Basic security controls and data Flashcards
(49 cards)
What is the DAD triad
Disclosure, Alteration, Denial
What is the difference between strategic and operational risks
Strategic risks impact major goals and objectives, operational risks affect daily functions
Define physical controls
controls used to limit physical access
Define managerial controls
administrative controls associated with security design and implementation
Define operational controls
processes put in place to manage technology in a secure manner
What are the two mechanisms of action DLP uses?
watermarking- electronic tags applied by administrators
Pattern matching- flagging transmissions based on signs of sensitive information eg Top Secret or social security
What is the difference between isolation and segmentation of networks?
Segmented networks allow free communication between devices on the same network but restrict outside communication. Isolated systems are completely cut off from outside networks.
What is the difference between agent based and agentless DLP?
Agent based DLP uses software installed on systems and searches them for sensitive information, and blocks undesirable actions.
Agentless DLP is network based and monitors traffic and can block/allow or encrypt transmissions with sensitive data
What is an MSP
Managed service providers remotely manage a customer’s IT infrastructure and end user systems
What is a threat map
A geographic representation of where cyber attacks originate from
What is an API key?
a security token used to authenticate and authorize requests made to an API
What is the function of a decompiler
to translate compiled binary code back its source programming language eg Python or Java
What do these abbreviations mean in relation to CVSS:
AV
AC
PR
UI
S
C
I
A
Attack vector
Attack complexity
Privileges required
User interaction
Scope
Confidentiality
Integrity
Availability
What are these organizations examples of: Ernst & Young, Deloitte, PricewaterhouseCoopers PwC, KPMG
These are four of the biggest external audit firms
What are the five steps of the vulnerability lifecycle
Identification, analysis, response and remediation, validation of remediation, reporting
What are the eight steps of the SDLC
planning, requirements, design, coding, testing, training and transition, ongoing operations and maintenance, end of life decommissioning
What are APIs used for
they are used as interfaces between clients and servers or applications and operating systems
What is a file inclusion attack
executing code contained within a file hosted on the victim web server or on a remote server
What is a cross site request forgery
Attackers embed code in one website that sends a command to a second website. The attack is only successful if the victim is already logged on to both sites.
What is a server side request forgery
tricking a server into visiting a URL to retrieve information
what is parameter pollution
sending more than one value for an input variable to bypass security controls
what is a memory leak
when an application fails to return memory it no longer needs
what is buffer overflow
when an attacker manipulates a program into placing more data into an area of memory than expected
define key space and key length
key space is the range of values possible for use as a key, key length is the number of bits in a key