Implementing Security Flashcards

(39 cards)

1
Q

HIDS/HIPS

A

Host Based Intrusion Detection/Protection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MDM

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EMM

A

Enterprise Mobility Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAM

A

Mobile Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UEM

A

Unified Endpoint Management
Of MDM, EMM, MAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MicroSD HSM

A

Micro SD card form Hardware Security Module
secures mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MSSP

A

Managed Security Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST

A

National Institute for Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSA

A

Cloud Security Alliance
Prompting best practices in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CCM

A

Cloud Controls Matrix

Developed by the CSA to help organisations understand appropriate use of cloud security controls and map then to regularity stds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CASB

A

Cloud Access Security Broker

Software tools serving as intermediaries between service providers and users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EDR

A

Endpoint Detection and Response

Tools combining network response and log analysis.
Look for anomalies and IoC (indicator of compromise) using automated rules and detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPFIX

A

IP Flow Information Exchange
Serves as a means for transmitting traffic flow over the network (open net flow standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SIPS

A

Session Initiation Protocol Secure

For communications traffic like voice and video over HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SRTP

A

Real-Time Transport Protocol Secure

For voice and video communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TLS

A

Transport Layer Security

Protocol used in HTTPS, VoIP, email and instant messaging

17
Q

DMARC

A

Domain-based Message Authentication, Reporting & Conformance

For email and web traffic

18
Q

DKIM

A

Domain Keys Identified Mail

19
Q

DNSSEC

A

DNS Secure Protocol

UDP/TCP 53

Ensuring DNS is not modified or malicious using digital signatures

20
Q

FTPS

A

FTP Secure using TLS

TCP 21 in explicit mode
TCP 990 in Implicit mode

21
Q

SFTP

A

Secure FTP using SSH
TCP port 22

22
Q

HTTPS

A

TCP using TLS port 443

23
Q

IMAPS

A

Internet Mail Access Protocol Secure
Using TCP TLS port 993

24
Q

LDAPS

A

Lightweight Directory Access Protocol Secure
Using TLS on TCP port 636

25
Secure POP3
TCP 995 using TLS
26
SRTP
Secure Real time Transport Protocol UDP port 5004 Designed to provide audio and video streams via networks. Uses encryption and authentication
27
SNMPv3
UDP ports 161,162 Authentication of message sources, integrity, validation and confidentiality via encryption. Only authPriv level is encrypted
28
IPSec
Suite of security protocols AH (Authentication Header) uses hashing and shared secret key to ensure IP payload and headers are secure ESP (Encapsulated Security Payload) in transport or tunnel mode providing integrity and authentication for the packet
29
CASB
Cloud Access Security Broker Enforce created policies: Visibility, Cimpliance, Threat prevention Data Security
30
SWG
Secure Web Gateway Examine API, JSON, storage usage, activities; instance aware
31
OWASP
Open Web App Security Project Provides up to date list of most recent web app concerns
32
TOCTOU
Time of Check to Time if Use = race condition
33
Static Code Analysis (SAST)
Automated pre compilation of source code to identify potential vulnerabilities
34
Dynamic Code Analysis (DAST)
Testing of apps during run time for checking decide of running state
35
Software Composition Analysis (SCA)
Identifying open source and third party code to manage licenses and vulnerabilities
36
Fuzz Testing
Sending random malformed Data to check error handling/memory leaks
37
Continuous Integration (CI)
Frequently merging Code changes into a repository after which automated builds and tests are run
38
Continuous Deployment (CD)
Automatically deploying Tested and validated code to a production environment
39
Continuous delivery
Code changes are prepared ready to release in an automated way. A step before CD