Total Comp TIA - Online class Flashcards

1
Q

What is risk management

A

risk is the likelihood of a threat actor taking advantage of a vulnerability by using a threat against an IT asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an asset

A

any part of an IT infrasture that has value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is likelihood

A

the probability of an asset being damaged over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are threat actors

A

anyeone or anything with with the motive and resourcees to attach anothers IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are nine the different threat actor groups

A
  1. Hacker - ppl trying to crack into IT inf.
  2. Hacktivist- someone with an activist attitude- ex. greenpeace
  3. script kitties- someone who uses known scrips and trying stuff ( premade attacks)
  4. insiders - somebody that has access to internal structure
  5. Competitors
  6. shadow IT - any form of IT inf that is being put in in an unofficial or illegal way
  7. criminal syndicates - denial of service attacks
  8. state actors - ex. - state sponser, long term type of actors
  9. advanced persistent threat(APT) - long term hacking of something to get information over time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a vulnerability

A

a weakness inherit in the protection of an asset . ex. firewalls that have holes in them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a threat

A

an action (attack or exploit) by a malicious threat actor that they can use against an vulnerability to preform harm to an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how can you get rid of threats

A

you go through remediation - lets look at all threat actors, threats , infrustructure, at their vulnerability and based on likelyhood elts make decision on hat we are going to do to remediate these threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does the CIA triad stand for

A

C- CONFIDENTIALITY
I-INTEGRITY
A- AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is an example of a script kitty

A

Kali linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are attack vectors

A

pathways to gain access to infrastructure
-example- open firewall ports
-weak configurations
-lack of security awareness
-missing patches
-infected USB thumb drive
-supply chain attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

threat intelligence sources

A

-facilitate risk management
hardening can reduce incident response time
-provide cyber security insight - ex.threat maps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the threat intelligent sources

A
  • closed/ proprietary- pay
    -OSINT- Open source intelligent ex. goverment reports ex. NSA
    -CVE- Common vulnerability and exposures
    -dark web- anonymous connections ( TOR Network)
    -AIS- Automated indicator sharing- exchange of cyber security intelligence between entities ( ex. STIX)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is STIX

A

Structred threat information Expression - special format to package information that is understood between similar systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is TAXII

A

trusted automates exchange of intelligence iformation : ex- real time threat indicator feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

describe OSINT

A

open sourced intelligence
-rferes to publis cybersecurity intelligence resources
* ex: CVE- Common vulenabilities and exposures database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the dark web

A

an encypted and anonymized inter access mechanism allowing access to unindexed contect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what could be some attack vectors

A

ex- mISSION CRITICAL it SYSTEMS - PAYMENT PROCESSING
-Third party access- software components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what are physical risk vector

A

ex- access control vestibules - mantraps
-Server room access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

how can you manage risk vectors

A

with a risk management framework (RMF)
-ex. CIS- center for internet security
-NIST- national institute of risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are some financial RMF’S

A

SSAE SOC 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is NIST

A

national institute of standards and technology
-It is a guide for conduction risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is a GDPR

A

general data protection regulation
-protect EU citizens private data
ex. in the US- HIPPA ( health insurance portability and accountability act ) - protect health insurance info
-PCI DSS- Payment card industry data security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are types of security policies

A

AUP- Acceptable use policy
-ex. email, account policies, web browsing , Data retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

define risk management frameworks

A

provide guidence on identifying and managing risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what does a security control do

A

a solution that mitigates threat
-ex. running malware to prevent infections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the different security control categories

A

-Managerial/ adminitrative- WHAT
-operations- HOW OFTEN - POLICY REVIEWS
-technical - HOW - Technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is a cloud security control document

A
  • cloud security alliance ( CSA)
  • or CCM - cloud control matriculation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what are the security control types

A

-physical - ex. mantrap
-detective ( log files, tv)
-corrective- patching vulnerabilities
-detterent- device logon warning - ex. you are logging into
-compensating - ex. using alternative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is risk assessment

A

prioritization of threats against assets and determining what to do about it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what is the risk assessment process

A
  • risk awareness
    -evaluate security controls
    -implememt security controls
    -periodic review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what are the different types of risk types

A
  • Environmental - floods
    -man made - terrorism
    -internal - malicious insider
    -external - competitors
    -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what are the catagories for risk treatments

A

-risk acceptance - current level of risk is acceptable - mitigation/reduction of risk ( security controls before undertaking risk)
-transference/sharings - some risk transfered to someone else - ex. cybersecurity insurance)
-risk avoidance - avoid activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is a quantitative risk assessment

A

risk assesment based on numeric value- we are focusing on dollar amount
-what is the asset value (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what is the exposure factor

A

amoutn of asset that is considered lost when a negative incident occurs
-ex. 1 –> 100% - one incident will be a complete loss of asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is the single loss expectancy

A

SLE- how much loss is experienced uring one negative incident
-multiply asset value by exposure factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

calculate SLE:
ASSET: 24,000
Exposure Factor: 12.5 %

A

24,000 x .125 = 3,000 SLE
when one negative occurance happens we are loosing about 3,000 dollars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How do you calculate the SLE ( SINGLE LOSS EXPECTANCY )

A

MULTIPLE THE ASSET VALUE X THE EXPOSURE FACTOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what is the Annualized rate of occurance

A

ARO: - EXPECTED NUMBER OF YEARLY OCCURANCES DOWNTINE- ex. 3 times a years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

how do you calculate the annualized loss expectancy

A

total yearly cost of bad things happening
1.) determining cost of single loss expectancy ( 1 negative occurance)
2.) multiple by number of occurances in one year BASED ON HISTORICAL KNOWLEDGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what is a qualitative risk assesment

A

based on subjective opinions regarding
-thread likelihood
-impact of threat
threats are given a severity rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

what is a risk resgister

A

it is a cetralized list of risk, severities, responsibilities and mitigations - QUALITATIVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

what is a risk heat map

A

take risk severity levels and map them visually - by color

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what is a risk matrix

A

table of risk details minus colors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

what is a business impact analysis ( BIA)

A

-Allows us to prioritize mission critical processes
-ASSESS risk
*** identifies how negative incidents will impact business processes and sentitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are the diffrent types of business impact

A

-financial
-Reputation laws
-Data Loss
-Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Failed components Impact - different times

A

MTBF- Mean time between failures
* average time that passes between repairable compoent failures - EX. SOFTWARE
-Mean time to Failure ( MTTF)
-* average time between non repairable component failURES - ex. hard disk
-MTTR- Mean time to repair-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

what is MTBF

A

MTBF- Mean time between failures
* average time that passes between repairable compoent failures - EX. SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

what is MTTF

A

-Mean time to Failure ( MTTF)
-* average time between non repairable component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is MTTR

A

-mean time to repair
*time required to repair a failed component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what is a privacy threshold assessment (PTA)

A

First step before implementing solutions related to sensitive data
-where is our sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

what is the RPO

A

RECOVERY POINT OBJECTIVE ( MAXIMUM TOLERABLE Amount of data loss)
-EX. 1 hour maximum - then you should be backing up at least once every hour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

what is the RTO

A

RECOVERY TIME Objective (maximum of downtime that we can tolerate) -EX. 2 hours - ex. after two hours it would have a great impact on the organization
-Get it up and running between two hours

54
Q

what are the different data roles

A
  1. Data Owner - legal owner - sets rules
  2. Data Controlelr - data complies
  3. Data processor- handles data but follow laws for that data
  4. Data Custodian- Managing data - day to day - acts the rules
  5. DPO- Data privacy officer- ensures data privacy
55
Q

explain the information life cycle of

A

collect data
store data
process data
share data
archive and delete

56
Q

what is PII

A

Personally identifiable information
-one or more pieces of sentitive ino that can be traced back to an individuaL
-ex. social security numbers
-CC
-address

57
Q

What is PHI

A

protected health information
-one or more pieces of MEDICAL information that can be traced back to individual
-ex. BLOOD TYPE
-PATIENT MEDICAL ELEMENTS
-health insurance information

58
Q

what are some privacy enhansing technologies

A

-anonymization

59
Q

What are some aunomization techniques

A

-pseudo- replace PII with fake identifiers
-Data minimization- limit stored or retained information- EX. cc info- shread it
-Tokenization- ex. for Credit cards
-DATA data masking- ex. blurring rest of info

60
Q

what is data sovereignty

A

where is the data located
-location of data and laws that apply to it

61
Q

what does data sanitation do

A

ensures sensitive data cannot be recovered

62
Q

what are some meathods to do data sanitication

A

-burning
-shredding
-cryptographic erasure
-disk wiping tools
-degaussing - MAGNET

63
Q

how can you secure personnel management

A

job rotation
mandatory vacation
separation of duties

64
Q

what is included in user onboarding

A

it occurs after hiring and included taining and account provisioning

65
Q

What are the third party risk management

A

-MSA- Measurement system analysis - QUALITY ASSURANCE

66
Q

what are supply chain security risk

A

-unstable or unsecure hardware - ex. EOL, EOSL- end of life
-cloud service providers - software
-contractors - data privacy notice
-suppliersm

67
Q

what are third party risk management

A

DLP- Data loss prevention- can control the intentional or unintentional disclosure of sensite data
-storing data in the cloud

68
Q

what is MSA

A

MEASUREMENT SYSTEM ANALYSIS - CAN IDENTIfy supply chain improvements

69
Q

what is an interconnection security agreement (ISA)

A

-Linking companies , legal review, vulneraability scans) w
-apply when connecting different entities together

70
Q

what is a service level agreement (SLA)

A

contractual document stating level of service , guaranteed service uptime and consequences)

71
Q

what is a memorandum of understanding (MOU)

A

BROAD Terms of agreement between parties)
-MOA- Memorandum of agreemnt - a bit more detailed

72
Q

what is a business partnership agreement

A

legal document , responisbilities , investment

73
Q

NDA- Non disclosure agreement

A

prevent sentitive data disclosure

74
Q

WHAT IS CRYPTOGRAPHY

A

THE study of taking data, and making it hidden in some way to other people cant see it and then bringing the data back
-providing confidentiality

75
Q

what is obfuscation

A

take something that makes sense and hide it

76
Q

how can obfuscation be done

A

-Difussion- less obvious
-confusion-

77
Q

what is the ceaser cipher

A

each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

78
Q

vigenere cypher

A

it is a cesaer cipher with expra confusion
-assign key first

79
Q

What is needed to create a vigenere cypher

A
  1. algorithm
    2.key or encryption
  • only good for alphabet
80
Q

what is kerckhoffs principle

A

as long as you dont know what the key is to an encryption you can understand the algorithm completely

81
Q

what is data at rest

A

data on mass storage that is sitting on harddrive
-no program or computer looking at doing something to that data
*proprietary information - ex. health insurance info

82
Q

what is data in use or computation

A

-the database of information. You are doing something that is doing something to the data itself ( data in use)
-if not encrypted, - shoulder surfing
-key loggers

83
Q

what is data in transit

A

data is moving through and it is being intercepted in between. ( sniffing)
-worst case: man in the middle - do something to information anf then send it to end user

84
Q

what are the three differen types of data

A
  1. data rest
  2. data in use
  3. data in transit
85
Q

what is symmetric encryption

A

using the same key to deal with this piece of information
- it is called session key
* in-band - sent key with data
* out- of band- physically giving key

86
Q

what is the primary way that data is encrypted

A

symmetric encyption

87
Q

what is an ephemeral key

A

a key that is temporary
-it is a perfel forward secrecy

88
Q

what is Asymmetric encryption

A

uses a key pair
-A Private key and a public key

89
Q

explain the diffrence between a private key and a public key

A
  • public key - only used to encrypt
    *private key- only used to decrypt
90
Q

what is asymmetic encryption mainly used for

A

to send a secure session key

91
Q

what is a crypto system

A

define key properties, communication requirements for thekey exchange and the actions taken through the encryption and decryption process

92
Q

what is a symmetric block algorithm

A

encrypts data in chunks
EX-DES- data encription standards
-3des
blowfish
and currently - AES

93
Q

what is a symmetric block algorithm defined by

A

key length
block size
number of rounds

94
Q

What is AES

A

Advanced encryption standard ( black cypher)

95
Q

what is a streaming cypher

A

they encript one bit at a time ( popular with wireless)
RC4

96
Q

what happens with RSA asymetric cryptography

A

public keys are paired with a private key

97
Q

what can ECC do that is better than RSA

A

can create smaller keys ad provides same security

98
Q

what is diffie hellman

A

an asymmetirc algorithm ofter referred to as a key schange aggrement

99
Q

what do diffie helman groups do

A

they help define the size or type of key structure to use * can have a very large key)

100
Q

what are hashes

A

one way, deterministic, and will produce the same result each time the source is hashed

101
Q

what happens to hash if length of source changes

A

it will be the same exact size

102
Q

what is involved with hashes

A

password storage and encription

103
Q

what do digital signatures do

A

verify that the person who sent the public key legitimately owns the private key

104
Q

what do digital certificates inclue

A

they include a thirs party to authenticate the owner of the digital signature

105
Q

what does the web of trust use

A

uses a network of mutually trusting peers

106
Q

what does PKI stand for and what does it mean

A

PKI- Public KEY INFRASTRUCTURE
-Uses a hierarchi structure with certificate authorities (CAs) AND INTERMEDIATE and intermediate certificate authorities

107
Q

what does public key cryptography standards to

A

gives details on digital certificate construction and uses

108
Q

what are the three main categories for crytographic attacks

A
  1. attack the algorithm -almost impossible
  2. attack implementation- advantages of weeknesses
    3.attack the key- figuring out key in order to break in
109
Q

how are passwords usually stored

A

in hash format

110
Q

what are the different types of password attacks

A
  1. brute force - try character combinations
  2. Dictionary attacks- uses list of probable passwords
  3. rainbow tables - uses pre calculated hashes of words
111
Q

what can help secure passwords

A

-Salting and key stretching

112
Q

what are the big factors of multifactor identification

A

-identificatoin- claiming identity
-authentication- proving that identity
-authorization- permitting actions once a user has been authenticate d

113
Q

what are the identification factors

A
  • somthing you know, something you have or something you are
114
Q

what are the identification atributes

A

include something you do- typing speed
something you exhibit-
something you know - someone you know
somewhere you are - zip code

115
Q

what are the AAA ( multifactor authentications)

A

authentication- identify yourself
authorization- giving eprmisison
Accounting- auditing

116
Q

descrive accounting in authetication

A
  • auditing( tracking user activity on a system )
    -suparate user accounts are important to assure accurate accounting
    -even logs can be used to identify unusual or malicious activity
117
Q

what are password vaults

A

provide centralized password storage and are protected with a master key

118
Q

what are OTP’s

A

ONE TIME PASSWORDS - SIGNLE CODE USED TO ENHANSE AUTHENTICATION

119
Q

WHAT ARE TOTP’S

A

time based OTP
-HMAC-based OTPs use encryption for added authentication

120
Q

what does biometric authentication use

A

physical characteristics to authenticate people

121
Q

what are credential policies

A

defines who gets access to what

122
Q

what are ABAC ( atribute based access control)

A

uses attibutes to determine permission - ex. date of birth or devide type
-allows resources access based on user devide, resources attributes

123
Q

what is RBAC ( role bases access control)

A
  • a role ins a collection of related permissions
124
Q

what is RBAC (ule based access control)

A

-conditonal access policies
* we have a series of conditions that must be based:
- ex. mfa, device type and location

125
Q

what is MAC

A

Mandatory access control
-resources are labeld
-permission assignments are based on resource abels and security clearance

126
Q

what is DAC

A

Discretionary access control
-dta custodian sets permissions at their discretion

127
Q

what is physical access control

A

-limited access facility
ex. vestivules, locks on computers *

128
Q

NTLM V2 passwords

A

aare salted

129
Q

what are PAP and MC CHAP

A

older network authentication protocols

130
Q

where is karberos used

A

for authentication and resourceaccesss in an active directory encv

131
Q

what does SSO allor users to do

A

to sign in once yet access many services without re-entering credentials