Chapter 9- Security Vulnerabilities, Threats and Countermeasures Flashcards

1
Q
  1. Explain Ultraviolet EPROMs (UVEPROMs):
A

UVEPROMs can be erased by light. After this is done, end users can burn new information into the UVEPROM as if it has never been programmed before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Explain Electronically Erasable Programmable Read-Only Memory (EEPROM).
A

Electronically Erasable Programmable Read-Only Memory (EEPROM) uses electronic voltages delivered to the pins of the chip to force erasure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Define Flash Memory
A

flash memory is a derivative concept from EEPROM.EEPROM must be fully erased to be rewritten whereas flash memory can be erased and written in blocks or pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Explain Electronically Erasable Programmable Read-Only Memory (EEPROM).
A

Electronically Erasable Programmable Read-Only Memory (EEPROM) uses electronic voltages delivered to the pins of the chip to force erasure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Define Flash Memory
A

flash memory is a derivative concept from EEPROM.EEPROM must be fully erased to be rewritten whereas flash memory can be erased and written in blocks or pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Define Flash Memory
A

flash memory is a derivative concept from EEPROM.EEPROM must be fully erased to be rewritten whereas flash memory can be erased and written in blocks or pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A common type of flash is
A

NAND Flash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Uses of flash memory
A

Flash Memory is used in memory cards, thumb drives, mobile devices and SSD (Solid state drives)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Explain Random Access Memory (RAM)
A

RAM is readable and writable memory that contains information a computer uses during processing. It I a temporary storage that losses data when powered off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Types of RAM
A

Real Memory, Cache RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Explain Real Memory
A

Composed of a number of dynamic RAM chips, must be refreshed by the CPU on a periodic basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Explain Cache RAM
A

this involves the improvement of performance by taking data from slower devices and temporarily storing it on faster devices when repeated use is likely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Explain Real Memory
A

Composed of a number of dynamic RAM chips, must be refreshed by the CPU on a periodic basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Explain Cache RAM
A

this involves the improvement of performance by taking data from slower devices and temporarily storing it on faster devices when repeated use is likely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Explain Registers
A

this are limited amount of on board memory that are included on the CPU. It provides the CPU with directly accessible memory locations that the Arithmetic and Logical Unit (ALU) uses when performing calculations or processing instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Explain Memory Addressing
A
  1. Explain Memory Addressing: Memory Addressing occurs when using memory resources, the processor must have some means of referring to various locations in memory.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. List 5 addressing schemes
A
Memory Addressing
Immediate Addressing 
Direct Addressing
Indirect
Register Addressing
Base+Offset Addressing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Define Register Addressing
A

when CPU needs information from one of its registers to complete an operation, it uses a register address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Define immediate addressing
A

this is a way of referring to data that is supplied to the CPU as part of an instruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Define Direct addressing
A

In Direct addressing the CPU is provided with an actual address of the memory location to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Define Indirect Addressing
A

For indirect addressing, memory address contains another memory address. The CPU reads the indirect address to learn the address where the desired data resides and then retrieves the actual operand from that address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Define Base+Offset Addressing
A

Base+Offset addressing uses a value stored in one of the CPU’s registers as the base location from which to begin counting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. What is Secondary Memory:
A

Secondary Memory is a term commonly used to refer to magnetic, optical or flash-based media or other storage devices that contain data not immediately available to the CPU. It is cheap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. List some types of secondary memory
A
Hard disks
Flash drives
Optical media eg compact disks (CD)
Digital Versatile Disks (DVD)
Blu-ray
Virtual Memory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Explain Virtual Memory
A

Virtual Memory is a special type of memory that the OS manages to make look and act like real memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. The most common type of virtual memory is:
A

the pagefile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. Explain pagefile
A

Pagefile is a type of virtual memory. Most operating systems manage it as part of their memory management function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Explain Primary vs secondary storage

A

Primary memory means primary storage and refers to the RAM. Secondary storage consists of magnetic and optical media such as HDD, SSDs, flash drives, magnetic tapes, CDs, DVDs, flash memory cards, and the like.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. Explain the term volatility of memory
A

the volatility of storage refers to a measure of how likely it is to lose data when it is turned off. Devices designed to retain their data (such as magnetic media) are classified as non-volatile, whereas devices such as static or dynamic RAM modules, which are designed to lose their data, are classified as volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Define random access storage:
A

: the volatility of storage refers to a measure of how likely it is to lose data when it is turned off. Devices designed to retain their data (such as magnetic media) are classified as non-volatile, whereas devices such as static or dynamic RAM modules, which are designed to lose their data, are classified as volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Explain sequential storage devices
A

: the require that you read all the data physically stored prior to the desired location. E.g. magnetic tape, to provide access to the data stored in the middle of tape, the drive must physically scan through the entire tape until it reaches the desired point. It is slower than RAM, cheap and can hold massive data. Used for backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Explain Data Remanence:

A

data may remain on secondary storage devices even after it has been erased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. Explain wear levelling
A

In SSDs wear levelling means that there are blocks of data that are not marked as live but that hold a copy the data when it was copied off to lower wear levelled blocks. Therefore traditional zero wipe is not effective for SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. Disadvantage of secondary storage
A

Data may remain on the secondary storage
Secondary storage are prone to theft
Easy access to data
Unsure availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Explain the risk posed to monitors

A

TEMPEST can compromise the security data displayed on a monitor. Cathode Ray Tube (CRT) monitors care prone to radiate significantly., Liquid Crystal Display (LCD) monitors leak much less

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. Explain the compromise from TEMPEST
A

TEMPEST is a technology that allows the electronic emanations that every monitor produces (known as Van Eck radiation) to be read from a distance (this process is known as Van Eck phreaking) and even from another location. The technology is also used to protect against such activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Explain Shoulder Surfing

A

Shoulder Surfing is a concept that someone can see what is on your screen with their eyes or video camera. It is a concern for desktop displays, notebook displays, tablets and mobile phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. Explain the vulnerability around the use of printers
A

depending on physical security it may be possible to work out of a building with sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. How can you secure a printer
A

use of encrypted data transfer and authentication before printer interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. Explain Keyboard/ Mice vulnerability
A

Keyboard and mice are vulnerable to TEMPEST monitoring, keyboards are vulnerable to less sophisticated bugging. A simple device can be placed inside a keyboard or along its connection cable to intercept all the keystrokes that take place and transmit them to a remote receiver using a radio signal. This has the same effect as TEMPEST monitoring but can be done with much less expensive gear. Additionally, if your keyboard and mouse are wireless, including Bluetooth, their radio signals can be intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. Explain the vulnerability of using modems
A

Modems allow users to create uncontrolled access points into your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  1. What is firmware
A

Firmware is a term that is used to describe the software that is stored in a ROM chip. This type of software hardly changes, and it drives the basic operation of a computing device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  1. List 2 types of Firmware:
A

Firmware is a term that is used to describe the software that is stored in a ROM chip. This type of software hardly changes, and it drives the basic operation of a computing device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
  1. BIOS full name
A

Basic Input Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  1. What is BIOS
A

Basic Input Output System (BIOS) contains the operating system i.e. the independent primitive instructions that a computer needs to start up and load the operating system from disk. In most computers, BIOS is stored on the EEPROM chip to facilitate version updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
  1. Explain the term flashing the BIOS
A

this is the process of updating the BIOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is phlashing

A

phlashing is an attack in which a malicious variation of official BIOS or firmware is installed that introduces remote control or other malicious features into a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
  1. What do you understand by UEFI
A

Unified Extensible Firmware Interface (UEFI) hav replaced traditional BIOS. It is a more advance interface between hardware and the operating system which maintains support for legacy BIOS services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
  1. What is client-based vulnerability
A

Client based vulnerability place the user, their data and their system at risk of compromise or destruction. A client-side or client-focused attack is one where the client itself, or a process on the client, is the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  1. What are applets
A

Applets are code objects sent from server to client to perform some actions. They execute independently of the server that sent them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  1. Two types of applets are
A

Java applets and ActiveX Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
  1. What are Java Applets
A

Java is a platform-independent programming language developed by Sun Microsystems (now owned by Oracle). Most programming languages use compilers that require the use of multiple compilers to produce different versions of a single application for each platform it must support. Java overcomes this limitation by inserting the Java Virtual Machine (JVM) into the picture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
  1. What are ActiveX Controls
A

Active X controls are Microsoft’s answer to Sun’s java Applets. hey are implemented using a variety of languages, including Visual Basic, C, C++, and Java. There are two key distinctions between Java applets and ActiveX controls. First, ActiveX controls use proprietary Microsoft technology and, therefore, can execute only on systems running Microsoft browsers. Second, ActiveX controls are not subject to the sandbox restrictions placed on Java applets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
  1. What are local caches
A

Local cache is anything that is temporarily stored on the client for future reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
  1. List some local cache on a client
A

Address Resolution Protocol (ARP) cache, Domain Name System (DNS) cache, and internet files cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
  1. What is ARP cache Poisoning
A

This is caused by an attack responding to Address Resolution Protocol (ARP) broadcast queries in order to send back falsified replies. If the false reply is received by the client before the valid reply, then the false reply is used to populate the ARP cache and the valid reply is discarded as being outside an open query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
  1. What is data flow
A

Data Flow is the movement of data between processes, devices, across a network or over communications channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
  1. List the advantages of management of data flows
A

efficient transmission with minimal delays or latency. Ensures reliable output using hashing and confidentiality protection with Encryption. Helps prevent overload of traffic that causes denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
  1. What are load balancers used for
A

? Load balancers are used to spread or distribute network traffic load across several network links or network devices. It may be used to provide more control over data flow. To obtain more optimal infrastructure utilization, minimize response time, maximize throughput (output), reduce overloading and eliminate bottlenecks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
  1. Load Balancing techniques to perform load distribution are:
A

random choice, preferencing, round robin and load/utilization monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
  1. Disadvantage of Data Load Balancing:
A

Denial of service attack is a severe detriment to data flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q
  1. What is aggregation:
A

SQL provides a number of functions to combine records from one or more table to provide potentially useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
  1. Explain the security vulnerability of aggregation:
A

Aggregation attacks are used to collect numerous low level security items or low value items and combine them to create something of a high security level or value. For this reason, it’s especially important for database security administrators to strictly control access to aggregate functions and adequately assess the potential information they may reveal to unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
  1. What is Inference
A

Inference attacks involve the combining of several pieces of non sensitive information to gain access to information that should be classified at a higher level. Inference makes use of the human mind’s deductive capacity rather than the raw mathematical ability of modern database platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is data dictionary

A

Data Dictionary is commonly used for storing critical information about data, including usage, type sources and relationships and format.
The Database Management System software reds the data dictionary to determine access rights for users attempting to access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
  1. Explain Data Mining
A

Data Mining Techniques allow analysts to comb through data warehouses and look for potential correlated information. Data Mining techniques result in the development of data models that can be used to predict future activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
  1. What is metadata
A

The activity of data mining produces metadata. Metadata is data about data or information about data. Metadata from a data mining operation is a concentration of data. It can also be a superset, a subset, or a representation of a larger dataset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q
  1. What is an incident report
A

Incident report is metadata extracted from a data warehouse of audit logs through the use of a security auditing data mining tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
  1. What is of a greater value or sensitivity (due to disclosure) than the bulk of the data in the warehouse?
A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
  1. What is data mart?
A

This a secure container used to store metadata.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
  1. Define Data Analytics
A

Data Analytics is the science of raw data examination with the focus of extracting useful information out of the bulk information set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q
  1. What is big data
A

Big Data refers to the collection of data that is so large that the traditional means of analysis or processing are ineffective, inefficient and insufficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q
  1. List the challenges of big data
A

collection, storage, analysis, mining, transfer, distribution and results presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q
  1. What are parallel data systems or parallel computing
A

parallel data systems or parallel computing is a computation system designed to perform numerous calculations simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q
  1. What is asymmetric multiprocessing
A

Asymmetric multiprocessing occurs when processors operate independently of each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q
  1. What is symmetric processing
A

symmetric multiprocessing occurs when the processors share a common OS and memory. The collective processors also work collectively on a single task, code or project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
  1. What is Massive Parallel Processing (MPP):
A

Massive Parallel Processing (MPP) is a variation on AMP, where numerous Symmetric multiprocessing systems are linked together to work on a single primary task across multiple processes in multiple linked systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q
  1. What is distributed system
A

the concept of client-server network is also known as distributed system or distributed architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q
  1. What is defence in depth
A

this is the use of multiple types of access controls in lateral or theoretical concentric circles

80
Q
  1. What is monolithic security
A

A monolithic or fortress mentality is the belief that a single security mechanism is all that is required to provide sufficient security

81
Q
  1. What is cloud computing
A

cloud computing is a concept of computing where processing and storage are performed elsewhere over a network rather than locally. Cloud computing is a natural extension and evolution of virtualization, the internet, distributed architecture, and the need for ubiquitous access to data and resources

82
Q
  1. Cloud based computing is also known as
A

remote computing and remote virtualisation

83
Q
  1. Disadvantages of cloud computing
A

Privacy concerns, regulation compliance difficulties, use of open versus closed-source options, adoption of open standards and security of data stored.

84
Q
  1. What is hypervisor
A

Hypervisor is also known as Virtual Machine Monitor (VMM), is a component of virtualisation that creates, manages, and operates virtual machines

85
Q
  1. The computer running the hypervisor is known as
A

the host OS

86
Q
  1. The OSs running within a hypervisor supported virtual machine is known as
A

guest OS.

87
Q
  1. Explain Type I hypervisor
A

there is no host OS, hypervisor installs directly onto hardware here the OS would normally reside. Type 1 hypervisors are often used to support server virtualization.

88
Q
  1. Explain Type II hypervisor
A

this is a hosted hypervisor. In this configuration the standard OS is present on the hardware, and then the hypervisor is installed as another software application. E.g. guest OSs offer safe sandbox

89
Q
  1. What is elasticity (cloud):
A

Elasticity refers to the flexibility of virtualization and cloud solutions to expand or contract based on need.

90
Q
  1. What is Host Elasticity
A

Host Elasticity means that additional hardware hosts can be booted when needed and then used to distribute the workload of the virtualized services over the newly available capacity

91
Q
  1. Explain Platform as a Service
A

computing platform is an environment in which a piece of software is executed. It may be hw or OS or even a web browser. Platform as a Service (PaaS) is the concept of providing a computing platform and service solution stack as a virtual or cloud based service

92
Q
  1. Advantage of PaaS
A

avoidance of having to purchase and maintain a high end hardware and software locally

93
Q
  1. Explain Software as a service (SaaS):
A

SaaS provides on demand online access to specific software applications or suites without the need for local installation. SaaS can be implemented as a subscription service (for example, Microsoft Office 365), a pay-as-you-go service, or a free service (for example, Google Docs).

94
Q
  1. Explain On Premise Solution:
A

: this is the traditional deployment concept in which the organisation owns the hardware, licenses the software, operates and maintains the systems on its own usually in their own building

95
Q
  1. Explain Hosted Solution
A

Hosted solution is a deployment concept where the organization must license software and then operates and maintains the software. The hosting provider owns, operates, and maintains the hardware that supports the organization’s software.

96
Q
  1. What is a cloud solution
A

cloud solution is a deployment where an organisation contracts with a third party cloud provider. The cloud provider owns, operates and maintains the hardware and software

97
Q
  1. List some cloud deployment options
A

Private, Public, Hybrid and Community.

98
Q
  1. What is private cloud
A

a private cloud is a cloud service within a corporate network and isolated from the internet. It is for internal use only

99
Q
  1. What is a virtual private cloud
A

virtual private cloud is a service offered by the public cloud provider that provides an isolated subsection of a public or external cloud for exclusive use or by an organisation internally

100
Q
  1. What is public cloud
A

this is accessible to the general public, typically over an internet connection. It may involve pay as you use or subscription

101
Q
  1. What do you understand by hybrid cloud
A

Hybrid Cloud is a mixture of private and public cloud components.

102
Q
  1. What do you understand by community cloud:
A

community cloud is a cloud environment maintained, used and paid for by a group of users or organisations doe their shared benefit, such as collaboration and data exchange

103
Q
  1. Advantages of cloud solutions
A

cloud solutions often have a lower up front cost, lower maintenance costs, vendor maintained security

104
Q
  1. What are snapshots:
A

snapshots are backups of virtual machines. They offer quick means to recover from errors or poor updates

105
Q
  1. Explain security management of cloud
A

virtualisation does not lessen the security management of OS. Therefore, patch management is essential. Virtualized OS can be tested in the same way as hardware installed Oss and vulnerability assessments and penetration testing can also be done.

106
Q
  1. What is Cloud Access Security Broker (CASB)?
A

Cloud Access Security Broker (CASB) is a security enforcement solution that may be installed on-premises or it may be cloud based. The goal of the CASB is to enforce and ensure that proper security measures are implemented between a cloud solution and a customer organisation.

107
Q
  1. What is SECaaS?
A

Security as a Service (SECaaS) is a cloud provider concept in which security is provided to an organisation through or by an online entity. SECaaS often implement software-only security components that do not need dedicated on-premises hardware.

108
Q

What is Infrastructure as a service (IaaS)

A

is a type of cloud computing service that offers essential compute, storage, and networking resources on demand, on a pay-as-you-go basis. It includes virtualisations, servers, storage and networking

109
Q
  1. SECaaS security products can be:
A

authentication, authorisation, auditing/accounting, anti-malware, intrusion detection, compliance and vulnerability scanning, penetration testing and security event management.

110
Q
  1. What is grid computing?
A

Grid Computing is a form of parallel distributed processing that loosely groups a significant number of processing nodes to work towards a specific processing goal.

111
Q
  1. What is Peer-to-Peer (P2P):
A

Peer-to-Peer technologies are networking and distributed application solution that share tasks and workloads among peers. e.g. VoIP services like skype, Spotify etc.

112
Q
  1. What is the Internet of Things (IoT):
A

Internet of Things involve smart devices that are internet connected in order to provide automation, remote control, or AI processing to traditional or new appliances or devices in a home or office setting.

113
Q

What are Industrial Control Systems (ICS)?

A

Industrial Control Systems is a form of computer management device that controls industrial processes and machines.

  1. Industrial Control Systems are used across a wide range of industries name them: manufacturing, electricity generation and distribution, water distribution, sewage processing and oil refining.
114
Q
  1. List some forms of Industrial Control Systems (ICS):
A

Distribution Control Systems (DCS), Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA)

115
Q
  1. What are Distribution Control Systems (DCS)?
A

Distribution control Systems are found in industrial process plans where the need to gather data and implement control over a large scale environment from a single location is essential.

116
Q
  1. What are Programmable Logic Controllers (PLCs):
A

Programmable Logic Controllers (PLCs) are single purpose or focused purpose digital computers. they are deployed for the management and automation of various industrial electro-mechanical operations. E.g. giant display system in a stadium.

117
Q
  1. What are SCADA
A

Supervisory Control and Data Acquisition (SCADA) systems can operate as a stand-alone device, networked with other SCADA Systems or networked with traditional information technology (IT) systems. They are designed with minimal human interfaces.

118
Q
  1. What is OWASP
A

Open Web Application Security Project (OWASP) is a non profit security project focussing on improving security for online or web-based applications. It is a large community that works together to freely share information, methodology, tools and techniques related to better coding practices and more secure deployment architectures.

119
Q
  1. What is injection attack?
A

Injection Attack is any exploitation that allows an attacker to submit code to a target system in order to modify its operations and or poison and corrupt its dataset.

120
Q
  1. What are SQL injection attacks?
A

SQL injection attacks use unexpected input to alter or compromise a web application. They are used to gain unauthorised access to an underlying database and related assets

121
Q
  1. List ways prevent SQL injection attacks:
A

SQL injection attacks use unexpected input to alter or compromise a web application. They are used to gain unauthorised access to an underlying database and related assets

122
Q
  1. List ways prevent SQL injection attacks
A

Performing input validation and limiting account privileges.

123
Q
  1. Describe Lightweight Directory Access Protocol (LDAP) injection
A

Lightweight Directory Access Protocol (LDAP) injection is a variation of an input injection attack, the focus is on the back end of an LDAP directory service rather than the database server. Just as with SQL injection, sanitization of input and defensive coding are essential to eliminate this threat.

124
Q
  1. Explain XML injection
A

XML injection is another variant of SQL injection, where the backend target is an XML application

125
Q
  1. What is XML exploitation
A

XML exploitation is a form of attack that is used either to falsify an information being sent to a visitor or cause their system to give up information without authorisation

126
Q
  1. What is Security Association Markup Language (SAML):
A

Security Association Markup Language is an XML based convention for the organisation and exchange of communication authentication and authorization details between security domains, often over web protocols.

127
Q
  1. What is used to provide single sign own?
A

SAML i.e. Security Association Markup Language.

128
Q
  1. What is Cross-site scripting (XSS)
A

Cross-site scripting (XSS) this is a form of malicious code-injection attack in which an attacker is able to compromise a web server and inject their own malicious code into the content sent to other visitors

129
Q
  1. Defences against Cross Site Scripting (XSS) for admin of websites:
A

maintaining a patched server,
using web application firewalls,
operating Host-based Intrusion Detection Systems (HIDS),
performing server-side input validation and auditing for suspicious activities.

130
Q
  1. Server-side Input Validation involves:
A

server-side input validation for length, malicious content and metacharacter filtering

131
Q
  1. How to avoid XSS as a web user:
A

keeping system patched, running antivirus software and avoiding nonmainstream websites. There are addons that allow only scripts of your choosing to be executed e.g. NoScript for Firefox and uBlock for Chrome.

132
Q
  1. What is Cross-site Request Forgery (XSRF)
A

the main purpose of XSRF is to trick the user or the user’s browser into performing actions they had not intended or would not have authorised. This could include logging out of a session, uploading a site cookie, changing account information, downloading account details, making a purchase, and so on.

133
Q
  1. List some measures that Website administrators can use to prevent Cross-site Request Forgery (XSRF):
A

request to re-enter passwords, sending text to user via email or phone or solving a Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) Another potential protection mechanism is to add a randomization string (called a nonce) to each URL request and session establishment and to check the client HTTP request header referrer for spoofing.

134
Q
  1. List vulnerabilities of android
A

exposure to malicious apps, running scripts from malicious websites, allowing insecure data transmissions

135
Q
  1. PEDs means
A

Portable Electronic Devices.

136
Q
  1. Explain Remote Wiping
A

remote wipe allows the deletion of all data and even configuration settings from a device remotely. It Is not a guarantee of data security as it is a deletion operation that can be undeleted. To ensure that remote wipe destroys data beyond recovery, the devise should be encrypted.

137
Q
  1. What is application control:
A

Application control is a device management solution that limits the applications that can be installed on a device

138
Q
  1. What is storage segmentation
A

Storage Segmentation is used to artificially compartmentalize various types or values of data on a storage medium. E.g. device management systems may be used to separate company data from user data and apps.

139
Q
  1. What is Mobile Device management (MDM)?
A
  1. Mobile Device management (MDM)is a software solution to the challenging task of managing mobile devices that employees use to access company devices
140
Q
  1. What are the goals of Mobile Device Management
A

Mobile Device Management can be used to push or remove apps, manage data, enforce configuration settings both over the air and wifi connections. It can be used to manage company and personally owned devices (BYOD).

141
Q
  1. Best option for key storage is
A

use of removable hardware or use of Trusted Platform Module (TPM).

142
Q
  1. What is credential management?
A

Credential Management refers to the storage of credentials in a central location. Some credential management options can provide, auto login options for apps and websites.

143
Q
  1. List mobile authentication ways:
A

use a password, provide a personal identification number (PIN), offer your eyeball or face for recognition, scan your fingerprint, or use a proximity device such as an Near Field Communication (NFC) or Radio Frequency Identification (RFID) ring or tile.

144
Q
  1. What is geotagging
A

Geotagging is a mobile devices with GPS support that enable the embedding of geographical location in the form of latitude and longitude as well as date or time and information on photos taken with these devices.

145
Q
  1. What is encryption?
A

Encryption id a protection against unauthorised access to data, whether in storage or transit.

146
Q
  1. What is encryption
A

Encryption id a protection against unauthorised access to data, whether in storage or transit.

147
Q
  1. What is application whitelisting?
A

Application whitelisting is a security option that prohibits unauthorized software from being able to execute.

148
Q
  1. What are other names for whitelisting: whitelisting is also known as implicit deny or deny by default.
A

whitelisting is also known as implicit deny or deny by default.

149
Q
  1. Explain BYOD
A

Bring Your Own Device (BYOD) is a policy that allows employees to bring their own mobile devices into work and use those devices to connect to the business network, business resources or the internet.

150
Q
  1. List other alternatives to BYOD
A

Company Owned Personally Enabled (COPE), Choose Your Own Device (CYOD)

151
Q
  1. Explain Virtual Mobile Infrastructure
A

Virtual Mobile Infrastructure (VMI) occurs when the operating system of a mobile device in virtualized on a central server.

152
Q
  1. Explain Mobile Onboarding
A

: Mobile Onboarding includes installing security, management and productivity apps along with implementing secure and productive configuration settings.

153
Q
  1. What is an embedded system
A

An Embedded System is a computer implemented as part of a larger system.

154
Q
  1. List some embedded systems
A

network attached printers, smart TVs, HCAC controls, smart thermostats, smart appliances, driver assist etc

155
Q
  1. What are static environments
A

Static Environment is a set of conditions, events and surroundings that don’t change. They are applications OSs, hardware sets or networks that are configured for a specific need, capability or function

156
Q
  1. What are cyber physical systems
A

cyber physical systems are devices that offer a computational means to control something in the physical world they are key elements in robotics and sensor networks. E.g. collision avoidance vehicles, air traffic control etc.

157
Q
  1. What is IoT?
A

Internet of Things (IoT) is a collection of devices that can communicate over the internet with one another or with a control console in other to affect and monitor the real world

158
Q
  1. Examples of static systems
A

Internet of Things (IoT) is a collection of devices that can communicate over the internet with one another or with a control console in other to affect and monitor the real world.

159
Q
  1. What is network segmentation:
A

Network Segmentation involves controlling traffic among networked devices.

160
Q
  1. What is Complete or Physical Network Segmentation
A

Complete or Physical Network Segmentation occurs when a network is isolated from all outside communications or transactions only.

161
Q
  1. How can you impose logical network segmentation?
A

Logical network segmentation can be imposed through the use Virtual Local Area Networks (VLANs) or through other traffic control means.

162
Q
  1. What is security Layers
A

security layers exists where devices with different level of classification or sensitivity are grouped together and isolated from other groups with different levels. Logical Isolation involves the use of classification Labels on data and packets which must be respected and enforced by network management. Physical segmentation involves the use of air gaps between networks of different security levels.

163
Q
  1. What is application firewall?
A

Application firewall is a device, server add on, virtual service or system filter that defines a strict set of communication rules.

164
Q
  1. What is network firewall?
A

Network Firewall is a hardware device, typically called an appliance, designed for general network filtering

165
Q
  1. What are manual updates?
A

Manual updates should be used in a static environment to ensure that only tested and authorised changes are implemented.

166
Q
  1. What are wrappers
A

Wrappers are used to enclose or contain something else. Wrappers are well known in the security community in relation to Trojan horse malware. A wrapper of this sort is used to combine a benign host with a malicious payload.

167
Q
  1. What is abstraction?
A

Abstraction says that users of an object don’t necessarily know how the object works they need to know just the proper syntax for using the object and the type of data that will be returned as a result. E.g. classes

168
Q
  1. What is data hiding?
A

Data Hiding ensures that data existing at one level of security is not visible to processes running at diff security levels. i.e. need to know.

169
Q
  1. What is process isolation:
A

Process Isolation requires that the system provide separate memory spaces for each process’s instruction and data. It also requires that the operating system enforce those boundaries, preventing one process from reading or writing data that belongs to another process.

170
Q
  1. Advantages of process isolation
A

it prevents unauthorised access, it protects the integrity of processes.

171
Q
  1. What is hardware segmentation?
A

Hardware segmentation enforces requirements through the use of physical hardware controls rather than logical process isolation controls imposed by the operating system

172
Q
  1. What is the principle of least privilege
A

when designing operating processes, you should ensure that they run in user mode whenever possible. The greater the number of processes that execute in privileged mode, the higher the number of potential vulnerabilities that a malicious individual could exploit to gain supervisory access to the system.

173
Q
  1. Principle of separation of privilege
A

this requires the use of granular access permissions, that is diff permissions for each type of privileged operation

174
Q
  1. Explain Accountability
A

Accountability is an essential component in any security design.it involves ability to monitor activities and interactions with system resources and configuration data and to protect resulting logs from unwanted access or alteration so that .

175
Q
  1. Explain covert channel:
A

Covert channel is a method that is used to pass information over a path that is not commonly used for communication

176
Q

What is covert timing channel

A

covert timing channel conveys information by altering the performance of a system component or modifying a resource’s timing in a predictable.

177
Q
  1. What is covert storage channel
A

covert storage channel conveys information by writing data to a common storage area where another process can read it.

178
Q
  1. What is buffer overflow
A

this violation occurs when programmers fail to validate input data sufficiently, particularly when they do not impose a limit on the amount of data their software will accept as input.

179
Q
  1. What are maintenance hooks
A

These are entry points into a system that are known only by the developer of the system. They are also known as back doors

180
Q
  1. What is data diddling
A

this occurs when an attacker gains access to a system and makes small, random or incremental changes to data during storage, processing, input, output or transaction rather than obviously altering file contents

181
Q
  1. How can data diddling be detected?
A

Such changes can be difficult to detect unless files and data are protected by encryption or unless some kind of integrity check (such as a checksum or message digest) is routinely performed and applied each time a file is read or written. Encrypted file systems, file-level encryption techniques, or some form of file monitoring (which includes integrity checks like those performed by applications such as Tripwire and other file integrity monitoring [FIM] tools).

182
Q
  1. What is salami attack?
A

Salami attack is the systemic whittling of assets in accounts or other records with financial value, where small amounts are deducted from balances regularly and routinely.

183
Q
  1. How can salami attacks be avoided
A

Salami attacks can be avoided through proper separation of duties and controls.

184
Q
  1. List some security flaws of programming
A

buffer overflow, any program must be able to handle exception.

185
Q
  1. What is Time of Check (TOC)?
A

Time of check (TOC) is the time at which the subject checks the status of the object.

186
Q
  1. What is time of use (TOU):
A

Time of Use (TOU) when the decision is made to access the object, the procedure accesses it at the time of use (TOU).

187
Q
  1. What are race conditions:
A

race conditions are situations where the attacker is racing with the legitimate process to replace the object before it is used.

188
Q
  1. What is service oriented architecture
A

Service Oriented Architecture (SOA) constructs new applications or functions out of existing but separate and distinct software services.

189
Q
  1. How to eliminate electromagnetic radiation interception
A

electromagnetic radiation interception can be eliminated by reducing emanation through cable shielding or conduit and block unauthorised personnel and devices from getting close to the equipment or cabling by applying physical security controls. TEMPEST Technology can provide protection against EM radiation eavesdropping. These include Faraday cags, jamming or noise generators and control zones.

190
Q
  1. What is Faraday Cage:
A

: Faraday Cage is a special enclosure that acts as an EM capacitor.

191
Q

a

A

a

192
Q

a

A

a

193
Q

a

A

a

194
Q

a

A

a

195
Q

a

A

a