Security Concepts Flashcards

1
Q

CIA Triad

A

Confidentiality: Certain information only known by certain people
Integrity: Data is stored and transferred was intended without modification
Availabilty: Information is accessible to those authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A
  • Weakness that could be accidentally triggered or intentionally exploited to cause security breach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A
  • Potential for vulnerability to be exploited and security breached
  • Intentional or unintentional
  • Thing posing threat is threat actor or agent
  • Pather or tool used is attack vector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk

A

Likelihood and impace of threat actor exercising vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Management

A
  • Process for identifying, assessing and mitigating vulnerabilities and threats.
  • ERM: Enterprise Risk Managment policies based on published frameworks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Controls

A
  • Procedures, activities and tools designed to give a system or data asset the CIA properties
  • Aim is to mitigate risk factors to affordable level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Posture

A
  • Overall status of risk management

- Shows which risk response options can be identified and prioritized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Posture Assessment

A
  • Used ot assess organizations maturity level in its use of security policies and contols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MEF

A

Mission Essential Function

  • Function org must be able to perform as close to continually as possible
  • If there is disruption, must be restored with priority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BIA

A

Business Impact Analysis

  • Process of assessing what losses might occur from a range of threat scenarios
  • Gives context for making decisions on what security controls are worth investment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploit

A
  • Specific code or method of using vulnerability to gain control of or damage system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-Day

A
  • Vulnerability that is exploited before it is patched or known
  • Can be extremely destructive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vulnerability Assessment

A
  • Evaluation of a system’s security and ability to meet compliance requirements based on configuration state of the system.
  • How close it is to ideal configuration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVE

A

Common Vulnerabilities and Exposures

- Dictionary of vulnerabilities that is published

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TTP

A

Tactics, Techniques and Procedures of threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Behavioral threat research

A
  • Narrative commentary describing examples of attacks and TTPs
17
Q

Reputational threat intelligence

A
  • Lists of IP addresses and domains associated with malicious behavior
  • signature of file based malware
18
Q

Threat Data

A
  • Computer data that can correlate events observed on customers own networks and logs with known TTP indicators
19
Q

SIEM

A

Security Information and Event Management

  • Security Control designed to integrate assessment efforts with automated collection and analysis
  • Links events or data points to indicators of risk or compromise
  • Can drive an alert system based on findings
20
Q

Penetration Testing

A
  • Authorized hacking techniques to discover exploitable weaknesses
  • Active test of security controls
21
Q

Vendor Management

A
  • Process of selecting supplier companies and evaluating risks inherent in relying on third party products or services.
  • Risk cannot be fully transferred to vendors
22
Q

ACL

A

Access Control List

- List of subjects and rights or permissions they have access to

23
Q

Local Authentication provider

A

Software architecture and code that underpins the mechanism by which the user is authenticated before starting a shell.
- Microsoft or Linux sign in

24
Q

Hash

A
  • Function that converts any string to a unique, fixed-length code
  • Cannot be converted back to plaintext string
  • Passwords are stored in the credential database as hash
  • One-way cryptographic function
25
Q

SSO

A
  • Allows user to authenticate once to local device and be otherized to access compatible application servers without having to authenticate again
  • In Windows, usually provided by Kerberos Framework
26
Q

Kerberos

A
  • Provides SSO authentication to active directory
  • Authentication service approves user logon requests
  • KDC (Key Distribution Center) presents user with Ticket Granting Ticket
  • To access domain resources, client requests Service Ticket by supplying Ticket Granting Ticket to Ticket Granting Service
27
Q

Digital Certificate

A
  • Used to authenticate server machines when using TLS

- Can be installed on web or email server to validate identity and secure transmission channel

28
Q

Public Key Cryptography

A
  • Key pair is generated
  • Private key only you know
  • Public Key can be transmitted to other subjects
  • Private key cannot be derived from public key
  • Messages sent with public key can only be decrypted with your private key
  • Can also be used to authenticate yourself by creating unique signature, which only you could have made
29
Q

PKI

A

Public Key Infrastructure

  • Aims to solve issue with public key by proving owner of public key
  • Anyone issuing public keys should obtain a digital certificate
  • Wrapper for entities public key
30
Q

EAP

A

Extensible Authentication Protocol

  • framework for deploying multiple types of authentication protocols and technologies
  • Many use digital certificates on the server and client machines
  • Used to establish trust relationship and secure tunnel to transmit other credentials
31
Q

NAC

A

IEEE 802.X Port-based Netwrok Access Control

  • Means of using EAP method when device connected to ethernet switch port, WAP or VPN gateway.
  • Uses Authentication, Authortization and Accounting (AAA) architecture.
32
Q

RADIUS

A

Remote Authentication and Dial-in User Service

  • Widely used for client access over switches, wireless and VPNs.
  • Uses port 1812 and 1813
  • Each client must have IP of radius server and shared secret
33
Q

TACAS+

A

Terminal Access Controller and Access Control System

  • Similar to RADIUS, but more flexible and reliable
  • Often used to authenticate administrative access to routers and switches
  • Port 49
34
Q

PAM

A

Privileged Account Management

  • policies, procedures and technical controls to prevent malicious abuse of privileges accounts
  • Identify and document privileged accounts, and manage the credentials used to access them
35
Q

Least Privilege

A
  • User is granted sufficient rights to perform job and no more
  • Mitigates risk if account is compromised
  • Should perform regular audits to prevent authorization creep
36
Q

Role-based Access

A
  • A set of organizational roles is defined and subjects are allocated to those roles
  • Roles can only be modified by system owner
  • Rights are given from role assignment, rather than directly
37
Q

Zero Trust

A
  • Based on idea that perimeter security is unlikely to be completely robust
  • Use continuous authentication and conditional access to mitigate privilege escalation and compromise.
38
Q

LDAP

A

Lightweight Directory Access Protocol

  • Used to query and update x.500-like directory
  • Used TCP and UDP port 389
39
Q

X.500

A
  • Main directory standard
  • Each object has unique identifier called distinguished name
  • Made of attributes=value pairs separated by commas.
  • Most specific attribute is listed first and then get broader
    Example:
    CN: Jaime, OU: Admins, DC:corp, DC:515support, DC:Com