D430 Flashcards
Fundamentals of Information Security - D430
Software development vulnerabilities
(6)
- Authentication attacks
- Authorization attacks
- Buffer overflows
- Cryptographic attack
- Input validation attacks
- Race conditions
Incident response cycle
1- preparation
2- detection and analysis
3- containment
4- eradication
5- recovery
6- post incident activity
Types of attacks [4]
- Interception: Unauthorized capturing of data, such as eavesdropping on network traffic.
- Interruption: Disruption of services or communication, leading to loss of availability, such as in a Denial of Service (DoS) attack.
- Modification: Unauthorized alteration of data, which can affect data integrity.
- Fabrication: Creation of fictitious data or transactions, leading to unauthorized insertion of data into systems.
Together, they represent a broad spectrum of security threats that can compromise the confidentiality, integrity, and availability of information systems.
Identification of critical information
1st step in the OPSEC process, arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed
What step is analysis of vulnerabilities?
3rd step in the OPSEC process: to look at the weaknesses that can be used to harm us
DES
(Encryption)
Data Encryption Standard (DES). While DES was once widely used and considered secure, advancements in computing power made its 56-bit key vulnerable to brute-force attacks. As a result, DES is now considered obsolete, and more robust encryption algorithms like AES are recommended for secure communication.
Risk Mamagement Steps
(5)
A constant process as assets are purchased, used and retired. The general steps are
1- identify assets
2- identify threats
3- assess vulnerabilities
4- assess risk
5- mitigating risks
Pretexting
a form of social engineering in which one individual lies to obtain confidential data about another individual
exploit framework
A group of tools that can include network mapping tools, sniffers, and exploits
man-in-the-middle attack
a hacker placing himself between a client and a host to intercept communications between them
Executable Space Protection
A hardware and software-based technology that prevents certain portions of the memory used by the operating system and applications from being used to execute code.
Acceptability
A measure of how acceptable the particular characteristic is to the users of the system
uniqueness
In cybersecurity, “uniqueness” refers to the quality of being distinct or one-of-a-kind within a specific context or system.
Cryptographic attacks
a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme
Rule-Based Access Control
A model that is based off of allowing or denying access based on a set of predetermined rules
Packet sniffers
A network or protocol analyzer, is a tool that can intercept traffic on a network, commonly referred to as sniffing. Sniffing basically amounts to listening for any traffic that the network interface of our computer or device can see, whether it was intended to be received by us or not. Some examples might be Wireshark (GUI) or Tcpdump (command-line tool)
Nmap
A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner. (Network mapper)
Clean desk
A policy designed to ensure that all confidential or sensitive materials are removed from a user’s workspace and secured when the items are not in use or an employee leaves her workspace.
VPN (Virtual Private Network)
A private network that is configured within a public network such as the Internet. A secure connection between two systems
packet filtering
a process in which firewalls are configured so that they filter out packets sent to specific logical ports
Operations Security
A process that we use to protect our information (encryption) OPSEC
Performance
A set of metrics that judge how well a given system functions
IPSEC
Internet Protocol security
A set of protocols developed to support the secure exchange of packets between hosts or networks.
sandbox
A set of resources devoted to a program, process, or similar entity, outside of which the entity cannot operate