Exam 2 Flashcards

(48 cards)

1
Q

Access Control Approaches Rely on The Following Four Mechanisms

A
  1. Identification- I am a user of the system
  2. Authentication- I can prove I’m a user of the system
  3. Authorization- Here’s what I can do with the system
  4. Accountability- You can track and monitor my use on the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Roles of the Communities of Interest

A

Evaluation of current and proposed risk controls
Determining which options are cost effective
Installing the needed controls
Ensuring that the controls stay effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three commonly used authentication factors

A
  1. Something you know
    Relies on what the unverified user knows. Like password.
  2. Something You Have
    Relies on that an unverified user has and can produce when necessary. Like ID cards
  3. Something That You Are or Can Produce
    Relies on individual characteristics. Like fingerprints
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC layer firewall

A

Designed to operate at the media access control sublayer at layer 2 of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application layer proxy firewall

A

capable of functioning as both a firewall and an application layer proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet-filtering firewall

A

Examines header information of data packets that enter a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

Combination of hardware/software that filters information moving between the inside/outside of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encapsulation

A

The native protocol of the client is embedded within the frames of a protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

Keeps data private as it travels over the public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

Ensures the identification of the remote user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transport Mode

A

Data within an IP packet is encrypted, but the header information is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tunnel Mode

A

Establishes two perimeter tunnel servers to encrypt all traffic that will traverse an unsecured network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy server

A

server that exists to intercept requests for information from external users to minimizing demand on internal servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reverse proxy

A

retrieves internal information to provide to requesting outside users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Clark-Wilson Integrity Model change control principles

A
  • No changes by unauthorized users
  • No unauthorized changes by authorized users
  • Maintain internal and external consistency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDPS Response Techniques

A

Terminating the user session or network connection
Blocking access to the target system or systems
Blocking all access to the targeted information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reasons for an IDPS

A

Intrusion detection
Documentation- Logs data
Attack deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Host based IDPS

A

Resides on a particular device and only monitors that system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network based IDPS

A

Resides on a device connected to a segment of an organizations network and only monitors that segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attack protocol

A

Series of steps used by an attacker to launch an attack

21
Q

Footprinting

A

Research of internet addresses owned by a target organization

22
Q

Fingerprinting

A

Survey of all the target addresses collected during footprinting

23
Q

Attack surface

A

Functions and features a system exposes to unauthenticated users

24
Q

Port scanners

A

Tools used by both attacker and defenders to identify or fingerprint active computers on a network

25
Seven Major Sources of Physical Loss
1. Extreme temperature: heat, cold 2. Gases: humid or dry air 3. Liquids: water, chemicals 4. Living organisms: virus, people, animals 5. Projectiles: Tangible objects in motion 6. Movement: Collapse, vibration, slide 7. Energy anomalies: electrical surge
26
Uninterruptible power supply
Ensures delivery of electrical power without interruption
27
Standby/Offline UPS
Backup battery that detects interruption in power and activates a transfer switch to provide power through batteries
28
TEMPEST
Government program to protect computers from electrical remote eavesdropping by reducing EMR emissions
29
Packet sniffer
Software or hardware that can intercept, copy, and interpret network traffic
30
Active vulnerability scanner
Application that scans networks for exposed usernames/groups
31
Passive vulnerability scanner
Scanner that listens in on a network and identifies vulnerable versions of both server and client software
32
Best Practices for Firewalls
All traffic from trusted networks is allowed out Firewall devices are never to be directly accessible from the public network SMTP data is allowed but is directed to a well configured gateway All ICMP data should be denied
33
Static packet filtering
Filtering rules need to be developed with the firewall
34
Dynamic packet filtering
Can react to events and update or create rules to deal with an event
35
Stateful packet inspection (SPI)
Keep track of each network connection between internal and external systems
36
Kerberos
Uses symmetric key encryption to validate a user to network resources
37
Kerberos three interactive services
Authentication server- Kerberos server that authenticates clients and servers Key Distribution Center- generates and issues session keys Kerberos ticket granting service- provides tickets to valid clients who request services
38
VPN
A private secure network operated over a public network
39
Hybrid VPN
combination of trusted and secure VPN implementations
40
Secure VPN
uses security protocols to encrypt traffic transmitted across unsecure networks
41
Trusted VPN
VPN that uses leased circuits
42
Know yourself
Understand the current information in your organization
43
Know the enemy
Identify threats facing the organization
44
Risk appetite| tolerance
The quantity of risk that organizations are willing to accept
45
Residual risk
Risk to information that remains after current controls are applied
46
Attack success probability
number of successful attacks that are expected to occur within a specified time period
47
Likelihood
The probability that a vulnerability within an organization will be attacked
48
Risk control
Application of controls that reduce risk to an organizations assets