Architecture & Design Flashcards
List 6 Examples of
Configuration Management
- Network maps / diagrams
- Device diagrams
- Port maps
- Baseline configurations
- Standard naming conventions
- IP schemas
Define
Data Sovereignty
- Laws associated with data depending on where it geographically resides
- Data that resides in a country is subject to the laws of that country
- Must comply with legal monitoring, court orders, etc.
Define
GDPR
- “General Data Protection Regulation”
- A set of rules in the European Union
• Among other things, it specifies that data collected on EU citizens must be stored in
the EU
• Extensive and complex
Define
Ciphertext
• Information that has been encrypted, in its encrypted form. The opposite of plaintext.
Define
Confusion
• The difference between a plaintext and its cyphertext is the amount of confusion
Define
Diffusion
• The difference between cyphertexts of plaintexts that are very similar
• Ex., two plaintexts that are identical except for one character should each produce
cyphertexts that are completely different. When they do, they have diffusion.
How to protect data in-transit?
- Network-based protection including firewalls, IPS
- Transport encryption, such as TLS and IPsec
How to protect data at-rest?
- Disk encryption, database encryption, and file- or folder-level encryption
- Access control lists, permission controls
Define
Tokenization
- Replacing sensitive data with a non-sensitive placeholder
- Common with credit card processing, using a temporary token during payment that is only good for the one transaction.
- If intercepted by an attacker, the attacker only gets the token and not the sensitive data that it represents.
- The token is NOT a result of encryption or hashing. The original data and the token are not mathematically related.
Define
IRM
- “Information Rights Management”
- Restrictions placed on a file or message to control how it is used
• Can restrict functions on a document such as ability to copy/paste, print, edit,
screenshot, etc.
• Can have different sets of rights for different users
Define
DLP
- Data Loss Prevention
- A system that monitors for sensitive data leaving the network, to prevent it.
- Can run on an endpoint, on the network, on the server, or cloud-based
- Can block custom defined data strings, file types, specific contents, etc.
Define
SSL
• Secure Socket Layer
• Has been replaced by TLS, but TLS is still often referred to colloquially as SSL or
as SSL/TLS
How can SSL/TLS inspection be performed?
- A device (usually a firewall) must sit in the middle of all secure information and act as a proxy.
- Endpoint devices must have a CA certificate installed for the middle device
What typically causes older hashes to be retired?
• If it runs into collisions (different source data producing the same hash output)
Define
API Injection
- An attack where the attacker injects data into an API message
- Often performed via an on-path attack or replay attack
- (API stands for “Application Programming Interface”)
How can API be secured? (Four answers)
- Authentication
- Require secure protocols
- Limit authorization; the API should not have access to more than it absolutely needs
- Utilize a WAF to apply rules to API communication
What does this stand for:
WAF
• Web Application Firewall
Define
Hot Site
- An exact, or almost exact, replica of your primary site
- Contains all necessary hardware, infrastructure, etc.
- Has all data and applications synchronized in real-time from the primary site
- Serves as an immediately fail-over if the primary site goes down
Define
Cold Site
- A failover location for when a primary site goes down
- Does not keep any hardware or staffing on hand
- Does not keep a live copy of data synchronized
- Would take a significant amount of time to get running if the primary site went down.
Define
Warm Site
- A failover location that is not as equipped and ready as a hot site
- May have all necessary equipment, but it may not be powered on and data sync may not be in real time
- May take time to get brought online when needed
Define
Honeynet
• Multiple honeypots on a network
• Can be used to observe multiple attackers, or see what an attack does between
multiple devices
Define
Honeyfiles
- Bait for the honeynet / honeypot
- Files that you want the attacker to try to get, such as a file named passwords.txt
- An alert is triggered if the file is accessed, like a virtual bear trap
Define
Fake Telemetry
• Attackers send fake data to a machine learning system in order to make malicious
malware appear benign
• Once the machine learning is trained on the fake telemetry, it will not detect the
malware
Define
Sinkhole
- A DNS server that hands out incorrect IP Addresses
- If the DNS server hands out a non-routable address, then it’s a particular type of Sinkhole known as a Blackhole
- Can be malicious, if used by an attacker for a DOS, or to redirect traffic to a malicious site
- More often used for security purposes, to redirect known malicious domains to a benign IP address. It then collects info on devices that hit that benign IP address, since that identifies them as being infected.