SY0-701: 4.0 (Security Operations) Flashcards
DLP (4.4)
Data Loss Prevention- Set up to monitor the data of a system while it’s in use, in transit, or at rest in order to detect any attempts to steal the data (hardware or software)
Endpoint DLP Systems (4.4)
a piece of software that’s installed on a workstation or a laptop that monitors the data that’s in use on that computer
Network DLP System (4.4)
A piece of software or hardware placed at the perimeter of the network to detect data in transit
Storage DLP System (4.4)
Software installed on a server which inspects the data while it’s at rest
Cloud-Based DLP System (4.4)
Usually offered as Software as a Service (SaaS) and it’s part of the cloud service and storage system
Acquisition / Procurement (4.2)
Acquisition- Process of obtaining goods or services
Procurement- Encompasses the full process of acquiring goods and services, including all preceding steps
BYOD (4.1)
Bring Your Own Device- Permits employees to use personal devices for work
-Employees have control over device security
COPE (4.1)
Corporate-Owned, Personally Enabled- Involves the company providing a mobile device to employees for both work and personal use
CYOD (4.1)
Choose Your Own Device- Offers a middle ground between BYOD and COPE by allowing employees to choose devices from a company-approved list
Asset Management (4.2)
Refers to the systematic approach to governing and maximizing the value of items an entity is responsible for throughout their lifecycle
Assignment / Allocation of Assets (4.2)
Every organization should designate individuals or groups as owners of the assets
Asset Classification (4.2)
Involves categorizing assets based on criteria like function, value, or other relevant parameters as determined by the organization
Asset Monitoring (4.2)
Maintaining an inventory/record of every asset including specifications, location, assigned users, and other relevant details
Asset Tracking (4.2)
Takes asset monitoring a bit further; Involves maintaining a comprehensive inventory with asset specifications, locations, and assigned users, along with its condition and status using specialized software
Asset Enumeration (4.2)
Involves identifying and counting assets, especially in large organizations or during times of asset procurement or retirement
MDM (4.2)
Mobile Device Management- Lets organizations securely oversee employee devices, ensuring policy enforcement, software consistency, and data protection
Special Publication 800-88 (4.2)
Guidelines for media sanitization- Guidance on media sanitization, destruction, and certification
Media Sanitization (4.2)
Thorough process of making data inaccessible and irretrievable from a storage medium using traditional forensic methods
-Overwriting data
-Degaussing
-Encryption Techniques
CE (Media Sanitization) (4.2)
Cryptographic Erase- Faster than deleting data because the cryptographic keys are what gets erased
Media Destruction (4.2)
Ensures the physical device itself is beyond recovery or reuse
-Shredding
-Pulverizing
-Melting
-Incinerating
Certification (Media Sanitization) (4.2)
An act of proof that the data or hardware has been securely disposed of
Port (4.5)
Logical communication endpoint that exists on a computer or server
Inbound Port (4.5)
Logical communication opening on a server that is listening for a connection from a client
Outbound Port (4.5)
Logical communication opening created on a client in order to call out to a server that is listening for a connection
Well-Known Ports (4.5)
Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)
Registered Ports (4.5)
Ports 1024 to 49,151 are considered registered and are usually assigned to proprietary protocols
Dynamic and Private Ports (4.5)
Port 49,152 to 65,535 can be used by any application without being registered with IANA
Protocol (4.5)
Rules governing device communication and data exchange
Port 21 (4.5)
Over TCP
FTP: File Transfer Protocol
Used to transfer files from host to host
Port 22 (4.5)
Over TCP
SSH: Secure Shell
SCP: Secure Copy Protocol
SFTP: Secure File Transfer Protocol
Provides secure remote terminal access as well as file transfer capabilities (SSH)
Provides secure copy functions (SCP)
Provides secure file transfers (SFTP)
Port 23 (4.5)
Over TCP
Telnet
Provides insecure remote control of another machine using a text-based environment; older version of SSH, unencrypted and therefore unsecure
Port 25 (4.5)
Over TCP
SMTP: Simple Mail Transfer Protocol
Provides the ability to send emails over the network
Port 53 (4.5)
Over TCP and UDP
DNS: Domain Name Server
Translates domain names into IP addresses
Port 69 (4.5)
Over UDP
TFTP: Trivial File Transfer Protocol
Used as a lightweight file transfer method for sending configuration files or network booting of an operating system
Port 80 (4.5)
Over TCP
HTTP: Hyper-Text Transfer Protocol
Used for unsecured web browsing
Port 88 (4.5)
Over UDP
Kerberos
Network authentication protocol
Port 110 (4.5)
Over TCP
POP3: Post Office Protocol version 3
Responsible for retrieving email from a server
Port 119 (4.5)
Over TCP
NNTP: Network News Transfer Protocol
Used for accessing newsgroups
Port 135 (4.5)
Over TCP and UDP
RPC: Remote Procedure Call
Facilitates communication between different system processes
Ports 137, 138, and 139 (4.5)
Over TCP and UDP
NetBIOS
Networking protocol suite
Port 143 (4.5)
Over TCP
IMAP: Internet Message Access Protocol
Allows access to email messages on a server
Port 161 (4.5)
Over UDP
SNMP: Simple Network Management Protocol
Manages network devices
Port 162 (4.5)
Over UDP
SNMP Trap
Responsible for sending SNMP trap messages
Port 389 (4.5)
Over TCP
LDAP: Lightweight Directory Access Protocol
Facilitates directory services
Port 443 (4.5)
Over TCP
HTTPS: Hyper-Text Transfer Protocol Secure
Provides secure web communication
Port 445 (4.5)
Over TCP
SMB: Server Message Block
Used for file and printer sharing over a network
Ports 465 and 587 (4.5)
Over TCP
SMTPS: Simple Mail Transfer Protocol Secure
Provides secure SMTP communication
Port 514 (4.5)
Over UDP
Syslog
Used for sending log messages
Port 636 (4.5)
Over TCP
LDAPS: Lightweight Directory Access Protocol Secure
LDAP communication over SSL/TLS
Port 993 (4.5)
Over TCP
IMAPS: Internet Message Access Protocol Secure
Used for secure email retrieval over SSL/TLS
Port 995 (4.5)
Over TCP
POP3S: Post Office Protocol Secure
Used for secure email retrieval over SSL/TLS
Port 1433 (4.5)
Over TCP
Microsoft SQL
Used to facilitate communication with Microsoft SQL Server
Ports 1645 and 1646 (4.5)
Over TCP
RADIUS TCP
Used for remote authentication, authorization, and accounting
Ports 1812 and 1813 (4.5)
Over UDP
RADIUS UDP
Used for authentication and accounting as defined by the Internet Engineering Task Force (IETF)
Port 3389 (4.5)
Over TCP
RDP: Remote Desktop Protocol
Enables remote desktop access
Port 6514 (4.5)
Over TCP
Syslog TLS
Used in a secure syslog that uses SSL/TLS to encrypt the IP packets using a certificate before sending them across the IP network to the syslog collector
ACL (4.5)
Access Control List- A rule set that is placed on firewalls, routers, and other network infrastructure devices that permit or allow traffic through a particular interface
IAM (4.6)
Identity and Access Management- Systems and processes used to manage access to information in an organization to ensure that the right individuals have access to the right resources at the right times for the right reasons
Identification (4.6)
Process where a user claims an identity to a system, typically using a unique identifier like a username or an email address
Authentication (4.6)
Process of verifying the identity of a user, device, or system and this involves validating the credentials provided by the user against a database of authorized users
Authorization (4.6)
Process that determines what permissions or levels of access the user has
Accounting (4.6)
Process of tracking and recording user activities
IAM 4 Steps (4.6)
Identification
Authentication
Authorization
Accounting
Provisioning (4.6)
Process of creating new user accounts, assigning them appropriate permissions, and providing users with access to systems
Identity Proofing (4.6)
Process of verifying the identity of a user before the account is created
Interoperability (4.6)
The ability of different systems, devices, and applications to work together and share information
Attestation (4.6)
Process of validating that user accounts and access rights are correct and up-to-date
MFA (4.6)
Multi-Factor Authentication- Security system that requires more than one method of authentication from independent categories of credentials to verify the users identity
Passkeys (4.6)
Users can create and access online accounts without needing to input a password; public key is stored on server and private key is stored on users device (therefore if server is compromised the attacker only gets the public key)
Password Security (4.6)
Measures the passwords ability to resist guessing and brute-force attacks
Password Policy Characteristics (4.6)
Length- should be 12-16 characters
Complexity- mix case, numbers and symbols
Reuse- using the same password for different accounts increases risk
Expiration- mandates regular password changes (no longer recommended because users are more likely to reuse passwords
Age- length of time password has been in use
Password Managers (4.6)
Tools that store, generate, share, and autofill passwords to enhance security
Passwordless Authentication (4.6)
Provides improved security and a more user-friendly experience
-Biometrics
-Hardware tokens
-One-time passwords (OTP- e.g. code sent to phone or email)
-Magic links (email link automatically logs user into website)
-Passkeys (integrates with browser or operating system
SSO (4.6)
Single Sign-On- Authentication process that allows a user to access multiple applications or websites by logging in only once with a single set of credentials
IdP (4.6)
Identity Provider- System that creates, maintains, and manages identity information for principals while providing authentication services to relying applications within a federation or distributed network
Protocols used with single sign-on (SSO) (4.6)
LDAP/LDAPS- Lightweight Directory Access Protocol
OAuth- Open Authorization
SAML- Security Assertion Markup Language
OAuth (4.6)
Open standard for token-based authentication and authorization that allows an individuals account information to be used by third-party services without exposing the users password (e.g. when you sign on a website using Google account)
SAML (4.6)
Security Assertion Markup Language- A standard for logging users into applications based on their sessions in another context; allows services to separate from identity providers and removes the need for direct user authentication
Federation (4.6)
Process that allows for the linking of electronic identities and attributes to store information across multiple distinct identity management systems
Federation Login Process (4.6)
Login Initiation
Redirection to an identity provider
Authenticating the user
Generation of an assertion
Returning to a service provider
Verification and access
PAM (4.6)
Privileged Access Management- Solutions that helps organizations restrict and monitor privileged access within an IT environment
PAM key components (4.6)
Just-In-Time Permissions (JIT Permissions)
Password Vaulting
Temporal Accounts
JIT Permissions (4.6)
Security model where administrative access is granted only when needed for a specific period
Password Vaulting (4.6)
Technique used to store and manage passwords in a secure environment, such as in a digital vault
Temporal Accounts (4.6)
Used to provide time-limited access to resources, and they are automatically disabled or deleted after a certain period of time
MAC (reference access) (4.6)
Mandatory Access Control- Employs security labels to authorize user access to specific resources; used in environments of high data security where users cant modify their own permissions
DAC (4.6)
Discretionary Access Control- Resources owner determines which users can access each resource
RBAC (Role) (4.6)
Role-Based Access Control- Assigns users to roles and uses these roles to grant permissions to resources
RBAC (Rule) (4.6)
Rule-Based Access Control- Enables administrators to apply security policies to all users
ABAC (4.6)
Attribute-Based Access Control- Uses object characteristics for access control decisions
Resource Attributes (4.6)
File creation date, resource owner, file owner, and data sensitivity
Time-of-day Restrictions (4.6)
Controls restrict resource access based on request times (e.g. don’t allow user logins during midnight hours)
Principle of Least Privilege (4.6)
A user should only have the minimum access rights needed to perform their job functions and tasks, and nothing additional or extra
Permission/Authorization Creep (4.6)
Occurs when a user gains excessive rights during their career progression in the company
UAC (4.6)
User Access Control- A mechanism designed to ensure that actions requiring administrative rights are explicitly authorized by the user
DAC (SELinux) (4.5)
Discretionary Access Control- Each object has a list of entities that are allowed to access it
Context-Based Permission (4.5)
Permission schemes that are defined by various properties for a given file or process
Baselining (4.5)
Process of measuring changes in the network, hardware, or software environment
Security Template (4.5)
A group of policies that can be loaded through one procedure
Group Policy Editors (4.5)
gpedit (Windows)
Group Policy (4.5)
Set of rules or policies that can be applied to a set of users or computer accounts within an operating system
SELinux (4.5)
Security-Enhanced Linux- Set of controls (default context-based permission scheme) that are installed on top of another Linux distribution like CentOS or Red Hat Linux
defines 3 main contexts for each file and process
1. User- Defines what users can access an object(_u)
2. Role- Defines what roles can access a given object (_r)
3. Type- Groups objects together that have similar security requirements or characteristics
4. Level- Used to describe the sensitivity level of a given file, directory, or process
SELinux User Types (4.5)
Unconfined_u (All Users)
User_u (Unprivileged users)
Sysadmin_u (System Administrators)
Root (Root User)
SELinux Modes (4.5)
Disabled- SELinux is essentially turned off, and so MAC is not going to be implemented
Enforcing- All the SELinux security policies are being enforced
Permissive- SELinux is enabled but the security policies are not enforced
SELinux Policy Types (4.5)
Targeted- Policies are enforced only for specified objects
Strict- Policies are enforced for every object
Secure Baseline (4.1)
Standard security configuration applied to guarantee minimum security for a system, network, or application
Secure Baseline Steps (4.1)
Establish- Set up a system including security and applications and then create image
Deploy- Apply baseline image to assets
Maintain- Ensure systems are locked down and continually install patches/updates etc.
ESS (4.1)
Extended Service Set Configuration- Involves multiple wireless access points working together to create a unified and extended coverage area for users in a large building or facility
Optimal Wireless Channels for 2.4GHz Range (4.1)
Channels 1, 6, and 11 (When selected the listed channels won’t interfere with each other)
Site Survey (4.1)
Process of planning and designing a wireless network to provide a solution
Heat Map (4.1)
Graphical representation of the wireless coverage, the signal strength, and frequency utilization data at different locations on a map