CBK1 - terms Flashcards

(35 cards)

1
Q

what is steganography

A

a way of hiding information in plain sight. it is a method/technique that is part of the confidentiality tenet (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is traffic padding (in network security)

A

adding content to traffic so as to make it appear less readable/more random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a logic bomb

A

a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects. typically affects the INTEGRITY tenet (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how many items comprise a AAA system

A

identification, authentication, authorization, auditing, accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does AAA stand for

A

Access, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of DATA CLASSIFICATION

A

To determine what level of effort should be put into place to protect the data in question. It is part of SECURITY GOVERNANCE. Another item of SECURITY GOVERNANCE is CHANGE CONTROL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps/phases to implementing a DATA CLASSIFICATION SCHEME - how many steps are there

A
  1. Identify the custodian/identify their responsibilities
  2. Specify the evaluation criteria (how the info will be classified and labeled)
  3. Classify and label each resource
  4. Document exceptions to the classification policy
  5. Select the security controls to be applied to each classification level
  6. Specify procedures for declassification and transfer of custody
  7. Create an enterprise-wide awareness program/training on the classification system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the classification of data for use by GOV/MIL

A
TOP SECRET (CLASSIFIED), 
SECRET (CLASSIFIED), 
CONFIDENTIAL (CLASSIFIED), 
SENSITIVE BUT UNCLASSIFIED [SBU], 
UNCLASSIFIED
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the commercial/business/private sector CLASSIFICATION LEVELS (as used in the CISSP exam)

A

CONFIDENTIAL (HIGH), sometimes PROPRIETARY (if related to critical impact on competitive edge of the company)
PRIVATE (HIGH),
SENSITIVE (LOW),
PUBLIC (LOW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the 6 organizational roles and responsibilities in security

A

Senior manager: (organizational owner of the policy and sign off on all measures)
Security Professional: (functional responsibility for security - writes procedures for approval by SM/follows/implements procedures in alignment with the security policy mandated by the senior manager) - not a decision-maker.
Data Owner: responsible for classifying the data and its protection within the security solution
Data Custodian: implements the prescribed procedures to protect the data according to the CIA triad.
User: person who has access to the data (but according to the principle of least privilege)
Auditor: responsible for reviewing and verifying that the security policy is properly implemented - produces compliance reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is COBIT

A

A documented set of best IT Security practices. A framework of governance and management of enterprise IT. Designed to help map a set of IT security ideals to business objectives. Based on 5 principles:

  1. Meeting Stakeholder needs
  2. Covering the Enterprise end-to-end
  3. Applying a Single-Integrated Framework
  4. Enabling a holistic approach
  5. Separating Governance from Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a baseline (as part of a formal security policy structure) - what organizations can be referenced to govern security standards and baselines

A

A baseline is a minimum level of security that has to be met. Orgs: NIST, TCSEC, ITSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what elements comprise a formal security policy structure

A

Policies, Standards & Baselines, Guidelines, and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Threat Modeling

A

A process where potential threats are identified, categorized, and analyzed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify 2 approaches to Threat Modeling

A

Proactive (example Microsoft SD3+C)

Reactive (or adversarial) such as ethical hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is FUZZ testing

A

a specialized dynamic testing technique that provides many different inputs to test the limits of software and find previously undetected flaws.

17
Q

what is STRIDE

A

A system created by Microsoft to categorize threats

18
Q

What acronyms comprise STRIDE

A

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, elevation of Privilege

19
Q

What is PASTA

A

A 7-step thread modeling methodology - it is a risk-centric approach

20
Q

What are the acronyms of PASTA

A

Process for Attack Simulation and Threat Analysis

21
Q

What are the 7 stages of PASTA

A
  1. Definition of Objectives for the analysis of risks (DO)
  2. Definition of the technical scope (DTS)
  3. Application Decomposition and analysis (ADA)
  4. Threat Analysis (TA)
  5. Weakness and vulnerability analysis (WVA)
  6. Attack modeling and simulation (AMS)
  7. Risk analysis and management (RAM)
22
Q

What are the main phases of Threat Modeling

A
  1. Determine and Diagram Potential Attacks
  2. Perform Reduction Analysis
  3. Define/document prioritization and response (DREAD)
23
Q

What are the key concepts found/broken down in a reduction analysis

A
Trust boundaries
Data Flow paths
Input points
Privileged operations
Details about security stance and approach
24
Q

What is DREAD

A

A Threat ranking system/technique

25
what are the acronyms of DREAD
``` Damage potential Reproducibility Exploitability Affected Users Discoverability ```
26
What is SOC
Service Organization Control - an auditing framework (example: SOC1 and SOC2 reports provide insight on an org's security infrastructure)
27
What is SSAE - what is the latest version of the SSAE regulation
Statement on Standards Attestation Engagements - latest version is 18 (came into effect on May 1, 2017)
28
What is the scope of a SOC1 audit
description of security mechanisms to describe their suitability
29
What is the scope of a SOC2 audit
implemented security controls in relation to availability, security, integrity, privacy, and confidentiality
30
List risk-related terminology
Asset, Asset Valuation, Threat, Threat Agent, Vulnerability, Exposure, Risk, Safeguard, Attack, Breach
31
What is the formula that defines Risk
RISK = THREAT * VULNERABILITY
32
What are the 2 possible risk assessment/analysis methods
Quantitative and Qualitative
33
List the 6 steps in a Quantitative risk analysis
1. Inventory Assets/assign value (AV) 2. Produce a list of threats for each asset/calculate exposure factor (EF) and single loss expectancy (SLE) 3. Perform Threat Analysis to understand likelihood of occurrence in a year or annualized rate of occurrence (ARO) 4. Derive the overall loss potential per threat or annualized loss expectancy (ALE) 5. research countermeasures for each threat and how it affects the ARO and ALE 6. Perform a cost/benefit analysis for each threat for each asset. select most appropriate response to each threat
34
Name the 5 elements used in a quantitative risk analysis
``` AV: Asset Value EF: Exposure Factor SLE: Single Loss Expectancy ARO: Annualized Rate of Occurrence ALE: Annualized Loss Expectancy ```
35
What are the common steps of APT activity
``` Attack (zero day/phishing) Back Door Lateral Movement (elevation of privileges/access to higher-services/accounts) Data Harvesting Exfiltration ```