Terms Flashcards
What are the 6 control types?
- Preventative
- Detective
- Corrective
- Deterrent
- Compensating
- Directive
What are the 4 control categories?
- Managerial
- Physical
- Operational
- Technical
What does the CIA Triad stand for and what does it mean?
C - Confidentiality (Certain info should only be know to certain people, encryption, access control, 2 factor authentication, etc.)
I - Integrity (Data is stored and transferred as intended, hashing, certificates, etc.)
A - Availability (Information is accessible to authorized users, redundancy, fault tolerance, etc.)
What is a threat vector?
A method used by the attacker to gain access or infect the target
What are the various types of threat vectors?
- Message-based vectors
- Phishing attacks
- Social Engineering Attacks
- Image-based vectors
- HTML injection
- image formats can be a threat
- File-based vectors
- more than just .exe
- PDF, ZIP/RAR files, Office
- Voice call vectors
- Vishing
- War dialing
- Removable device vectors
- Vulnerable software vectors
- Unsupported systems vectors
- Insecure network vectors
- Open Service Ports
- Default Credentials
- Supply chain vectors
What is an on-path network attack?
Known as a man-in-the-middle attack, redirects traffic then passes it on to the destination. Can be achieved with ARP poisoning on the local IP subnet
What is an on-path browser attack?
Similar to the man-in-the-middle attack but if the middleman is on the same computer as the victim. Allows malware/trojan to do all of the proxy work. Relatively easy to proxy encrypted traffic, and looks normal to the victim.
What does IaaS, PaaS, and SaaS mean?
Infrastructure as a Service, Platform as a Service, and Software as a Service
What does EAP mean and do?
Stands for Extensible Authentication Protocol (EAP), and is an authentication framework. EAP integrates with 802.1X which prevents access to the network until authentication succeeds.
What is IEEE 802.1X?
an IEEE Standard for port-based network access control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
What is SSL/TLS?
SSL stands for secure socket layer and is a communication protocol, or set of rules, that creates a secure connection between two devices or applications on a network. Transport Layer Security (TLS) is the upgraded version of SSL that fixes existing SSL vulnerabilities. TLS authenticates more efficiently and continues to support encrypted communication channels.
What is geofencing?
Automatically allow or restrict access when the user is in a particular location
What is tokenization?
Replace sensitive data with a non-sensitive placeholder
ex: SSN 266-12-1112 is now 691-61-8539
What does COPE stand for?
Corporate owned, personally enabled. Company buys the device and is used as both a corporate device and a personal defice
What is SCAP?
Security Content Automation Protocol. It is a suite of tools that have been compiled to be compatible with various protocols for things like configuration management, compliance requirements, software flaws, or vulnerabilities patching. Accumulation of these standards provides a means for data to be communicated between humans and machines efficiently.
What is LDAP?
Lightweight Directory Access Protocol. It is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.
What does CRL stand for and mean?
A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date.
What does OCSP stand for and mean?
Online Certificate Status Protocol, is a protocol used by the browser to check the revocation status of a certificate
What does CA stand for and mean?
Certificate Authority, which deploys and manages certificates
What does CSR stand for and mean?
Certificate Signing Request, this is sent with the public key to the certificate authority. Once the certificate information has been verified, the CA will digitally sign the public key certificate.
What are the phases for incident response?
Preparation
Detection
Analysis
Containment
Eradication
Recovery
Lessons learned
What does SPF stand for and mean?
Sender Policy Framework, provides authorization for email servers. The recipient of an email can view the SPF record of a domain to determine if an email was sent from an authorized server.
What is journaling?
Writing data to a journal before committing the data to a large data store. Can help prevent corruption of the data if the writing process was interrupted.
What is data in-transit?
Data that moves across the network