Dion Test 1 Flashcards
3DES
Symmetric
DLP
Data Loss Protection - Prevents data loss. Software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks
Aircrack-ng
Suite of wireless security assessment and exploitation tools that includes monitoring, attacking, testing, and cracking of wireless networks. Includes packet capture and export of the data collected as a text file or pcap file
Collects wireless packet data
Autopsy
Cross-platform, open-source forensic tool suite
Digital forensics platform
BeEF
Browser Exploitation Framework - Penetration testing tool that focuses on the web browser
Brute Force Attack
Focuses on trying multiple passwords for a single user
Chain of custody forms list…
Everybody who has worked with or who has touched the evidence that’s part of the investigation. These forms record every action taken by each individual in possession of the evidence
tracert (trace route)
Networking diagnostic command for displaying possible routes and measuring transit delays of packets across an IP network
Used to determine the path traffic takes from one device to another
Shows how many hops, Uses ICMP
Displays the route of packets and timing between point A and point B. It’s very useful to help an administrator understand where along a route potential delays are arising
SQL Injection
Code injection technique used to attack data-driven applications.
Takes advantage of code vulnerabilities on website
Technique that exploits vulnerabilities in a target website’s SQL-based application software by injecting malicious SQL statements or by exploiting incorrect input
If you see “1=1 or 9=9, !=0”…its SQL Injection
Command injection
An attack where the goal is to execute arbitrary (random) commands on the host operating system via a vulnerable application
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Guides governance-related topics, including fraud, controls, finance, and ethics
Cryptographic Erase (CE)
Sanitizes a self-encrypting drive by erasing the media encryption key and then reimaging the drive.
CYOD
Choose Your Own Device
Data Custodian
Responsible for the safe custody, transport, storage of the data and implementation of business rules. Determines who has access to data
Data Owner
A senior executive role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of the information asset…Should not be an IT person
Covers activities such as making sure there are definitions in place, action is taken on data quality issues and Data Quality Reporting
Person accountable for the classification, protection, use, and quality of one or more data sets within an organization
DPO (Data Protection Officer)
Ensures that the organization processes the personal data of its staff, customers, providers, or any other individuals in compliance with the applicable data protection rules
Ensure that a company is complying with laws
Organization’s GDPR focal point and possesses
expert knowledge of data protection law and practices
Data Steward
Works for data owner and makes sure the data is appropriately labeled and classified…focused on the quality of the data
Data Wiping/Clearing
Data wiping/clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Keeps hard drive reusable
Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse
FACT: The database server is part of a critical production network
dd tool
Linux command Line tool
Can create forensic images (not a proprietary tool because it’s open-source).
Primary purpose is to convert and copy files
Degaussing
Involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed. Magnets
Degaussing is Purging
Dereferencing
Software vulnerability that occurs when the code attempts to remove the relationship between a pointer and the thing it points to
DES
Data Encryption Standard - Symmtreic key algorithm for the encryption of digital data. Short key length of 56 bits
Diffie–Hellman
Key exchange. Method of securely exchanging cryptographic keys over a public channel