Stuff from Exams I don't know #2 Flashcards
Trusted Platform Module - Remote Attestation
TPM uses Remote Attestation to create a hash summary of they system configuration to verify that changes have not been made.
Trusted Platform Module - Binding and Sealing
Binding and Sealing are techniques used to encrypt data.
Is a centrallized log server sometimes called a Bastion Host?
Yes.
Pre-action sprinkler system
Best option for a computer facility because it provides the opportunity to prevent the release of water.
A combination dry pipe/wet pipe system. The system exists as a dry pipe until the initial stages of a fire (smoke, heat, and so on) are detected and then the pipes are filled with water. The water is released only after the sprinkler head activation triggers are melted by sufficient heat. If the fire is quenched before the sprinklers are triggered, the pipes can be manually emptied and reset. This also allows for manual intervention to stop the release of water before sprinkler triggering occurs. Preaction systems are the most appropriate water-based system for environments that include both computers and humans in the same locations.
Two-person control
An example of M of N control.
In this case 2 people are required to both approve and take action for something to happen.
Confinement (software development)
When a system restricts the access of a particular process to limit its ability to affect other processes running on the same system.
Example: Sandboxing, running in a VM, etc.
OpenID vs Oauth
OAuth provides access/authorization, while OpenID provides authentication.
Real User Monitoring
AKA RUM: passive monitoring technique that records user interaction with an application or system to ensure performance and proper application behavior.
Synthetic Monitoring
Uses simulated behavior against a system to monitor performance/behavior.
Passive Monitoring
Monitors live network traffic in a passive way, i.e. mirrored.
Military and intelligence attack
Goal is to obtain secret and restricted information from military or law enforcement systems. Targets the classified data that resides on systems.
ISO 27001 vs 27002
27001 is the standard for international information security management, and ISO 27002 is a supporting standard that guides how the information security controls can be implemented.
Which key is used to enforce referential integrity between database tables?
Foreign Key
Split-response attack
Can be used to force a client to inadvertently download content that wasn’t intended.
DOM XSS Attack
DOM-based cross-site scripting is a type of cross-site scripting (XSS) where the attack takes advantage of the Document Object Model (DOM).
The DOM is an internal data structure that stores all of the objects and properties of a web page. For example, every tag used in HTML code represents a DOM object. Additionally, the DOM of a web page contains information about such properties as the page URL and meta information. Developers may refer to these objects and properties using JavaScript and change them dynamically.
Is an “Alternative system” a term?
Yes - in a BIA this refers to alternate/redundant resources, i.e. backup connections.
What type of access control does a NAC usually represent?
Risk-based Access Control
Pseudonymization vs Tokenization vs anonymization
Pseudonymization is simply replacing data with artificial identifiers.
Tokenization specifically uses a token/randomized string of characters as an identifier.
Anonymization - removes all relevant personal data so that it is theoretically impossible to identify the subect.