Sybex Chps 1-7 Flashcards
Integrity is dependent on what?
Confidentiality
Availability
Confidentiality
Without confidentiality then integrity cannot be maintained.
Availability depends on what?
Confidentiality
Integrity
Both.
Without Integrity and Confidentiality, Availability cannot be maintained.
True / False
Identification and authentication are always used together as a single two-step process
True
Should layers be used in serial or in parallel?
Serial - these are very narrow but deep configurations
__________ simplifies security by enabling you to assign controls to a group of objects collected by type or function.
Abstraction
True or False
Security governance is the implementation of a security solution and a management method that are loosely connected.
False
Security governance is the implementation of a security solution and a management method that are TIGHTLY connected.
It is the responsibility of __________ to flesh out the security policy into standards, baselines, guidelines, and procedures.
Middle Management
Security management is a responsibility of
Upper Management
Developing and implementing a security plan is evidence of __________ on the part of senior management.
Due Care
Due Diligence
Both Due Care and Due Diligence
Long term plan that is fairly stable (5 years of so)
Strategic Plan
Tactical Plan
Operational Plan
Strategic Plan
Short-term plan, highly detailed
Strategic Plan
Tactical Plan
Operational Plan
Operational Plan
midterm plan (about a year)
Strategic Plan
Tactical Plan
Operational Plan
Tactical Plan
Change Management is a requirement for systems complying with what classifications of ITSEC?
B2, B3, A1
True of False
Change Management requires:
1) Detailed inventory of every component and configuration
2) collection and maintenance of complete documentation for every system component
True
True or False
Data Classification is used to determine how much effort, money, and resources are allocated to protect data and control access to it.
True
What are the seven major steps to implement a classification scheme?
- Identify the custodian
- Specify the evaluation material
- Classify and label each resource
- Document any exceptions
- Select the security controls
- Specify procedures for declassifying resources / transferring custody
- Create an enterprise-wide awareness program
Will cause significant effects / critical damage
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Secret
Will cause drastic effects / grave damage
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Top Secret
Will cause noticeable effects / serious damage
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Confidential
Does not compromise or cause any noticeable effects
Top Secret Secret Confidential Sensitive but Unclassified Unclassified
Unclassified
In the private sector classification levels, which level is used for private or personal nature?
Confidential
Private
Sensitive
Public
Private
In the private sector classification levels, which level is sometimes labeled proprietary?
Confidential
Private
Sensitive
Public
Confidential
In the private sector classification levels, which level may contain medical information or PHI?
Confidential
Private
Sensitive
Public
Private
Responsible for understanding and upholding the security policy by following the prescribed operational procedures and operating within defined security parameters.
Security Professional Data Owner Data Custodian User Auditor
User
Ultimately responsible for data protection
Security Professional Data Owner Data Custodian User Auditor
Data Owner
Performs all activities necessary to provide adequate protection to CIA of data to fulfill requirements
Security Professional Data Owner Data Custodian User Auditor
Data Custodian
Responsible for implementing security policy
Security Professional
True / False
COBIT is used not only to plan the IT security of an organization but also as a guideline for auditors.
True
What is STRIDE used for?
Assessing threats against applications or operating systems.
What does STRIDE stand for?
Used in Threat Modeling
Spoofing Tampering Repudiation Information disclosure DoS Elevation of privledge
What three things do company’s face threats from?
Nature
Technology
People
What are the basics of Threat Modeling?
Threat Modeling is the security process where potential threats are identified, categorized, and analyzed.
Key concepts include:
- -assets / attackers / software
- -STRIDE
- -Diagramming
- -Reduction analysis
- -Rate threats (DREAD)
What is DREAD stand for?
Used in Threat Modeling
Damage Potential Reproducibility Exploitability Affected Users (% number) Discoverability
What needs to happen before actual security training can take place?
Security awareness needs to be created first.
What is the primary purpose of the exit interview?
to review the liabilities and restrictions placed on the former employee based on the employment agreement, NDA, and other security documents.
What is the primary goal of risk management?
To reduce risk to an acceptable level
How is risk management achieved?
Primarily achieved through risk analysis (qualitative and quantitative)
The absence or the weakness of a safeguard or countermeasure
Vulnerability Risk Safeguard Exposure Attack Breach Penetration
Vulnerability
The possibility that a vulnerability can or will be exploited by a threat agent or event
Vulnerability Risk Safeguard Exposure Attack Breach Penetration
Exposure
Threat * Vulnerability =
Vulnerability Risk Safeguard Exposure Attack Breach Penetration
Risk
Anything that removes or reduces a vulnerability
Vulnerability Risk Safeguard Exposure Attack Breach Penetration
Safeguard
The exploitation of a vulnerability by a threat agent
Vulnerability Risk Safeguard Exposure Attack Breach Penetration
Attack
The occurrence of a safety mechanism being bypassed by a threat agent
Vulnerability Risk Safeguard Exposure Attack Breach Penetration
Breach
When a breach is combined with an attack this can result
Vulnerability Risk Safeguard Exposure Attack Breach Penetration
penetration or intrusion
AV * EF =
SLE
SLE * ARO =
ALE
What is the whole point of a safeguard?
The whole point of a safeguard is to reduce the Annualized Rate of Occurrence (ARO).
Even if the EF stays the same, a safeguard should change the ARO
Should you accept the risk if:
The cost of the countermeasure is greater than the value of the asset?
Yes, accept the risk if the cost of the countermeasure is greater than the value of the asset
How do you calculate the safeguard cost / benefit?
ALE before safeguard - ALE after implementing the safeguard - annual cost of safeguard (ACS) = value of the safeguard to the company
OR
(ALE1 - ALE2) - ACS
This provides anonymous feedback and response to gain a consensus.
Delphi Technique
True or False
If a security control’s benefits cannot be quantified, evaluated, or compared, then it does not actually provide any security.
True
True or False
If an asset has no value - you do not need to protect it.
True
True or False
Annual cost of safeguards should not exceed the annual cost of asset loss.
True
What are the six steps of the NIST Risk Management Framework?
Categorize Select Implement Assess Authorize Monitor
True or False
Training established a minimum standard common denominator or foundation of security understanding.
False
Awareness established a minimum standard common denominator or foundation of security understanding.
__________ is the amount of risk an organization would face if no safeguards were implemented.
Residual Risk
Total Risk
Controls Gap
Vulnerability
Total Risk
threats * vulnerabilities * asset value = total risk
What is the difference between total risk and residual risk?
Residual Risk
Total Risk
Controls Gap
Vulnerability
The controls gap (the amount of risk that is reduced by implementing safeguards)
Risk that remains after implementing a safeguard
Residual Risk
Total Risk
Controls Gap
Vulnerability
Residual Risk
total risk - controls gap = residual risk
Copyright law protects works by one or more authors for __________ years
70 years after the last surviving author
Copyright law protects works for hire for __________ years
95 years from the first date of publication or 120 years from the date of creation, whichever is shorter.
Protects words, slogans, and logos
Copyright
Trademark
Patent
Trade Secret
Trademark
Protects intellectual property rights of inventors
Copyright
Trademark
Patent
Trade Secret
Patent
Patent law protects inventions for __________ years
20 beginning at the time of the patent application
One of the best ways to protect computer software
Copyright
Trademark
Patent
Trade Secret
Trade Secret
The best way to sanitize an SSD is:
The best way to sanitize a solid state drive is to destroy it.
Oftentimes IPSec is combined with __________ for VPNs
L2TP
What are the seven EU Data Protection Safe Harbor Principals?
Notice Choice Onward transfer Security Data integrity Access Enforcement
ROT3 is another name for:
Caesar cipher
Caesar Cipher is vulnerable to:
frequency analysis
This type of cryptosystem does not guarantee non-repudiation
Secret key (symmetric key)
Public key or asymmetric key provides this
What is the Kerchoff Principal?
a concept that algorithms known and made public are more secure (the enemy knows the system)
AND (^) truth table:
0 ^ 0 = 0
0 ^ 1 = 0
1 ^ 0 = 0
1 ^ 1 = 1
OR (˅) truth table
0 ˅ 0 = 0
0 ˅ 1 = 1
1 ˅ 0 = 1
1 ˅ 1 = 1
NOT (~) truth table
~0 = 1 ~1 = 0
XOR truth table (circle with a plus inside it)
0 XOR 0 = 0
0 XOR 1 = 1
1 XOR 0 = 1
1 XOR 1 = 0
modulo (mod) is remainder math.
8 mod 6 =
2
6 will go into 8 only 1 time with a remainder of 2
modulo (mod) is remainder math.
10 mod 3 =
1
3 will go into 10 3 times with a remainder of 1
modulo (mod) is remainder math.
10 mod 2 =
0
2 will go into 10 5 times with a remainder of 0
True or False
A nonce is used in an IV as a random bit string that is the same length as the block size and is XORed with the message
True
An example of Split knowledge is
M of N Control
What is the difference between a code and a cipher?
A code are symbols that represent words or phrases that may or may not be secret.
Ciphers are always meant to be secret
Rearrange letters of plaintext message
Transposition Cipher
Substitution Cipher
Transposition Cipher
Replace each character or bit of the plaintext message with a different character.
Transposition Cipher
Substitution Cipher
Substitution Cipher
What are the four rules of a one-time pad?
- One-time pad must be randomly generated
- physically protected against disclosure
- Only used once
- Key must be at least as long as the message
What is another name for a running key cipher?
Book Cipher
Major strength of symmetric key cryptography:
great speed that it can operate (1,000 to 10,000 times faster that asymmetric)
Major weaknesses of symmetric key cryptography:
- Key distribution (out of band)
- no non-repudiation
- not scaleable (number of keys needed for large implementations)
- Keys must be regenerated often (each time a participant needs to leave the group)
- Provides confidentiality only
Major strengths of asymmetric key cryptography:
- New users only require two new keys (public and private)
- Users can be removed from the system very easily (key revocation)
- Key regeneration is only required when a private key is compromised
- Provides confidentiality plus integrity, authentication, and non-repudiation
- Key distribution is simple process
- No preexisting communication links need to exist
Major weakness of asymmetric key cryptography:
Slow speed
DES (Data Encryption Standard)
Symmetric Block Cipher
64-bit blocks of text
Key is 56 bits long
Electronic Codebook Mode (ECB)
- -vulnerable to creating a code book of all possible values (block)
- -do not use except for short transmissions
Cipher Block Chaining Mode (CBC)
- -IV must be sent to recipient
- chaining (errors propagate)
Cipher Feedback Mode (CFB)
- -Streaming version of CBC
- -uses an IV and chaining (errors propagate)
Output Feedback Mode (OFB)
- -IV is a seed value (stream)
- -no chaining, errors do not propagate
Counter Mode (CTR)
- -stream, errors do not propagate
- -allows encrypt or decrypt to be broken into multiple independent steps - good for parallel computing
Electronic Codebook Mode (ECB)
- -block
- -vulnerable to creating a code book of all possible values
- -do not use except for short transmissions
Cipher Block Chaining Mode (CBC)
- -chaining
- -IV must be sent to recipient
- -errors propagate
Cipher Feedback Mode (CFB)
- -Streaming version of CBC
- -uses an IV and chaining
- -errors propagate
Output Feedback Mode (OFB)
- -stream
- -IV is a seed value
- -no chaining
- -errors do not propagate
Counter Mode (CTR)
- -stream
- -errors do not propagate
- -allows encrypt or decrypt to be broken into multiple independent steps - good for parallel computing
3DES
Do not use DES (Replacement for DES)
Uses three iterations of DES with two or three different keys to increase the effective key strength to 112 or 168 bits respectively.
IDEA (International Data Encryption Algorithm)
Symmetric Block Cipher
64-bit blocks of text
Key is 128 bits long
Capable of the same five modes as DES
(ECB, CBC, CFB, OFB, CTR)
Blowfish
Symmetric Block Cipher
64-bit blocks of text
Key is 32 to 448 bits long
Faster than DES and IDEA
Available for public use
Skipjack
Symmetric Block Cipher
64-bit blocks of text
Key is 80 bits long
Supports the escrow of encryption keys (NIST and US Treasury)
Capable of the same five modes as DES
(ECB, CBC, CFB, OFB, CTR)
AES (Advanced Encryption Standard)
Symmetric Block Cipher 128-bit blocks of text Key is: 128-bit requires 10 rounds of encryption 192-bit requires 12 rounds of encryption 256-bit requires 14 rounds of encryption
RC-4 (Rivest Cipher)
Symmetric Stream Cipher
Streaming (no block size)
Key is 128 bits long
Three main ways to exchange symmetric keys
- offline distribution
- public key encryption
- Diffie-Hellman (uses large integers and modular arithmetic to facilitate the secret exchange of keys over insecure channels)
Modern keys should be at least what size to provide adequate protection?
128 bits long
RSA
Asymmetric Cipher
Depends on the computational difficulty inherent in factoring large prime numbers
El Gamal
Asymmetric Cipher
An extension of the Diffie-Hellman key exchange algorithm that depends on modular (remainder) math.
Elliptical Curve
Asymmetric Cipher
Depends on the elliptic curve discrete logarithm problem
Provides more security than other algorithms when using the same key length (1088-bit RSA key is equal to a 160-bit Elliptical curve key)
What are the five basic requirements for a hash function?
- The input can be any length
- The output has to be a fixed length
- The hash function is relatively easy to compute for any input
- The hash function is one-way
- The hash function is collision free
SHA
SHA-2 or SHA-256
512-bit blocks of text produces
256-bit message digest
SHA-1 is broken
Two goals of Digital Signatures
- create non-repudiation
2. assure integrity of message (has not changed in transit)
In email, if you need confidentiality, what do you do?
Encrypt the message
Sender always encrypts the message
In email, if you need integrity, what do you do?
Hash the message
Sender always hashes the message
In email if you need authentication, integrity, or non-repudiation, what do you do?
Digitally sign the message
Sender always digitally signs the message
In email, if you need confidentiality, authentication, integrity, or non-repudiation, what do you do?
Encrypt and digitally sign the message
Sender ALWAYS is responsible for using proper mechanisms to ensure the CIA of the email message
PGP commercial version uses what?
RSA for key exchange
IDEA for encryption
MD5 for message digest
PGP free version uses what?
Diffie-Hellman for key exchange
CAST 128-bit for encryption
SHA-1 for message digest
MD5
MD5
512-bit blocks of text produces
128-bit message digest
Uses four distinct rounds
Padding: message length must be 64-bits less than 512-bits
S/MIME
Secure Multipurpose Internet Mail Extensions
Supported by Outlook, Mozilla Thunderbird, MAC OS X Mail
Uses:
- -RSA encryption (public key)
- -AES encryption (symmetric key)
- -3DES encryption (symmetric key)
True or False
SSL relies on the exchange of server digital certificates to negotiate encryption
True
- User accesses a website, browser retrieves web server’s certificate and extracts server’s public key
- Browser creates random symmetric key, uses server’s public key to encrypt it, and sends it back to the server.
- Server decrypts the symmetric key using it’s own private key, and the two systems exchange all future messages via symmetric key encryption
Protects the entire communications circuit by creating a secure tunnel between two points (using hardware or software that encrypts all traffic entering one end of the tunnel and decrypts all traffic exiting the other end)
End-to-end encryption
Link encryption
Link encryption
All data, including the header , trailer, address, and routing data is encrypted.
This slows down traffic routing as each packet has to be decrypted and encrypted at each hop to understand routing information.
When encryption happens at lower OSI layers, it is usually link encryption
Protects communications between two parties (for example, a client and a server) and is performed independently of link encryption. Example: TLS between a user and a web server
End-to-end encryption
Link encryption
End-to-end encryption
Does not encrypt header, trailer, address, and routing data so it moves faster from point to point but is more susceptible to sniffers and ease-droppers.
When encryption happens at higher OSI layers, it is usually end-to-end encryption (TLS, SSH)
True or False
IPSec relies on public key cryptography
True
IPSec uses public key cryptography to provide encryption, access control, non-repudiation, and message authentication using all IP-based protocols
Primary use of IPSec is VPNs and is commonly paired with L2TP
True of False
WPA provides end-to-end encryption
False
WPA only encrypts traffic between the wireless computer and the AP. After the AP, the traffic is in the clear again.