Implementing Security Flashcards

1
Q

HIDS/HIPS

A

Host Based Intrusion Detection/Protection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MDM

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EMM

A

Enterprise Mobility Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAM

A

Mobile Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UEM

A

Unified Endpoint Management
Of MDM, EMM, MAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MicroSD HSM

A

Micro SD card form Hardware Security Module
secures mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MSSP

A

Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST

A

National Institute for Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSA

A

Cloud Security Alliance
Prompting best practices in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CCM

A

Cloud Controls Matrix

Developed by the CSA to help organisations understand appropriate use of cloud security controls and map then to regularity stds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CASB

A

Cloud Access Security Broker

Software tools serving as intermediaries between service providers and users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EDR

A

Endpoint Detection and Response

Tools combining network response and log analysis.
Look for anomalies and IoC (indicator of compromise) using automated rules and detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPFIX

A

IP Flow Information Exchange
Serves as a means for transmitting traffic flow over the network (open net flow standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SIPS

A

Session Initiation Protocol Secure

For communications traffic like voice and video over HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SRTP

A

Real-Time Transport Protocol Secure

For voice and video communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TLS

A

Transport Layer Security

Protocol used in HTTPS, VoIP, email and instant messaging

17
Q

DMARC

A

Domain-based Message Authentication, Reporting & Conformance

For email and web traffic

18
Q

DKIM

A

Domain Keys Identified Mail

19
Q

DNSSEC

A

DNS Secure Protocol

UDP/TCP 53

Ensuring DNS is not modified or malicious using digital signatures

20
Q

FTPS

A

FTP Secure using TLS

TCP 21 in explicit mode
TCP 990 in Implicit mode

21
Q

SFTP

A

Secure FTP using SSH
TCP port 22

22
Q

HTTPS

A

TCP using TLS port 443

23
Q

IMAPS

A

Internet Mail Access Protocol Secure
Using TCP TLS port 993

24
Q

LDAPS

A

Lightweight Directory Access Protocol Secure
Using TLS on TCP port 636

25
Q

Secure POP3

A

TCP 995 using TLS

26
Q

SRTP

A

Secure Real time Transport Protocol
UDP port 5004
Designed to provide audio and video streams via networks.
Uses encryption and authentication

27
Q

SNMPv3

A

UDP ports 161,162
Authentication of message sources, integrity, validation and confidentiality via encryption.
Only authPriv level is encrypted

28
Q

IPSec

A

Suite of security protocols
AH (Authentication Header) uses hashing and shared secret key to ensure IP payload and headers are secure
ESP (Encapsulated Security Payload) in transport or tunnel mode providing integrity and authentication for the packet

29
Q

CASB

A

Cloud Access Security Broker

Enforce created policies:
Visibility,
Cimpliance,
Threat prevention
Data Security

30
Q

SWG

A

Secure Web Gateway
Examine API, JSON, storage usage, activities; instance aware

31
Q

OWASP

A

Open Web App Security Project

Provides up to date list of most recent web app concerns

32
Q

TOCTOU

A

Time of Check to Time if Use
= race condition

33
Q

Static Code Analysis (SAST)

A

Automated pre compilation of source code to identify potential vulnerabilities

34
Q

Dynamic Code Analysis (DAST)

A

Testing of apps during run time for checking decide of running state

35
Q

Software Composition Analysis (SCA)

A

Identifying open source and third party code to manage licenses and vulnerabilities

36
Q

Fuzz Testing

A

Sending random malformed Data to check error handling/memory leaks

37
Q

Continuous Integration (CI)

A

Frequently merging Code changes into a repository after which automated builds and tests are run

38
Q

Continuous Deployment (CD)

A

Automatically deploying Tested and validated code to a production environment

39
Q

Continuous delivery

A

Code changes are prepared ready to release in an automated way. A step before CD