Study Flashcards
a non-persistent operating system on a compact disk or USB
live boot media
used to indicate relevancy to the case or part of the case or to show confidentiality and help organize evidence according to keywords or labels
tags
a device that copies signals from the physical layer and the data link layer. Since no network or transport logic is used, every frame is received, allowing reliable packet monitoring.
TAP (Test Access Point)
a measure of cryptographic unpredictability, higher levels indicating higher security
entropy
what are two ways to maximize integrity of the analysis process to ensure non-repudiation is possible?
- use a write-blocker to prevent data from being changed
- create a has before and after analysis and compare checksums
shows the results of risk assessments in a comprehensible document format, including impact, likelihood ratings, date of identification, description, countermeasures, owner/route for escalation, and status.
risk register
a form of segmentation that routes suspicious traffic that is flooding an IP address into another network for analysis
sinkhole
helps to mitigate against spoofing and poisoning attacks. The authoritative server for the zone creates a package of resource records, called an RRset, signed with a private key known as the zone signing key
(DNSSEC) DNS Security Extensions
standard that creates reports that assess the ongoing effectiveness of the security architecture over a period of 6-12 months. highly detailed and designed to be restricted.
Service Organization Control (SOC2) Type II
the concept that fire requires heat, oxygen, and fuel to ignite and burn
the fire triangle
strategy that uses passive discovery techniques so that threat actors do not know they have been discovered
defensive maneuver
what are 9 symmetric algorithms?
- DES
- 3DES
- IDEA
- AES
- Blowfish
- Twofish
- RC4
- RC5
- RC6
name 3 asymmetric algorithms
- Diffie-Hellman (DH)
- RSA
- ECC
encryption type where 2 keys are used, one to encrypt, the other to decrypt
asymmetric
encryption type where sender and receiver use the same private key
symmetric
cipher that uses key stream generator to encrypt data bit by bit using XOR function to create ciphertext
stream cipher
cipher that breaks input into fixed length blocks of data and performs encryption on each block
block cipher
which symmetric encryption algorithm is a stream cipher?
RC4
type of control that includes policies, procedures, legal, and regulatory
administrative controls (aka managerial controls)
name for a freelance ethical hacker
blue hat
highly trained hackers, funded with covert and open source intelligence or funded by nations
Advanced Persistent Threats (APTs)
4 important factors in intelligence/sources
- timeliness
- relevancy
- accuracy
- confidence levels
what are the steps of Lockheed Martin’s kill chain?
- Reconnaissance
- Weaponization
- Delivery
- Explotation
- Installation
- Command and Control
- Actions on Objectives
method of obtaining info through public records, websites, and social media
OSINT (Open Source Intelligence)