Lesson 13: Explaining Common Security Concepts Flashcards

1
Q

What are the 3 concepts of the CIA triad?

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define confidentiality in the CIA triad

A

Confidentiality means that certain information should only be known to certain people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define integrity in the CIA triad

A

Integrity means that the data is stored and transferred as intended and that any modification is authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define availability in the CIA triad

A

Availability means that information is accessible to those authorized to view or modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a vulnerability

A

A weakness that could be accidentally triggered or intentionally exploited to cause a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a threat

A

The potential for someone or something to exploit a vulnerability and breach security. A threat may be intentional or unintentional. The person or thing that poses the threat is called a threat actor or threat agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define an attack vector

A

The path or tool used by a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define risk

A

The likelihood and impact (or consequence) of a threat actor exercising a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define risk management

A

A process for identifying, assessing, and mitigating vulnerabilities and threats to the essential functions that a business must perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define risk assessment

A

A subset of risk management where a company’s systems and procedures are evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a mission essential function (MEF)

A

Business or organizational activity/process that is too critical to be deferred for anything more than a few hours, if at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Business impact analysis (BIA)

A

Activity that identifies organizational risks and asses their effect on ongoing, mission critical operations as well as what losses might occur for a range of threat scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define business continuity planning (BCP)

A

Identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define an exploit

A

Specific code or method of using a vulnerability to gain control of a system or to cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a zero-day vulnerability/exploit

A

A vulnerability that is exploited before the developer knows about it or can release a patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define a legacy system

A

A legacy system is one where the software vendor no longer provides support or fixes for problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define a vulnerability assesment

A

An evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system; determines if the current configuration matches the ideal configuration (the baseline)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does CVE stand for?

A

Common Vulnerabilities and Exposers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of a CVE?

A

A scheme for identifying vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the construction of a CVE identifier?

A

CVE-YEAR-ORDER DISCOVERED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define an external threat

A

A threat actor that has no account or authorized access to the targeted system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define an internal threat

A

A threat actor that has been granted permissions/access on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define Security Information and Event Management (SIEM)

A

Solution that provides real-time or near-real-time analysis of security alerts/logs generated by network hardware and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the primary function of SIEM?

A

To aggregate logs from multiple sources, and to correlate individual events into indicators of compromise (IOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a pen test?
Active test that uses tools and security utilities to evaluate security by simulating a live attack on a system
26
Define Privileged Account Management (PAM)
Policies, procedures, and technical controls to prevent the malicious abuse of privileged accounts and to mitigate risks from weak configuration control over privileges
27
What are the 3 principals of Priviledged Account Management (PAM)
1. Least privilege 2. Role-based access 3. Zero trust
28
Define least privilege
Principle of security stating that a user should be allocated the minimum necessary rights, privileges, or information to perform its role
29
What is the purpose of least privilege?
Mitigates the risk if the account becomes compromised
30
Define authorization creep
Refers to when a user requires more rights over time
31
Define role-based access
Access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions (read, write, modify, etc) based on job functions
32
Define zero trust
Security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed
33
What are the ways to implement zero trust?
1. Uses systems such as continuous authentication and conditional access to mitigate privilege escalation and account compromise 2. Micro segmentation - is a security process that is capable of applying policies to a single node, as though it was in a zone of its own
34
What is the purpose of an access control system?
Set of technical security controls that govern how subjects are permitted to interact with objects
35
Define a subject
A user, device, or software process; anything that can request and be granted access to a resource
36
Define an object
networks, servers, databases, files, etc
37
Define an Access Control List (ACL)
Collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given
38
Define Identity and Access Management (IAM)
Security system that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets
39
What processes does an Identity and Access Management (IAM) system perfrom?
1. Identification 2. Authentication 3. Authorization 4. Accounting
40
Define the Identification process
Creating an account or ID that identifies the user, device, or process on the network
41
Define the authentication process
Proving that a subject is who or what it claims to be when it attempts to access the resource when the account holder submits credentials to the system to request access and the system compares the submitted credentials to credentials stored in the system
42
Define the authorization process
Determining what rights subjects should have on each resource and enforcing those rights
43
Define the accounting process
Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
44
Name the different authentication factors
1. Knowledge factor 2. Ownership factor 3. Biometric factor 4. Behavioral factor 5. location factor
45
Define a knowledge authentication factor
Something you know (password/passphrase)
46
Define a ownership authentication factor
Something you have (smartcard)
47
Define a human/biometric authentication factor
something you are (fingerprint)
48
Define a behavioral authentication factor
Something you do (making a signature)
49
Define a location authentication factor
Somewhere you are (a mobile device with location services)
50
Define multifactor authentication
Authentication scheme that requires the user to present at least two or more different factors as credentials
51
What is the default authentication factor for local authenticaiton?
Knowledge factor - A password or PIN
52
How is knowledge factor authentication secured in a credential database?
By cryptographic hashes
53
What is a cryptographic hash?
A function that converts any string to a unique, fixed-length code
54
How does an authenticator verify a password?
By converting the user submitted password into a hash, and and comparing it against the one in the database
55
Define windows local sign-in
The Local Security Authority (LSA) compares the submitted credential to a hash stored in the Security Accounts Manager (SAM) database, which is part of the registry
56
Define windows network sign-in
The local security authority (LSA) can pass the credentials for authentication to Kerberos
57
Where are user account names stored in linux?
in /etc/passwd
58
Where does the linux system store password hashes?
in /etc/shadow
59
Define a pluggable authentication module (PAM)
A PAM is a package for enabling smart cards
60
Define Single Sign-On (SSO)
Authentication technology that enables a user to authenticate once and receive authorizations for multiple services
61
Define Kerberos
Provides SSO authentication in a windows domain.
62
What is the purpose of a Key Distribution Center (KDC)
A technology that verifies the identity of a client and the server its requesting resources from such as a domain controller
63
What are the two functions that make up a Key Distribution Center (KDC)?
1. The authentication service 2. Ticket granting service
64
What is the purpose of the authentication service of a Key Distribution Center (KDC)
Responsible for authenticating user logon requests and services
65
What does a Key Distribution Center (KDC) do after authenticating a service/user?
Once the client/service has authenticated, the KDC presents the user with a ticket granting ticket
66
What is a ticket granting ticket?
Allows user to request service ticket that grant access to a target resource
67
How does a client/service gain access to a resource?
By requesting a service ticket by supplying the Ticket Granting Ticket to the Ticket Granting Service
68
What is the purpose of a digital certificate?
Identification and authentication information presented in the X.509 format and issued by a Certificate Authority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host)
69
Define asymmetric encryption
Public key cryptography; allows users to encrypt information using key pairs
70
List one way cryptographic key pairs are used
When receiving data, the public key pair is given to encrypt the data before transmission, and the message can only be decrypted by the private key pair that only the recipient has
71
List another way cryptographic key pairs are used
When authenticating to a remote system, create a signature and sign it by encrypting it with the private key, and when its received by the recipient they will decrypt it with the public key
72
What is the biggest problem with public key cryptography?
Proving the identity of the owner of a public key
73
What is the purpose of Public Key Infrastructure (PKI)?
Aims to prove the identity of the owners of a public key
74
What purpose does a digital certificate serve?
A wrapper/placeholder for a pubic key as well as information about the subject (entity)
75
Define the Extensible Authentication Protocol (EAP)
Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication
76
How is 802.1X Port-based Network Access Control (NAC) implemented?
Encapsulating EAP communications over a LAN (EAPoL) to implement port-based authentication
77
What authentication protocol does 802.1X port-based Network Access Control (NAC)
AAA
78
Define AAA architecture
Authentication, authorization, accounting
79
What is RADIUS (remote authentication dial-in user service)?
AAA protocol used to manage remote and wireless authentication infrastructures over UDP ports 1812 and 1813
80
What is TACACS+ (Terminal Access Controller Access Control System)?
AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management over TCP port 49
81
Define LDAP (Lightweight directory access protocol)
Network protocol used to access network directory databases, which store information about authorized users and their privileges over TCP/UDP port 389
82
Define simple bind authentication
The client must supply its distinguished name (DN)/identity and password, but these are passed as plaintext
83
Define Simple Authentication and Security Layer (SASL)
The client and server negotiate the use of a supported authentication mechanism, such as Kerberos
84
What is LDAP Secure (LDAPS)
The LDAP server is installed with a digital certificate, which it uses to set up a secure tunnel for the user credential exchange over TCP port 636
85
Which kind of bandwidth management technology uses a header field to indicate a priority value for a layer 3 (IP) packet?
DiffServ