenticate server machines when using TLS | - Can be installed on web or email server to validate identity and secure transmission channel
28
Public Key Cryptography
- Key pair is generated - Private key only you know - Public Key can be transmitted to other subjects - Private key cannot be derived from public key - Messages sent with public key can only be decrypted with your private key - Can also be used to authenticate yourself by creating unique signature, which only you could have made
29
PKI
Public Key Infrastructure - Aims to solve issue with public key by proving owner of public key - Anyone issuing public keys should obtain a digital certificate - Wrapper for entities public key
30
EAP
Extensible Authentication Protocol - framework for deploying multiple types of authentication protocols and technologies - Many use digital certificates on the server and client machines - Used to establish trust relationship and secure tunnel to transmit other credentials
31
NAC
IEEE 802.X Port-based Netwrok Access Control - Means of using EAP method when device connected to ethernet switch port, WAP or VPN gateway. - Uses Authentication, Authortization and Accounting (AAA) architecture.
32
RADIUS
Remote Authentication and Dial-in User Service - Widely used for client access over switches, wireless and VPNs. - Uses port 1812 and 1813 - Each client must have IP of radius server and shared secret
33
TACAS+
Terminal Access Controller and Access Control System - Similar to RADIUS, but more flexible and reliable - Often used to authenticate administrative access to routers and switches - Port 49
34
PAM
Privileged Account Management - policies, procedures and technical controls to prevent malicious abuse of privileges accounts - Identify and document privileged accounts, and manage the credentials used to access them
35
Least Privilege
- User is granted sufficient rights to perform job and no more - Mitigates risk if account is compromised - Should perform regular audits to prevent authorization creep
36
Role-based Access
- A set of organizational roles is defined and subjects are allocated to those roles - Roles can only be modified by system owner - Rights are given from role assignment, rather than directly
37
Zero Trust
- Based on idea that perimeter security is unlikely to be completely robust - Use continuous authentication and conditional access to mitigate privilege escalation and compromise.
38
LDAP
Lightweight Directory Access Protocol - Used to query and update x.500-like directory - Used TCP and UDP port 389
39
X.500
- Main directory standard - Each object has unique identifier called distinguished name - Made of attributes=value pairs separated by commas. - Most specific attribute is listed first and then get broader Example: CN: Jaime, OU: Admins, DC:corp, DC:515support, DC:Com