Course 2 Flashcards
(118 cards)
What is the 1st CISSP domain?
Security and risk management domain - It deals with identifying and documenting security goals and objectives.
Deals with the disaster recovery process.
Deals with Compliance and regulations.
It is also responsible for creating risk management processes. It will find the best frameworks to manage security risks.
What is the 2nd CISSP domain?
Asset security domain - This domain deals with the physical and digital security of assets.
Also deals with storing, maintaining, and disposing of assets securely once they are no longer needed.
What is the 3rd CISSP domain?
Security Architecture and Engineering - It is a domain that deals with data security by ensuring the best tools, processes, and controls are implemented to manage risks, threats, and vulnerabilities.
It focuses on the following -
- Least privilege
- Separation of duties
- Fail securely
- Zero trust
- Trust but verify
- Defense in depth
- keep security simple
what is 4th CISSP domain?
Communication and network security - Deals with the security of wireless communication and physical network security
What is 5th CISSP domain?
IAM - Identity and Access management
The main principle of IAM domain -
Identity, Authentication, Authorization and Accounting
What is 6th CISSP domain?
Security assessment and testing - This deals with assessing the current security controls and standards and processes and making sure that they are doing the task that they are implemented for.
It also deals with the security auditing part.
Penetration testers belong to this team.
What is 7th CISSP domain?
Security operations - This deals with the security incidents as they happen.
What is 8th CISSP domain?
Application development security - Focuses on using secure coding practices while developing applications.
What is a threat?
It is something that can negatively impact an organizational asset.
What is risk?
Risk is something that can impact the CIA of an asset.
What are the 3 types of web?
Surface web, Deep web, Dark web
What are the First 3 steps involved in NIST RMF (Risk Management Framework)?
- Prepare - prepare for the activities to protect organization from risk, threats and vulnerabilities. Find the risks, threats and vulnerabilities and look for the controls to protect from them.
- Categorize - Finds out the different ways to manage these risks, threats and vulnerabilities
- Stelect -
What are the last 4 steps involved in NIST RMF (Risk Management Framework)?
- Implement -
- Assess -
- Authorize -
- Monitor -
What is Proxy logon vulnerability?
It was a vulnerability in the Microsoft Exchange server in which threat actors could complete the authentication from proxy server to gain unauthorized access to the exchange server.
What is Zerologon vulnerability?
It was a vulnerability in Microsoft Netlogon authentication protocol in which the threat actor exploited the 4-way handshake process and in which the end threat actor was able to add an encryption key with all zeros so that name is Zerologon vulnerability.
This attack can be deployed remotely.
What is Log4shell vulnerability?
It allowed attackers to run Java code on someone else computer or leak sensitive information. It does this by enabling a remote attacker to take control of devices connected to the internet and run malicious code.
What is PetitPotam vulnerability?
It was kind of man in the middle attack. It affects Windows New Technology LAN Manager (NTLM).
What is Server side request forgery vulnerability?
It allows attackers to manipulate a server-side application into accessing and updating backend resources . It can also allow attackers to steal data.
What is the Cyber Threat framework?
It is a framework that was created to provide a common language to share or discuss security-related information among security professionals.
It makes the analyzing and sharing information more easy.
What is NIST Cyber Security framework and its components?
It is a voluntary framework that organizations can follow to mage risks, threats, and vulnerabilities in their assets and data.
There are 5 components in Cyber Security Framework -
- Identify - Identify all the risks, vulnerabilities. Identify what are the security goals of the organization and compliance expectations.
- Implement - Implement the standards, processes, and controls to manage security risks.
- Detect - Detect any security incidents and improve monitoring capabilities to increase the speed and efficiency of detections.
- Respond - Respond to the incident. Contain the attack, find the root cause of the attack, and neutralize the attack.
- Recover - The process of returning affected systems back to normal operation.
What OWASP stands for and what it is?
OWASP stands for Open Web Application Security Project. It provides guidelines to minimize the security risks on organization assets.
Sometimes it is also known as Open Worldwide Application System Project
What are OWASP security principles?
- Minimize the attack surface area - It refers to all the potential vulnerabilities that a threat actor can exploit.
- Principle of least privilege
- Defense in depth -
- Separation of duties
- Keep security simple
- Fix security issues correctly - This means when some security incident occurs, identify the root cause, contain the impact, identify vulnerability, and conduct tests to ensure that remediation is successful.
- Fail securely
- Establish secure defaults
- Avoid security by Obscurity - The security of systems should not only rely on keeping details hidden. For example - keeping the source code of applications a secret.
What are security audits?
It is the process of reviewing security processes, standards and controls to ensure that they are performing or working as expected (doing the work that they are supposed to do)
What are the common elements of internal security audits?
- Establish the scope and goals of the security audit. Scope includes the process of finding all assets, people, policies, procedures, and technologies that need to be audited.
- Conduct the risk assessment. Find out the vulnerabilities in the assets that we have defined in the scoping process.
- Conduct the control assessment of controls that have been implemented to protect the assets defined in the scope.
- Communicating results to stakeholders.99