Lessons 15-19 Flashcards
(117 cards)
Asset
An asset is any device, data or other components of value to an organization
Owners-
are responsible for decisions related to classification, and access control, as well as oversight of protection mechanisms.
Custodians
are responsible for implementing, managing, and monitoring controls
Network mapping
used to create physical and logical diagrams. Popular network mapping tools include Solarwinds, Spiceworks, ManageEngine, and Nmap.
Network Enumeration
discover and document devices and characteristics. DumpSec and Nessus.
End-of-sale
when the product, service, or subscription, is no longer for sale.
End-of-life & End-of-support
- when the product, service, or subscription is deemed obsolete. Once obsolete the product is not sold, improved, or maintained.
- the last date to receive service and support. After this date, updates are no longer available.
Fixed lifecycle-
products with defined dates at the time of release.
Continuous (modern) lifecycle-
products with continuous support and servicing. Generally, customers must take the latest update to remain supported.
ARCHIVING
The process of securely storing original, unmodified files for later potential retrieval
LEGAL HOLD
Is the requirement of an organization to preserve all forms of relevant information when litigation, audit, or government investigation is anticipated.
DATA REMANENCE
Refers to the residual traces of data that remain on a storage medium even after attempts have been made to erase or delete the information.
TRIM
is a command used by OS to inform solid state drives which blocks of data are no longer in use. When TRIM is executed, the SSD may immediately erase the associated data, reducing the likelihood of remanence
DATA SANITIZATION
Aka disk wiping- is a clearing technique that overwrites all addressable storage and indexing locations multiple times.
Shredding (shearing), Pulverizing, Pulping, Burning
- physically breaking media into pieces
- reducing media to dust
- chemically altering media
- incinerating media
CERTIFICATE OF DESTRUCTION
Is issued by the commercial services upon the destruction of media
Certificates should include at minimum: date of destruction, description of media(including serial number), method of destruction, witnesses, company name and address with contact information.
Exposure-
a system of software configuration issue, or lack of control that could contribute to a successful exploit or compromise.
BUG BOUNTY PROGRAM
Aka A vulnerability rewards program (VRP) is an incentive program that compensates individuals for identifying and reporting vulnerabilities or bugs
Open bug bounty program- offered by hundreds of companies like Google, Microsoft, and Facebook
Closed bug program- invitation only.
CVE PROGRAM
Is an international, community-driven effort to catalog hardware and software vulnerabilities for public access.
A CVE is a standardized identifier for a given vulnerability or exposure.
COMMON VULNERABILITY SCORING SYSTEM
CVSS
CVSS is an open frame for communicating the characteristics and severity of hardware and software vulnerabilities.
There 5 ratings: none, low, medium, high, and critical
VULNERABILITY SCANNING
The automated activity that relies on a database of known vulnerabilities such as CVE/NVD, designed to identify vulnerabilities in the target environment
Vulnerability assessment-
identify host attributes and known common vulnerabilities and exposures CVE. find the report.
Penetration testing
evaluate the security of a target by identifying and providing proof of concept of flaws and vulnerabilities or by performing compromise exploitation. Find then exploit then report.
PATCH MANAGEMENT
The process of identifying, acquiring, installing, and verifying patches (updates)