Security Part 1 Flashcards
What is Defense in Depth?
It is a cybersecurity risk management strategy that is based on the idea that systems can never be completely secure
It encompasses 3 categories of controls:
- Physical
- Technical
- Administrative
What is layered security?
- It is a part of the defense in depth technical controls
- It is a approach that creates overlapping protective layers so that if 1 security measure fails, deeper layers will stop or slow an attack
- Under this ideology, individual system components can never be completely secure
What are stakeholders in IT?
- Systems analysts
- Internal end users
- Internal managers
- External companies (customers)
- Stakeholders are any individual/organization with an interest in/affected by an information system
What is a cybercriminal?
They conduct ransomware attacks to extort money
What is a cyberterrorist?
They interrupt critical systems to spread hear or create civil unrest
Why would a company communicate social media policies to employees as part of a security awareness training program?
They would do that to reduce the risk of aiding cyberattack reconnaissance
What is RECONNAISSANCE?
- The attacker will scan public sources to gather planning information
- Employees who are not cyber aware may post something on social media that attackers can use for malicious purposes
- Ex: Employee may post on instagram where they work and attackers can use that info for malicious purposes
What is a replay attack?
- The threat agent intercepts info while it is being transmitted and resubmits it to trick another system into providing more info
- Ex: if an encrypted bank password is intercepted, the attacker may later resubmit it to transfer funds
- In this case, the attacker would appear as the original sender because the encrypted password would match
What is a preventitive control in a replay attack?
It would be to add time/session stamps to all encrypted messages
What is an attack surface?
- It is the sum of all the points where an attacker can try to gain unauthorized access to an organization’s environment
- Adding more IoT devices expands the attack surface, creating additional weaknesses
What are some common authentication techniques?
- Iris reader
- Fingerprint reader
- Facial recognition
- Smart card reader
What is a digital signature?
- It is something that uses data encryption to record a unique identifier, and other info such as the date, time, and location of the signature
- This stamp protects electronic documents from unauthorized alteration and records signers’ identity
- It would NOT prevent unauthorized access to a company payroll file because it is not used to grant entry into a system
What is the Internet of Things?
- It is a network of physical objects with embedded sensors, software used to connect and exchange data via the internet
- IoT devices use unencrypted communication channels, leaving the data transmitted between the devices vulnerable to attacks
What is Man in the Middle?
It is an attack where attackers can intercept, read, and alter data in transit from one person to another person
What is a buffer overflow attack?
It is an attack that exploits hardware memory limitations
What is a buffer?
It is a temporary storage area used to hold data for processing/transmission
What do software coding errors create?
They create vulnerabilities that attackers can use to overwhelm a system
What is a covert channel attack?
It is a cyberattack technique where an unauthorized intrasystem channel adds small bits of data to the stream without being detected
What is a race condition attack?
- It is a cyberattack technique that exploits a brief gap in time during a processing sequence
- Ex: The moment between when a user logs in and when the login is verified in a database
What is a SQL injection attack?
It is an attack where a SQL query is injected into an application through a data input field
Organizations use what kind of controls to lessen the risks associated with cyberattacks?
- Preventitive
- Detective
- Corrective
What is virus quarantining?
It corrects a detected incident in which files were infected with spyware, ransomware, malware
What is firewall redundancy?
- It is a preventitive control
- Firewalls mitigate the risk of unauthrorized access
What is network analysis?
- It is a detective control associated with computer-generated logging
- Ex: An event log records network traffic and usage, like logins, failed passwords
What is software hardening?
- It is a preventitive control
- Hardening refers to implementing additional security measures, such as encryption/obfuscation (the act of making something unclear) to protect code from reverse engineering (code that is deconstructed)
What does the SERVICE AUDITOR do in order to assess the suitability of the design of controls in a SOC 2 Type 2 examination?
- Understand management’s process for identifying risks that threaten the achievement of the service organization’s principal service commitments and system requirements
- Assess the completeness of management’s risk assessment
- Perform an independent risk assessment
- Determine whether management has implemented the controls
When performing procedures, what can a service auditor request?
- Ad hoc computer-generated reports from the service organization’s databases
- To see if the retrieved data is relevant, the service organization personnel must input the query into the database
What are the 5 components of the COSO ERM framework?
- Governance and culture (Ex of culture-building activities: security awareness training, creating operating structures, defining an entity’s desired cyber culture)
- Strategy and objective setting (Ex: Formulating business objectives)
Performance - Review and revision (Ex: Assessing changes)
- Information, communication, reporting
What is least privilege?
This principle states that the system administrator should grant users only the minimum level of access rights necessary to perform an operation for the minimum time
What is the need to know principle?
This principle states that users should only have access to info needed for the job function
What is whitelisting?
It is a principle that involves using pre-approved lists to determine if an application can be installed, for example
What is zero-trust?
It is a principle associated with intrusion detection systems nd treats all network data as suspicious
Who are hacktivists?
They are people who conduct attacks to create an awareness of political or social causes
What is the 1st step in threat modeling?
- To prepare a DETAILED INVENTORY LIST of all infrastructure components, including mobile devices that access the organization’s network
- Without a detailed inventory, it would be tough to identify if mobile activity originated from a legitimate insider vs a threat agent