Study Test A Flashcards
HTTPS
Hypertext Transfer Protocol Secure – Used for secure communication over a network. Used on internet to protect data between user’s computer and website. Uses TLS. (Ex. Online purchases are secure) Port 443 TCP
Hypertext Transfer Protocol over SSL/TLS (HTTPS) provides an encrypted web connection to the router
Hybrid cloud model
Combines both private and public cloud infrastructures
Reconstitution (incident response)
The recovery after a breach, can be a phased approach that may take months to complete
CMS
Content Management System - Used to manage the creation and modification of digital content
802.1X
Authentication protocol, but it needs additional functionality to authenticate across multiple user databases. Centralized authentication server. Provides an authentication framework that allows a user to be authenticated by a central authority. Standard for port-based network access control (PNAC)…RADIUS
A IPS can detect…
If an alert was generated by an embedded script and an attacker’s IP Address
ABAC
Attribute-based Access Control - combines many different parameters to determine if a user has access to a resource based on attributes
Provides the most detailed and explicit type of access control over a resource
Active Reconnaissance
Used to gather info about services on network. Intruder engages with the targeted system to gather info about vulnerabilities Does not exploit vulnerabilities
Administrative Control
Sets a policy that is designed to control how people act
AES
Advanced Encryption Standard - Symmetric block cipher chosen by the U.S. government to protect classified information.
Specification for the encryption of electronic data
Key size can be 128/192/256 bits
Agile development life-cycle
Process of developing code that is rapid and highly-collaborative.
Software development that is performed in small increments to allow more adaptivity and room to change
ALE
Annual Loss Expectancy - is the financial loss over an entire 12-month period
An immutable system
Can’t be changed once deployed
Anti-spoofing
Commonly used with routers to prevent communication from spoofed IP addresses
API
Application Programming Interface - how 2 or more computer programs communicate with each other
ARO
Annual Rate of Occurrence - the number of times an event will occur in a 12-month period
ARP poisoning
Address Resolution Protocol poisoning - often associated with a man-in-the-middle attack. Attacker must be on the same local IP subnet as the victim, so it’s often associated with an external attack
Spoofing attack that hackers use to intercept data…attacker sends falsified ARP (Address Resolution Protocol) messages over a local area network
Backdoor
Allows an attacker to access a system at any time without any user intervention. If there are inbound traffic flows that cannot be identified, it may be necessary to isolate that computer and examine it for signs of a compromised system
Business Impact Analysis
Usually created during the disaster recovery planning process
CA Key
Certificate Authority key - commonly used to validate the digital signature from a trusted CA. Not commonly used for user data encryption
Captive portal
Commonly used on web-based systems as an authentication method
CASB
Cloud Access Security Broker – can be used to apply security policies to cloud-based implementations. Management software designed to mediate access to cloud services by users across all devices. Provide visibility into how clients and other network nodes use cloud services
CHAP
Challenge-Handshake Authentication Protocol - combines a server’s challenge message with the client’s password hash during the authentication process
Community cloud model
Resources and costs are shared among several different organizations who have common service needs
Compensating Control
Doesn’t prevent an attack, but it does restore from an attack using other means. In this example, the UPS does not stop a power outage, but it does provide alternative power if an outage occurs.
Used whenever you can’t meet the requirements for a normal control, mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time
ACL
Access Control List. Can be configured with the router. Filters traffic by IP address and port number
Single entry in a firewall that dictates whether specific communication is permitted (allowed) or denied (blocked)
Network traffic filter that can control incoming or outgoing traffic
Connecting a VPN to separate networks would…?
Encrypt all information between the two networks, but would not provide any segmentation
Containerization
Mobile device containerization allows an organization to securely separate user data from company data on a mobile device
COPE
Corporately Owned and Personally Enabled – commonly purchased by the corporation and allows the use of the mobile device for both business and personal use
Corrective Control
A corrective control can actively work to mitigate any damage
DAC
Discretionary Access Control - allows the owner of the resource to control who has access
Data Custodian
Manages access rights and sets security controls to the data
Role that handles managing the system where the data assets are stored. Responsible for enforcing access control, encryption, and backup/recovery measures
Data Owner
Usually a high-level executive who makes business decisions regarding the data
Rsponsible for labeling the asset and ensuring that it is protected with appropriate controls. The data owner typically selects the data steward and data custodian and has the authority to direct their actions. Ultimately they’re the main person responsible for the data
Data sanitization
Commonly used to permanently delete individual files from a drive or permanently delete all data on a drive
Data Steward
Responsible for data accuracy, privacy, and adding sensitivity labels to the data
Primarily responsible for data quality
Degaussing the hard drive does what?
Removes everything on the drive, but it will also erase any ROM or flash memory components on the drive.
If the goal is to completely destroy the drive, then degaussing would be a good choice. Uses magnets
Detective Control
May not prevent access, but it can identify and record any intrusion attempts
Detective Control
May not prevent access, but it can identify and record any intrusion attempts
Differential Backup
Backs up anything that has changed since the last full backup
Digital signature
A certificate authority will digitally sign a certificate to add trust. If you trust the certificate authority, you can then trust the certificate
DLL injection
Dynamic Link Library injection – Takes advantage of the libraries referenced by an application rather than the application itself. Injects malicious code in place of another code, forcing computer to load the malicious dynamic-link library
DNS
Domain Name System – Turns human readable “example.com” into a computer readable IP address Port 53 TCP/UDP
DNSSEC
Domain Name System Security – Ensures Domain Name is legit. Used on DNS servers to validate DNS responses using public key cryptography
Preventive Control
Physically limits access to a device or area
DoS
Denial of Service - an attack that overwhelms or disables a service to prevent the service from operating normally. A packet that disables a server would be an example of a DoS attack
DV certificate
Domain Validated - Shows that the owner can manage aspects of their DNS configuration. DV certificate would generally go through less validation than an EV certificate
EAP-FAST
Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling – an updated version of LEAP (Lightweight EAP) that was commonly used after WEP (Wired Equivalent Privacy) was replaced with WPA (Wi-Fi Protected Access)
EAP-TLS
Extensible Authentication Protocol - Transport Layer Security – does not provide a mechanism for using multiple authentication types within a TLS tunnel. Requires both the client and the server to identify themselves with a certificate
EAP-TTLS
Extensible Authentication Protocol - Tunneled Transport Layer Security – allows the use of multiple authentication protocols transported inside of an encrypted TLS tunnel. This allows the use of any authentication while maintaining confidentiality with TLS. Requires only server-side certificates
Elasticity
Scales resources as the demand increases or decreases
EV SSL Certificate
Extended Validation Certificate - certificate is provided by a Certificate Authority after additional checks have been made to validate the certificate owner’s identity.
Highest level of trust a company can inspire in its website visitor
Does not provide any additional encryption features, but makes your website super legit
False Negative
When malicious activity is identified as normal, no alert
False Positive
When normal activity is identified as an attack
Faraday Cage
An enclosure used to block electromagnetic fields/electromatic interference
Fault-tolerant
Can correct itself if a problem is identified
FTPS
File Transfer Protocol Secure – Transfers files from hosts to hosts over encrypted connection using TLS
Port 989/990 TCP
Fuzzing
Method of testing software that inputs random or unexpected data to examine the results
Used to test input validation by entering random, unexpected data into application fields to see how the software program reacts
Highly available
Environment maintains the availability of a system if a problem occurs. In a highly available environment, the corrections are implemented automatically and usually without the knowledge of the end user. An application platform that is constantly changing many not necessarily be highly available Refers to a system that needs to remain up and operational
HMAC
Hash-based Message Authentication Code - can check for data integrity and authenticity with a hash, does not provide encryption or decryption
Host-based firewall
Monitors traffic flows on host network. Does not commonly log hardware or USB drive access
HSM
Hardware Security Module - high-end cryptographic hardware appliance that can securely store keys and certificates for all devices. Physical device that acts as a secure cryptoprocessor during the encryption process
IaC
Infrastructure as code - describes the virtualization of infrastructure components such as firewalls, routers, and switches
Incremental Backup
Starts with a full backup. It backs up anything that has changed since the last full or incremental backup