Stuff from Exams I don't know #5 Flashcards
SDN
Software Defined Network
SofG
GEO/LEO networks?
Geo-stationary, Low-earth Orbit.
Both are satellite internet options, but LEO is faster with lower latency.
GDPR Privacy Shield, and relationship to Safe Harbor
NONE - Safe Harbor is deprecated, used prior to GDPR.
Decentralized vs centralized access controls - benefits and drawbacks
A decentralized access-control system keeps user IDs, rights, and permissions in different locations on the network. These locations are often spread out across different subnets by placing them on servers connected to networks contiguous to the user requesting access and utilizing linked or associated databases.
- More redundancy
- harder to scale
- harder to administer
A Centralized Access Control system keeps user IDs, rights, and permissions in a database on a central server.
-single point of failure
- easier to scale
- easier to administer
Major driver of Zero Trust
Proliferation of endpoint devices
PIDAS
PIDAS stands for perimeter intrusion detection and assessment system.
In DRP - is “Cloud Site” a term?
YES
Technology Convergence
Technological convergence is the tendency for technologies that were originally unrelated to become more closely integrated and even unified as they develop and advance.
RADIUS - TCP or UDP?
UDP
SMP, MPP Related to distributed computing?
SMP: Symmetric parallel processing
Mpp: Technology used to create systems that house hundreds or even thousands of processors, each of which has its own operating system and memory/bus resources.
SCA - security controls assessment?
NIST 800-53
The testing and/or evaluation of the management, operational, and technical security controls in an information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
DoD Model?
4 layers, analogous to TCP/IP system
Characteristics of Microservices
Derived from service-oriented-architecture:
A singular element, feature, capability, or funcion of a web app that can be called upon by other web apps.
NIST 800-53
Sec and Privacy controls for Federal Info Systems
Supervised learning vs unsupervised learning - machine learning
Supervised learning uses labeled training data, and unsupervised learning does not.
Slack Space
The unused space in a group of disk sectors. Or, the difference in empty bytes of the space that is allocated in clusters minus the actual size of the data files.
Expert Systems
A system that seeks to embody the accumulated knowledge of humankind on a particular subject and apply it in a consistent fashion to future decisions. The application of computer based artificial intelligence in areas of specialized knowledge.
Coverage Analysis
Test coverage analysis, or simply “coverage analysis,” refers to the relationship between the amount of source code in a given application and the percentage of code that has been covered by the completed tests.
Remember - RADIUS is not encrypted
SOAP - WS-Security
Web Services Security (WS-Security, WSS) is an extension to SOAP to apply security to Web services.
PCoIP
Type of remote access
bit-level image vs whole-disk copy
I don’t think whole-disk copy is technically a term.
TPI - Two person integrity?
form of M of N Control??
Can iSCSI run on ethernet?
YES - doesn’t typically use fiber
VPN - what is the Trailer used for?
Integrity check, trailer contains the hash of the payload.
A Remote Authentication Dial-In User Service (RADIUS) server uses ______ for authentication.
Symmetric Keys
IPSec - which mode provides true end to end encryption?
IPSec tunnel mode offers true end to end encryption. IPSec in transport mode offers point to point encryption. Neither HTML nor HTTP offers encryption.
Is XML Gateway a thing?
Yes
Credential Management API WC3 January 2019
The Credential Management API lets a website store and retrieve password, public key, and federated credentials
HPC - High Performance Computing
Used when Real-time or near real-time processing of massive data is needed for a particular task or application.
Three main components:
Compute Resources, Network capabilities, storage capacity
MAC Environments - Hierarchical, Compartmentalized, Hybrid
Hierarchicacl - can only access at own level.
Compartment - can only access in your compartment, but at all levels.
Hybrid - both are in place.
Client based CDN
AKA P2P, example, Bittorrent
Machine learning
Uses mathematical approaches to analyze data, searching for patterns that predict future activity.
SRAM vs DRAM
SRAM - uses inexpensive memory with latches called flip-flops
DRAM - Stores bits in small capacitors
Most Secure form of EAP
EAP-TLS because it requires mutual authentication
Combinatorial software testing
Combinatorial software testing is a black-box testing method that seeks to identify and test all unique combinations of software inputs.
MTD = RTO + WRT
RTO = time to bring system back online
WRT = time to configure system after back online
Acceptance Testing
Determines whether software meets end user/customer expectations.
photoelectric sensor
Photoelectric smoke detectors help detect smoke from smoldering fires.
Serverless Architecture AKA FAAS (function as a service)
Serverless architecture refers to a cloud computing model where the cloud provider manages the infrastructure and servers dynamically, allocating resources as needed. In a serverless architecture, developers can focus on writing code and deploying applications without worrying about managing the underlying infrastructure such as servers, operating systems, or scaling resources.
Cloud based federation
Cloud-based federation typically uses the third party service to share federated identities.
A common method is to match the users internal login ID with a federated identity externally.
On premise federation
This is a federation hosted on premises. One example is if two companies merge and have separate SSO systems, but both organizations need to be able to authenticate with each other.
Hybrid federation
Combination of cloud-based and on-premise solution. For example, acme has a cloud-based federation providing employees with online training, but after a merger with EMCA, they implement an on-premises solution to share identities with the two companies.
Compliance checks
Compliance checks are a part of security testing and assessment programs for regulated firms. These checks verify that all controls listed are in compliance and functioning properly and effectively meeting regulatory requirements.
DAD triad
Opposite of CIA
disclosure, alteration, destruction
URL rewriting
With URL rewriting, all links that are returned to the browser or that get redirected have the session ID appended to them
Avalanche Effect
Hashing - when one input character changes, the entire hash changes as well.
Is a Signed Check an example of MFA??
Yes! the Signature is “Something you are” the Check is “Something you have”
Session keys use what kind of key?
Symmetric
What secure sanitization method is available to Cloud Users?
Cryptoshredding.
Aggregation vs Inference Attack
Aggregation attack as an individual used his access to specific pieces of information to piece together a larger picture than he/she is authorized to access. An inference as the attacker used several pieces of generic nonsensitive information to determine or learn specific sensitive value.
ECDSA
Elliptic curve digital signature algorithm - hashing algorithm that provides integrity and nonrepudiation
System High Mode
Information systems security mode of operation wherein each user, with direct or indirect access to the information system, its peripherals, remote terminals, or remote hosts, has all of the following:
valid security clearance for all information within an information system;
formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, sub compartments and/or special access programs);
and
valid need-to- know for some of the information contained within the information system.
Isolation Breach??
IN a distributed compute environment - an isolation breach is where one distributed computing client gains access to all other devices in the distributed environment.
Types of ATOs (authorization to operate)
Authroization to operate, common control authorization, authorization to use.
Distributed compute environment, AKA Distributed System
Primary concern is interconnectedness of the components.
Examples, DNS, MMORPGs, mobile networks, and most websites.
Common Control Security Target
Specify the claims of security from the vendor that are built into the Target of Evaluation.
Lists out what the vendor will provide
Who adds a certificate to the CRL?
The CA that issued the certificate.
New 5G enhancements over 4G
Enhanced subscriber identity protection
Mutual auth capabilities
Prudent Man Rule
Requires that Senior Management take personal responsibility for ensuring due care.
Multitasking vs MultiThreading
CCMP WPA2
AES based encryption method for WPA2
Lost update - SQL
When one transaction writes a value to the DB that was needed by a transaction with earlier precedence.
ECPA
Electronic communications privacy act. Makes it a crime to have had the privacy of others electronically
Brewer Nash model
Explanation
The Brewer-Nash model allows access controls to change dynamically based upon a user’s actions. It is often used in environments like Matthew’s to implement a “Chinese wall” between data belonging to different clients.
Minimum effective time for mandatory vacation
One week
Does roll-based access control allow users to be part of multiple groups?
Yes
SLR
Service level requirement