Security Fundamentals Flashcards

0
Q

What to protect or what information to secure

A

Data. The information assets

Resources. Virtual or physical system components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Information security refers to

A

The protection of information resources from unauthorized access, attacks, thefts, or data damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The three primary goals of security

A

Prevention. Prevent users gaining unauthorized access to confidential information.
Detection. Users discovered trying to access unauthorized data
Recovery. Employ a process to recover vital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In terms of security what is collateral damage

A

Compromised reputation, loss of goodwill, reduce investor confidence, loss of customers and financial losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk is

A

Exposure to the chance of damage or loss. The likelihood of a hazard or threat occurring. Associated with the loss of a system, power, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A threat is

A

Any action that could cause damage to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Some potential threats to computer and network security

A
Unauthorized access or changes to data 
Interruption of services 
Interruption of access to assets
Damage to hardware 
Unauthorized access or damage to facilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A vulnerability is

A

Any condition that leaves a system open to harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List some vulnerabilities in terms of security

A
Improperly configured or installed hardware or software 
Untested software or firmware patches 
Bugs in software or OS
misuse of software or communication protocols 
Poorly designed networks 
Poor physical security 
Insecure passwords 
Design flaws in software or OS
Unchecked user Input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An intrusion occurs when

A

An attacker accesses a computer system without the authorization. Occurs when the system is vulnerable to Attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Three types of intrusions

A

Physical
Host-based
Network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attack is

A

Exploit a vulnerability in a system without the authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attacks on a computer system and network security include

A
Physical 
Network-based
Software-based
Social engineering 
Web application-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Controls are

A

The countermeasures (solutions and activities) put in place to avoid, mitigate, or counteract security risks due to threats or attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of controls

A

Prevention controls
Detection controls
Correction controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prevention controls help to

A

Prevent a threat or attach from exposing a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Detection controls help to

A

Discover If a threat or vulnerability has entered the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Correction controls help to

A

Mitigate the consequences of a threat or attack from adversely affecting the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The security management process involves

A

Identify security controls detect problems and determine how to protect a system
Implement security controls installing control mechanisms to prevent problems in a system
Monitor security controls detecting and solving security issues that arise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information security seeks to address three specific principles

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Confidentiality is the fundamental principle of

A

Keeping information and communication private and protecting them from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Integrity is the fundamental principle of

A

Keeping organization information accurate, free of errors, and without unauthorized modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Confidentiality is typically controlled through

A

Encryption, access controls and steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Integrity is typically controlled through

A

Hashing, digital signature, certificates, and non-reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Availability is the fundamental principle of

A

Ensuring that systems operate continuously and that authorized users can access the data they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Availability is typically controlled through

A

Redundancy, fault tolerance, and patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Non-repudiation is

A

Ensuring that the part that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Identification is a method that

A

Ensures that an entity requesting access to resources by using a set of credentials is the true owner of the credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Authentication is the method of

A

Validating unique credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Authorization is the process of

A

Determining what rights and privileges a particular entity has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Access control is the process of

A

Determining and assigning privileges.

How authorization is managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The four access control models

A

Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In security terms accounting is

A

The process of tracking and recording system activities and resource access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In security terms auditing is

A

Examining logs of what was recorded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Implicit deny dictates that

A

Everything that is not explicitly allowed is denied. Users only allowed to access data and perform actions when permissions are specifically granted to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Principle of least privilege

A

Users and software should only have the minimal level of access necessary for them to perform their duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

List common security practices

A
Implicit deny
Least privilege 
Separation of duties
Job rotation 
Mandatory vacation 
Time of day restrictions 
Privilege management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Separations of duties states that

A

No one person should have too much power or responsibility. Duties Divided among individuals to prevent ethical conflicts or abuse of powers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Job rotation is

A

No one person stays in a vital Job role too long. Helps prevent abuse of power, reduces boredom, and enhances professional skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Mandatory vacations is used to

A

Provide an opportunity to review employees activities. Requires that employees take at least one vacation a year for a full week. The corporate audit and security employees have time to investigate and discover any discrepancies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Time of day restrictions are

A

Controls that restrict the period of time when users are allowed to access systems. Can be applied to individual systems and wireless access points also.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is an orphaned account

A

User accounts that remain active even after the employees have left the organization.

42
Q

Privilege management is

A

The use authentication and authorization mechanisms to provide centralized or decentralized administration of user and group access control. Should include an auditing component. Single sign on can offer this.

43
Q

What is the purpose of PMI

A

Privileged management infrastructure purpose is to issue specific permissions to users within the infrastructure. Leveraged along side PKI (public key infrastructure) which is used to validate signatures for

44
Q

Describe user name/password authentication

A

A users credentials are compared against credentials stores in a database. Not very secure because doesn’t necessarily identify the correct user. Most basic and widely used.

45
Q

Describe (MAC) mandatory access control

A

Access is controlled by comparing an objects security designation and a users security clearance. Clearance level just correspond to the objects security level.

46
Q

Describe discretionary access control (DAC)

A

Access to each object is controlled on a customized basis based on a users identity.

47
Q

Describe role-based access control (RBAC)

A

Users are assigned to predefined roles and network objects are configured to allow access only to specific roles

48
Q

Describe rule-based access control

A

Non-discretionary technique based on a set of operational rules or restrictions

49
Q

What are tokens

A

Physical or virtual objects (smart cards, ID badges or data packets) that store authentication information (PINs, info about user, passwords)

50
Q

What are smart cards

A

An example of token based authentication. A plastic card containing an embedded computer chip that stores electronic information

51
Q

Biometrics are

A

Use physical characteristics as authentication. Involves fingerprint scanner, retinal scanner. Hand geometry, voice recognition, and facial recognition software.

52
Q

What is geolocation authentication

A

Authentication from an approved location. Performed by associating a geographical location with an IP address or MAC Address for example.

53
Q

Describe keystroke authentication

A

Describes exactly when a keyboard key is pressed and released. Each user has certain tendencies and patterns that can be recorded and measured o compare against future keystrokes.

54
Q

What is multi-factor authentication

A

Any authentication scheme that requires validation of two or more authentication factors. Any combination of who you are, what you have, what you know, where you are or are not, and what you do.

55
Q

What is mutual authentication

A

Security mechanism that requires each party in a communication verifies each other’s identity.

56
Q

Cryptography

A

The science of hiding information

57
Q

Encryption is

A

A cryptographic technique that converts data from plain text or clear text into coded or cipher text form

58
Q

Decryption is

A

Converts cipher text back to clear text

59
Q

Quantum cryptography is

A

An experimental method of data encryption based upon quantum communication and computation.

60
Q

A qubit is

A

A unit of data that is encrypted by entangling data with a photon or electron that has a particular spin cycle which can be read using a polarization filter that controls spin.

61
Q

A cypher is

A

An algorithm used to encrypt or decrypt data.

Operates on individual letters or bits and scrambles the message

62
Q

An algorithm in electronic cryptography is

A

A complex mathematical function

63
Q

Enciphering is

A

Applying a cipher to plaintext or clear text

64
Q

Deciphering is

A

Translating cipher text to clear text

65
Q

Two major categories if encryption ciphers

A

Stream and block

66
Q

Describe steam cipher

A

Encrypts data one bit at a time. Each plaintext bit is transformed into encrypted cipher text. Fast time execute. When errors occur they inky affect one bit.

67
Q

Describe block cipher

A

Encrypts data one block at a time often in 74-bit blocks. Stronger and more secure but slower performance.

68
Q

List some encryption and security goals

A
Confidentiality 
Integrity 
Non-repudiation 
Authentication 
Access control
69
Q

Steganography is

A

An alternative cipher process that hides information by enclosing it in another file. Obscures the fact they information is even present.

70
Q

An encryption key is

A

A specific piece of information that is used with an algorithm to perform encryption and decryption

71
Q

Two states of encryption keys

A

Static or ethemeral

72
Q

Static keys are

A

Keys Intended to be used for a long time and for many instances within a key establishment process

73
Q

Ephemeral keys are

A

Keys generated for each communication or session

74
Q

What’s a one time pad

A

An encryption algorithm developed assuming the key is used once created randomly and kept secret.

75
Q

Hashing encryption is

A

One-way encryption the transforms clear text into cipher text and not intended to be decrypted.

76
Q

The several uses of hashing

A

Hashing is used in password authentication allied hash of a password
A hash value is embedded in an electronic message
Hash of a file used to verify integrity of the file after transfer

77
Q

What is SHA

A

Secure Hash Algorithm
A Hashing encryption algorithm
Modeled after MD5 (message digest 5)

78
Q

List hashing encryption algorithms

A

MD5 message digest 5
SHA secure hash algorithm
NTLM v1&2 NT Lan Manager authentication protocol created by Microsoft
RIPEMD RACE Integrity Evaluation Message Digest
HMAC Hash-based Message Authentication Code
Verify both the integrity and authenticity of a message by combining cryograohic hash functions

79
Q

What is symmetric encryption

A

Two-way encryption where encryption and decryption are performed by the same key.
Configured in software or coded in hardware.
Fast but vulnerable to loss or being compromised.

80
Q

Common names for symmetric encryption

A

Secret key
Shared key
Private key encryption

81
Q

List symmetric encryption algorithms

A

DES Data Encryption Standard a block cipher
3DES Triple DES encrypts data by processing each block of data three times using a different key each time
AES Advanced Encryption Standard algorithm. A block cipher
Blowfish freely available 64-block cipher uses variable key length
Two fish block cipher
Rivest Cipher 4,5 & 6 (RC) all have variable key lengths. RC4 is stream cipher. RC5 & RC6 are variable size block ciphers

82
Q

What is asymmetric encryption

A

Uses public and private keys.
The private key is kept secret during two-way encryption.
The public key is given to anyone.
The private key in a pair can decrypt data encoded with the corresponding public key.

83
Q

List some of the Asymmetric encryption techniques

A

RSA Rivest Shamir Adelman. First successful algorithm for public key encryption. Variable length and block size
DH Diffie-Hellman cryptographic technique provides secure key exchange
ECC Elliptic Curve Cryptography public key encryption used with wireless and mobile devices
DHE Diffie-Hellman Ephemeral variant of DH provide secure key exchange
ECDHE Elliptic Curve Diffie-Helleman Ephermal incorporates use of ECC and ephemeral keys

84
Q

What is key exchange

A

Cryptographic keys transferred among users enabling the use of a cryptographic algorithm

85
Q

Two types of key exchanges

A

In band and out of band
In band key exchanges use the same path as other data.
Out of band key exchanges use a different path

86
Q

Symmetric key encryption requires this type if key exchange to avoid keys being intercepted

A

Out of band key exchange

87
Q

A digital signature is

A

A message digest that has been encrypted again with a users private key

88
Q

Asymmetric encryption algorithms can be used with this to create digital signatures

A

Hashing algorithms

89
Q

A cipher suite is

A

A collection of asymmetric and symmetric encryption algorithms used to establish a secure connection between hosts.

90
Q

A cipher suite is commonly associated with these network protocols

A

TLS Transport Layer security

SSL Secure sockets layer

91
Q

Name the four cipher suite components

A

Key exchange algorithm
Bilk encryption algorithm
Message authentication code algorithm
Pseudorandom function

92
Q

What is a session key

A

A single use symmetric key that is used for encrypting all messages in a single series of related communication

93
Q

What are the two primary reasons to use session keys

A

Limit the amount of SATA encrypted by that key

Faster and more efficient that using asymmetric encryption alone

94
Q

Perfect forward secrecy is

A

A property of public key cryptographic systems that ensures that any key derived from a set of long term keys cannot be compromised if one of the keys is compromised at a future date. Examples DHE & ECDHE

95
Q

What is key stretching

A

Strengthens potentially weak cryptographic keys against brute force attacks.
The original key is enhanced by running it through an algorithm.

96
Q

List some key stretching techniques

A

Repeatedly looping cryptographic hash functions
Repeatedly looping block ciphers
Increase time for key to be set up
Use key derivation function such as PBKDF2
Password Based Key Derivation Function 2 &
Bcrypt

97
Q

A security policy is

A

A formalized statement indicating how security will be implemented in an organization

98
Q

List the components that make up a security policy

A

Policy statement. The plan for individual security
Standards. How to measure the level of adherence
Guidelines. Best practices for how to meet the standards
Procedures. Instructions for implementing the policy

99
Q

What is a group policy

A

A centralized account management feature on windows server systems.
Controls certain desktop workstation features, security features and granting permissions to access servers

100
Q

List the security document categories that need to be securely maintained

A

System architecture. Documentation about the configuration of your network. Network mapping & diagnostic software
Change documentation. Changes in configuration.
Logs. System logs of audits
Inventories. Equipment and asset inventories.

101
Q

Explain change management

A

A systematic way if approving and executing change to assure maximum security, stability, and availability of information technology services. An organization can properly asses risk, quantify cost of training, support, maintenance or implementation and weigh the benefits of against the complexity of the proposed changes.

102
Q

Documentation handling measures for sensitive documents

A

Classification of documents. Public, internal. Confidential, and restricted
Retention and storage. Plan for how long docs are retained for legal requirements
Disposal and destruction. Plan for outdated docs