1 Flashcards

1
Q

Incident response phases

A

Preparation
Detection & Analysis
Containment, Eradication & Recovery
Post-event activity

From NiST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of halon

A

1211 only in portable, streaming agent

1301 only in fixed, flooding agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sha

A

Secure Hash Algorithm
Hashing algorithm
20 byte output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A
Advanced Encryption Standard 
Original name rijndael
Block cipher
Block size 128
Key length 128, 192, 256
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP

A

Extensible authentication protocol
Used by ppp
Support multi auth mechanisms
Token cards, smart cards, certs, opt, public key enc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Usage gap

A

Total potential - actual current usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Used to authent asym keys

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Circuit level firewall

A

Provides udp and tcp connection security

Operates transport and application layers such as session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stream cipher

A

Faster than block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PEAP

A

Protected Extensible Authentication Protocol
Mschap
Gtc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDEA

A

International data encryption algorithm

Symmetric block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DES

A

Data encryption standard

Symmetric block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blowfish

A

Symmetric block

Key 32 to 448 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two fish

A

Symmetric block
Block 128
Key up to 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ECB

A

Electronic Code Book
Block Cipher
Same key on each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CBC

A

Cipher Block Chaining
Block cipher
Uses IV on first block
Plaintext XORed with previous ciphertext before being encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PCBC

A

Propagating Cipher Block Chaining
Block Cipher
uses IV on first block
Plaintext XORed with both previous plaintext and previous ciphertext before being encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CFB

A

Cipher Feedback
makes a block cipher into a self-syncronizing stream cipher
if part of encrypted message lost, only part of decryption lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OFB

A

Output Feedback
makes a block cipher into a synchronous stream cipher
allows many error correction codes to function even when applied before encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

smart cards

A

typically credit card sized
embedded IC
some have electrical contacts
does not display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MD5

A

Message Digest
Hash
128 hash output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SOM

A

Service-Oriented Modeling
Comprehensive view of analysis, design and arch of all software entities
View software entities as assets referred to as services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SOMF

A

Service-Oriented Modeling Framework
Modeling language for software development
practices, environments, disciplines, artifacts
SOA Value Proposition
Software Assets reuse
Architectural components abstraction
Business Traceability

24
Q

IPSEC Authentication Methods

A

Pre-shared key
Certificate
Kerberos

25
Kerberos Components
3 main Authentication Server Ticket Granting Server Principles Database
26
IPComp
IP Payload Compression
27
SABSA
Sherwood Applied Business Security Architecture Business driven, risk and opportunity focused security architectures traceably support business objectives
28
SSH encrypt options
inlcude AES, Blowfish, 3DES, CAST128, Arcfour (RC4), IDEA
29
L2TP
layer 2 Tunneling Protocol operates at layer 2 Extenion of PPTP Used to enable the operation of a VPN over Internet Does not provide encryption or confidentiality by itself
30
IPSec
protocol suite that authenticates and encrypts the packets of data sent over an IP network. used in VPNs. Mutual Authentication
31
RC4
aka ARC4 | stream cipher
32
RC5
Rivest Cipher Symmetric block cipher
33
SKA
Shared Key Authentication | WEP encryption key shared in advance
34
SwIPe
1993 | Provides confidentiality, Integrity and authentication with end to end and intermediate hop security
35
ALE
Annualized Loss Expectency | product of ARO (Annual Rate of Occurance) and SLE (Single Loss Expectancy)
36
SLE
Single Loss Expectency
37
ARO
Annual Rate of Occurance
38
EF
Exposure Factor | Potential percentage of loss if a specific threat is realized
39
AV
Asset Value
40
MS-CHAPv2
Provides mutual authentication
41
Layer 1 protocols
10BaseT DSL, ISDN Infrared
42
Layer 2 protocols
``` ARP ATM CHAP CDP Ethernet L2TP MAC PPP PPTP STP Spanning Tree Protocol VLAN ```
43
Layer 3
``` network layer NAT AppleTalk IP ICMP ARP RIP OSPF IPSec ```
44
Layer 4
``` Transport Layer ESP NetBios SPX TCP UDP ```
45
layer 5
``` Session Layer - provides session management netbios RPC SMB SOCKS ```
46
Layer 6
``` Presentation layer TLS SSL FTP IMAP SSH ```
47
Layer 7
``` Application Layer SOAP DHCP DNS HTTP/S NFS POP3 SNMP Telnet SSH TFTP ```
48
X.25
ITU-T protocol suite for packet switched WAN
49
Skipjack
used by clipper chip | symmetric block cipher
50
Clipper Chip
used Skip Jack to encrypt and Diffie Hellman key exchange
51
MAC
Message Authentication Code
52
SKIP
Simple Key Management for Internet Protocol encryption tool used to protect sessionless datagram protocols. designed to integrate with IPSec layer 3
53
ElGamal
Asymetric encryption | based on Diffie Hellman key exchange
54
Blueprint
A detailed plan or program of action. | overall architecture first, then individual components
55
Security Architecture
Think of same way home architecture How many doors and windows are there? Who is allowed in and out of each opening? Must people in home identify self before going out and back in? What possessions need protection? What people need protection?