Test Prep April 2 Flashcards
SRTP
Secure Real Time Transport Protocol: This encrypts communication with AES
NTPsec
Secure Network Time Protocol
S/MIME
Secure multipurpose internet mail extensions: Requires a public key infrastructure
Secure POP3
Uses STARTTLS to encrypt with SSL
IMAP
Uses SSL to encrypt email messages
SSL
Secure Sockets Layer
TLS
Transport Layer Security: Uses HTTPS
HTTPS
HTTP over TLS: Uses Private key encryption
IPsec
Internet Protocol Security: Security for OSI Layer 3, encryption and packet signing; uses authentication header
FTPS
File Transfer protocol secure: FTP over SSL
SFTP
SSH file transfer protocol
LDAP
Lightweight Directory Access Protocol: Protocol for reading and writing directories over an IP network
SASL
Simple authentication and security layer
SSH
Secure Shell: encrypted terminal communication replaces telnet and FTP
DNS
Domain Name System: Easy to poison a DNS
SNMPv3
Simple network management protocol version 3: Has encrypted data, verifies the source
DHCP
Dynamic Host configuration protocol: This assigns IP addresses to the devices on the network, no secure version of this
NAT
Network Address Translation
Stateless Firewall
Not secure! Does not keep track of traffic flows, each packet is individually examined, this needs two separate rules, one for outside to inside and another from inside to outside
Stateful Firewall
Much more secure! They remember the state of the session, only need a single rule. everything within a valid flow is allowed
UTM
Unified threat management device: Web security gateway, spam filter, malware inspection etc.
NGFW
Next generation firewall: Every packet must be analyzed and categorized before a security decision is made
WAF
Web application firewall: Applies rules to HTTP/HTTPS conversations This is used with the PCI DSS (payment card industry data security standard)
Passive footprinting
Gather information that will not be seen by the victim. Needs to happen over open source. Can do this through social media, web site etc.
Wardriving/warflying
Combine wifi monitoring and a GPS, search from a car, plane or drone.
Active footprinting
Actively sending info into the network to gain more information. ping scans, port scans etc.
Malicious actor
a person you are trying to protect your data from
APT
Advanced persistent threat
Nation State
These are governments, commonly an APT
hacktivist
often associated to a social or political agenda, specific hacks, no financial gain
organized crime
motivated by money, very sophisticated
Order of volatility
How long does data stick around: Most volatile - Least: CPU, Memory, temporary file systems, Disk, Remote logging, Network topology, archive media
RAM
Random access memory: Changes constantly, memory dump; grab everything in the RAM
Swap
An area of the storage device to store RAM when memory is depleted
snapshot
original image is the full backup, each snapshot is incremented from the last
cache
A temporary storage area and is designed to speed up performance of an OS
Embedded systems
hardware and software designed for a specific function
SoC
System on a chip: multiple components running on a single chip, difficult to upgrade hardware
FPGA
Field programmable gate array: An integrated circuit that can be configured after manufacturing, common on routers and firewalls
SCADA/ICS
Supervisory control and data acquisition system: Large scale, multi site industrial control system. Often found within manufacturing, not connected to the internet
VOIP
Voice over internet protocol: Each device is a computer
MFD
Multifunction devices: everything you need in one single device (example a printer)
RTOS
Real time operating system: designed to work on a specific schedule, no time to wait for other processes (example automobiles) no security in place usually
CIS
Center for internet security: Used to Design to improve the security posture in your organization and has 20 different controls
NIST CSF
Cybersecurity framework: Used for commercial cyber framework. 1. Framework core, framework implemetation tiers and framework profile
ISO/IEC 27001
Standard for information security management systems
ISO/IEC 27002
Code of practice for security controls
ISO/IEC 27701
Privacy information management systems
ISO 31000
International standards for risk management practices
SSAE SOC 2 Type I/II
These are for the auditing of accounting. SOC2 is the audit documentation