2.1 - Logical Security Flashcards

1
Q

Least privilege

A
  • Rights and permissions should be set to the bare
    minimum
    – You only get exactly what’s needed to
    complete your objective
  • All user accounts must be limited
    – Applications should run with minimal privileges
  • Don’t allow users to run with administrative privileges
    – Limits the scope of malicious behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Lists (ACLs)

A
  • Used to allow or deny traffic
    – Also used for NAT, QoS, etc.
    – Commonly used on the ingress or egress of
    a router interface
  • ACLs evaluate on certain criteria
    – Source IP, Destination IP,
    – TCP port numbers, UDP port numbers, ICMP
  • Deny or permit
    – What happens when an ACL matches the traffic?
  • Also used in operating systems
    – Allow or deny access to the filesystem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multi-factor authentication

A
  • More than one factor
    – Something you are, something you have,
    something you know, somewhere you are,
    something you do
  • Can be expensive
    – Separate hardware tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software tokens

A
  • Authenticator application
    – Pseudo-random number generator
    – Can’t guess it
    – Changes constantly
  • Saves money
    – Free smartphone applications
    – No separate device to lose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Short message service (SMS)

A
  • Text messaging
    – Includes more than text these days
  • Login factor can be sent via SMS to a
    predefined phone number
    – Provide username and password
    – Phone receives an SMS
    – Input the SMS code into the login form
  • Security issues exist
    – Phone number can be reassigned to
    a different phone
    – SMS messages can be intercepted
    – SMS spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Voice call

A
  • A phone call provides the token
    – The computer is talking to you
    – “Your code is 1-6-2-5-1-7.”
  • Similar disadvantages to SMS
    – Phone call can be intercepted or forwarded
    – Phone number can be added to another phone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Email filtering

A
  • Unsolicited email
    – Stop it at the gateway before it reaches the user
    – On-site or cloud-based
  • Scan and block malicious software
    – Executables, known vulnerabilities
    – Phishing attempts
    – Other unwanted content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly