Lesson 13: Explaining Common Security Concepts Flashcards

1
Q

What are the 3 concepts of the CIA triad?

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define confidentiality in the CIA triad

A

Confidentiality means that certain information should only be known to certain people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define integrity in the CIA triad

A

Integrity means that the data is stored and transferred as intended and that any modification is authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define availability in the CIA triad

A

Availability means that information is accessible to those authorized to view or modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a vulnerability

A

A weakness that could be accidentally triggered or intentionally exploited to cause a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a threat

A

The potential for someone or something to exploit a vulnerability and breach security. A threat may be intentional or unintentional. The person or thing that poses the threat is called a threat actor or threat agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define an attack vector

A

The path or tool used by a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define risk

A

The likelihood and impact (or consequence) of a threat actor exercising a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define risk management

A

A process for identifying, assessing, and mitigating vulnerabilities and threats to the essential functions that a business must perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define risk assessment

A

A subset of risk management where a company’s systems and procedures are evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a mission essential function (MEF)

A

Business or organizational activity/process that is too critical to be deferred for anything more than a few hours, if at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Business impact analysis (BIA)

A

Activity that identifies organizational risks and asses their effect on ongoing, mission critical operations as well as what losses might occur for a range of threat scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define business continuity planning (BCP)

A

Identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define an exploit

A

Specific code or method of using a vulnerability to gain control of a system or to cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a zero-day vulnerability/exploit

A

A vulnerability that is exploited before the developer knows about it or can release a patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define a legacy system

A

A legacy system is one where the software vendor no longer provides support or fixes for problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define a vulnerability assesment

A

An evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system; determines if the current configuration matches the ideal configuration (the baseline)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does CVE stand for?

A

Common Vulnerabilities and Exposers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of a CVE?

A

A scheme for identifying vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the construction of a CVE identifier?

A

CVE-YEAR-ORDER DISCOVERED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define an external threat

A

A threat actor that has no account or authorized access to the targeted system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define an internal threat

A

A threat actor that has been granted permissions/access on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define Security Information and Event Management (SIEM)

A

Solution that provides real-time or near-real-time analysis of security alerts/logs generated by network hardware and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the primary function of SIEM?

A

To aggregate logs from multiple sources, and to correlate individual events into indicators of compromise (IOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a pen test?

A

Active test that uses tools and security utilities to evaluate security by simulating a live attack on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define Privileged Account Management (PAM)

A

Policies, procedures, and technical controls to prevent the malicious abuse of privileged accounts and to mitigate risks from weak configuration control over privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the 3 principals of Priviledged Account Management (PAM)

A
  1. Least privilege
  2. Role-based access
  3. Zero trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define least privilege

A

Principle of security stating that a user should be allocated the minimum necessary rights, privileges, or information to perform its role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the purpose of least privilege?

A

Mitigates the risk if the account becomes compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define authorization creep

A

Refers to when a user requires more rights over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define role-based access

A

Access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions (read, write, modify, etc) based on job functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define zero trust

A

Security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the ways to implement zero trust?

A
  1. Uses systems such as continuous authentication and conditional access to mitigate privilege escalation and account compromise
  2. Micro segmentation - is a security process that is capable of applying policies to a single node, as though it was in a zone of its own
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of an access control system?

A

Set of technical security controls that govern how subjects are permitted to interact with objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define a subject

A

A user, device, or software process; anything that can request and be granted access to a resource

36
Q

Define an object

A

networks, servers, databases, files, etc

37
Q

Define an Access Control List (ACL)

A

Collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given

38
Q

Define Identity and Access Management (IAM)

A

Security system that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets

39
Q

What processes does an Identity and Access Management (IAM) system perfrom?

A
  1. Identification
  2. Authentication
  3. Authorization
  4. Accounting
40
Q

Define the Identification process

A

Creating an account or ID that identifies the user, device, or process on the network

41
Q

Define the authentication process

A

Proving that a subject is who or what it claims to be when it attempts to access the resource when the account holder submits credentials to the system to request access and the system compares the submitted credentials to credentials stored in the system

42
Q

Define the authorization process

A

Determining what rights subjects should have on each resource and enforcing those rights

43
Q

Define the accounting process

A

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted

44
Q

Name the different authentication factors

A
  1. Knowledge factor
  2. Ownership factor
  3. Biometric factor
  4. Behavioral factor
  5. location factor
45
Q

Define a knowledge authentication factor

A

Something you know (password/passphrase)

46
Q

Define a ownership authentication factor

A

Something you have (smartcard)

47
Q

Define a human/biometric authentication factor

A

something you are (fingerprint)

48
Q

Define a behavioral authentication factor

A

Something you do (making a signature)

49
Q

Define a location authentication factor

A

Somewhere you are (a mobile device with location services)

50
Q

Define multifactor authentication

A

Authentication scheme that requires the user to present at least two or more different factors as credentials

51
Q

What is the default authentication factor for local authenticaiton?

A

Knowledge factor - A password or PIN

52
Q

How is knowledge factor authentication secured in a credential database?

A

By cryptographic hashes

53
Q

What is a cryptographic hash?

A

A function that converts any string to a unique, fixed-length code

54
Q

How does an authenticator verify a password?

A

By converting the user submitted password into a hash, and and comparing it against the one in the database

55
Q

Define windows local sign-in

A

The Local Security Authority (LSA) compares the submitted credential to a hash stored in the Security Accounts Manager (SAM) database, which is part of the registry

56
Q

Define windows network sign-in

A

The local security authority (LSA) can pass the credentials for authentication to Kerberos

57
Q

Where are user account names stored in linux?

A

in /etc/passwd

58
Q

Where does the linux system store password hashes?

A

in /etc/shadow

59
Q

Define a pluggable authentication module (PAM)

A

A PAM is a package for enabling smart cards

60
Q

Define Single Sign-On (SSO)

A

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services

61
Q

Define Kerberos

A

Provides SSO authentication in a windows domain.

62
Q

What is the purpose of a Key Distribution Center (KDC)

A

A technology that verifies the identity of a client and the server its requesting resources from such as a domain controller

63
Q

What are the two functions that make up a Key Distribution Center (KDC)?

A
  1. The authentication service
  2. Ticket granting service
64
Q

What is the purpose of the authentication service of a Key Distribution Center (KDC)

A

Responsible for authenticating user logon requests and services

65
Q

What does a Key Distribution Center (KDC) do after authenticating a service/user?

A

Once the client/service has authenticated, the KDC presents the user with a ticket granting ticket

66
Q

What is a ticket granting ticket?

A

Allows user to request service ticket that grant access to a target resource

67
Q

How does a client/service gain access to a resource?

A

By requesting a service ticket by supplying the Ticket Granting Ticket to the Ticket Granting Service

68
Q

What is the purpose of a digital certificate?

A

Identification and authentication information presented in the X.509 format and issued by a Certificate Authority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host)

69
Q

Define asymmetric encryption

A

Public key cryptography; allows users to encrypt information using key pairs

70
Q

List one way cryptographic key pairs are used

A

When receiving data, the public key pair is given to encrypt the data before transmission, and the message can only be decrypted by the private key pair that only the recipient has

71
Q

List another way cryptographic key pairs are used

A

When authenticating to a remote system, create a signature and sign it by encrypting it with the private key, and when its received by the recipient they will decrypt it with the public key

72
Q

What is the biggest problem with public key cryptography?

A

Proving the identity of the owner of a public key

73
Q

What is the purpose of Public Key Infrastructure (PKI)?

A

Aims to prove the identity of the owners of a public key

74
Q

What purpose does a digital certificate serve?

A

A wrapper/placeholder for a pubic key as well as information about the subject (entity)

75
Q

Define the Extensible Authentication Protocol (EAP)

A

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication

76
Q

How is 802.1X Port-based Network Access Control (NAC) implemented?

A

Encapsulating EAP communications over a LAN (EAPoL) to implement port-based authentication

77
Q

What authentication protocol does 802.1X port-based Network Access Control (NAC)

A

AAA

78
Q

Define AAA architecture

A

Authentication, authorization, accounting

79
Q

What is RADIUS (remote authentication dial-in user service)?

A

AAA protocol used to manage remote and wireless authentication infrastructures over UDP ports 1812 and 1813

80
Q

What is TACACS+ (Terminal Access Controller Access Control System)?

A

AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management over TCP port 49

81
Q

Define LDAP (Lightweight directory access protocol)

A

Network protocol used to access network directory databases, which store information about authorized users and their privileges over TCP/UDP port 389

82
Q

Define simple bind authentication

A

The client must supply its distinguished name (DN)/identity and password, but these are passed as plaintext

83
Q

Define Simple Authentication and Security Layer (SASL)

A

The client and server negotiate the use of a supported authentication mechanism, such as Kerberos

84
Q

What is LDAP Secure (LDAPS)

A

The LDAP server is installed with a digital certificate, which it uses to set up a secure tunnel for the user credential exchange over TCP port 636

85
Q

Which kind of bandwidth management technology uses a header field to indicate a priority value for a layer 3 (IP) packet?

A

DiffServ