3. Security Flashcards

1
Q

OPSEC

A

Operations Security - Process you use to protect your information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steps of OPSEC (5)

A
  1. Identification of critical info (identify the assets that would cause you the most harm if exposed)
  2. Analysis of threats (analyze any threats related to each critical info)
  3. Analysis of vulnerabilities (analyze the vulnerabilities int he protections you’ve put in place to secure your info assets. HOW YOU INTERACT W/ ASSETS)
  4. Assessment of risks (what issues you need to address in the rest of the ops sec process. RISK OCCURS WHEN YOU HAVE A MATCHING THREAT AND VULNERABILITY)
  5. Application of COUNTERMEASURES (when you construct countermeasures for a risk, you need to mitigate either the threat or the vulnerability at a min)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Laws of OPSEC - Kurt Haase (3)

A
  1. Know the threats “If you don’t know the threat, how do you know what to protect?”
  2. Know what to protect (determine critical info)
  3. Protect the information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purple Dragon

A

Code study during the Vietnam War. Coined the term OPSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Competitive Intelligence

A

Conducting intelligence gathering and analysis to support business decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Competitive Counterintelligence

A

Managing info gathering activities directed at an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OpSEC Support Staff (IOSS)

A

Provide multiple agencies w/ a wide variety of security awareness and trainings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering attacks

A

manipulate people to gain info/access to facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HUMINT

A

Human Intelligence - gathered by talking to people, torture, tricking people w/ scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSINT

A

Open Source Intelligence - info collected from publicly available sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Metadata

A

Data about data found in almost any file
Ex forensic tool: EnCase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EXIF data

A

Image/video file metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Shodan

A

Search engine of service banner which are metadata that the server sends back to the client.
Web based search engine that looks for info saved on internet connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GEOINT

A

Geospatial info from satellites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MASINT

A

Measurement and signature from sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RADINT

A

Radar info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TECHINT

A

Technical info about equipment, tech, and weapons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FININT

A

Financial info about financial dealings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CYBINT/DNINT

A

Cyber/Digital Network info from comp systems/networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pretexting

A

Social engineering attack that utilizes credible scenarios to lure people into disclosing sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Phishing

A

Social engineering technique that uses electronic communications to carry out an attack that is broad in nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Tailgating

A

Following someone through an access control point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Malware

A

Application that makes unauthorized changes to a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Clean desk policies

A

Sensitive info shouldn’t be left out/unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

BCP - Business continuity planning

A

Plans put in place to ensure that critical business functions can continue in a state of emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DRP - Disaster recovery planning

A

Plans put in place to prepare for a potential disaster. What to do during and after.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Types of physical security controls (3)

A

Deterrent
Detective
Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Magnetic Media

A

Use movement and magnetically sensitive material to record data
Ex: hard drives, tapes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Flash Media

A

Media that stores data on NONVOLATILE memory chips
Cheaper and faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Optical Media

A

Ex: CD, DVDs
Fragile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

RAID/RAID array

A

Redundant arrays of inexpensive disks - method of copying data to more than 1 storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Computer Network

A

Group of computers/other devices that are connected to facilitate the sharing of resources

34
Q

DDoS

A

Distributed denial of service attacks

35
Q

Network Segmentation

A

Network design factor that controls the flow of traffic between subnets to prevent attacks and boost network performance

36
Q

Firewalls

A

Mechanism for controlling network traffic. Natural segmentation where level of trust changes.

37
Q

Types of firewalls (4)

A

Packet Filtering
Stateful Packet Inspection
Deep Packet Inspection
Proxy Servers

38
Q

Deep Packet Inspection Firewalls

A

Analyze content of traffic and can reassemble the content to determine what will be delivered to the destination application

39
Q

Disaster Recovery

A

Steps and organization will take during a state of emergency to REPLACE IT INFRASTRUCTURE

40
Q

Stateful Packet Firewall

A

Monitors and defends a system based on traffic patters over a given connection

41
Q

Packet Filtering

A

Makes a determination on each packet individually based on the source and destination IP addresses, port #, and protocol used

42
Q

Proxy Servers

A

Pertain specifically to applications. “Choke point”. Log traffic for later inspection. Single source for requests.

43
Q

DMZ

A

Demilitarized zone - Creates a zone that allows public facing servers to be accessed from the outside while providing protection and restricting traffic

44
Q

IDS

A

Network Intrusion Detection Systems

45
Q

Signature-based IDS

A

Maintain a database of the signatures that might signal an attack and compare incoming traffic to those signatures

46
Q

Anomaly-based IDS

A

Determine normal kinds of traffic/activity taking place on the network then measure present traffic against this.
Can produce a larger number of false positives

47
Q

VPN

A

Virtual private network - encrypted connection between 2 points

48
Q

Packet Sniffer

A

Network/protocol analyzer tool that can intercept traffic on a network
Ex: TcpDump, Ethereal, Wireshark, Kismet

49
Q

Honeypots

A

Network security tool that deliberately configures a system w/ fabricated vulnerabilities to detect and monitorthe activities of an attacker

50
Q

Buffer overflow attack

A

Inputting more data than an application is expecting

51
Q

HIDS

A

Host Intrusion Detection - Analyze activity on or directed at the network interface of a particular host

52
Q

Centrally Managed

A

Devices are under control of 1 main system that maintains them

53
Q

Baseband Operating System

A

Runs on it’s own processor and generally handles the phone’s hardware

54
Q

Supervisory Control and Data Acquisition System

A

Industrial control system that monitors and controls systems over long distances, often those related to utilities and other infrastructure

55
Q

Embedded Devices

A

Computer contained inside another device

56
Q

How to counteract a buffer overflow/buffer overrun attack?

A

Bounds checking

57
Q

Input validation attacks AKA Format string attacks

A

When certain print functions within a programming language can be used to manipulate/view internal memory of an app

58
Q

Software development vulnerabilities (6)

A

Buffer overflows
Race conditions
Input validation attacks
Authentication attacks
Authorization attacks
Cryptographic attacks

59
Q

AES

A

SYMMETRIC ALGORITHM
STANDARD US ENCRYPTION)
Advanced Encryption Standard (Cryptographic attack)

60
Q

Client-Side Attacks (3)

A

XSS (Cross-site scripting)
XSRF (Cross-site request forgery)
Clickjacking

61
Q

XSS

A

Cross-site scripting - attack carried out by placing code in the form of a scripting language into a Web Page or other media that is interpreted by a client browser

62
Q

XSRF

A

Cross-site request forgery - attack of a planed line on a Web Page in a way that will be automatically executed in order to initiate a particular activity on another page/app where the user is authenticated

63
Q

Clickjacking

A

Attack takes advantage of graphical display capabilities of browsers to click something we wouldn’t normally. Another layer over the web page.

64
Q

Server-side attacks (3)

A

Lack of input validation (Directory traversal attacks)
Improper/Inadequate permissions
Extraneous files (server moved from development to production, files not directly related to the running of the site)

65
Q

Database Vulnerabilities (4 main branches)

A

Protocol issues
Unauthenticated access
Privilege escalation
Arbitrary code execution

66
Q

Port 443

A

Provides HTTP Secure Services, which web pages secured with secure socket layer and or transport layer security

67
Q

TCPdump

A

Data network packet analyzer that runs under a cmd line interface

68
Q

RSA

A

Asymmetric encryption to secure web and email traffic

69
Q

What does endpoint protection help reduce?

A

Malware

70
Q

Residual Data

A

Leftover info after erasing a hard drive

71
Q

WPA3

A

Wireless protocol

72
Q

System hardening

A

Done to an organizations attack surface to protect its devices and network

73
Q

When are software updates performed?

A

After testing and vetting

74
Q

Port 53

A

Needs to be removed when running a web server

75
Q

Core Impact - Exploit framework

A

Centralized penetration testing that enables security teams to conduct multi-phased penetration tests

76
Q

What control protects against authorization attacks?

A

Principle of least privilege

77
Q

Wireshark

A

Packet sniffer used to monitor web traffic. Can intercept and troubleshoot traffic from wired and wireless sources.

78
Q

Burp Suite

A

Web assessment and analysis tool that looks for issues on websites such as XSS or SQL injection flaws

79
Q

Fuzzer

A

Analysis tool that bombards applications with all manner of data and inputs from a wide variety of sources in the hope that the application will fail/perform in unexpected ways

80
Q

Port 80

A

Provides HTTP Services - Web content

81
Q

Port 22

A

Provides remote access services and is secured with Secure Shell