Memorization Flashcards

(93 cards)

1
Q

4th Amendment

A

Basis for privacy rights in the US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALE

A

Annualized Loss Expectancy
(Cost of losses per year)

SLE x ARO
(Single Loss Expectancy X Annual Rate of Occurrence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARO

A

Annual Rate of Occurence

Number of Losses per Year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EF

A

Exposure Factor

Percentage of Asset Value Lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SLE

A

Single Loss Expectancy
(Cost of One Loss)

AV x EF
(Asset Value X Exposure Factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AV

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Formula

A

Threat X Vulnerability

multiplied by Impact sometimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECPA

A

Electronic Communications Privacy Act

Prohibits eavesdropping or interception without distinguishing private/public.

Protects from warrant-less wiretapping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OECD

A

Organization for Economic Cooperation and Development

Provides for data collection, specifications, and safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1974 US Data Privacy Act

A

Protection of PII on Federal databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GLBA

A

Gramm-Leach-Bliley Act

Credit related PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISC2 Code of Ethics Canons

A
  1. Protect society, the commonwealth, and the infrastructure.
  2. Act honorably, justly, responsibly, and legally.
  3. Provide diligent and competent service to principals.
  4. Advance and protect the profession.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EU Data Protection Directive

A

Notify individuals how personal data is collected and used.

Allow Individuals to opt out of sharing data with 3rd parties.

Require individuals to opt into sharing most sensitive personal data.

Providing reasonable protections for personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISO 27005

A

Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIA Triangle

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IAAA

A

4 Key Principles of Access Control

Identification
Authentication
Authorization
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Private Sector Classification Labels

A

Public - used by public or employees
Private - EX. SSN, CC# (could cause damage)
Confidential - Cause exceptionally grave damage
Proprietary - trade secrets
Sensitive - internal business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Government Classification Labels

A

Confidential - Some Damage
Secret - Serious Damage
Top Secret - Grave Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NIST 800-14

A

Securing IT Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NIST 800-88

A

Guidelines for sanitization and disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NIST 800-122

A

PII Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NIST 800-145

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

International Safe Harbor Tenets

A
  1. Notice
  2. Choice
  3. Onward Transfer
  4. Security
  5. Data Integrity
  6. Access
  7. Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

International Common Criteria

A

EAL1: Functionally Tested
EAL2: Structurally Tested
EAL3: Methodically tested and checked
EAL4: Methodically designed, tested, and received
EAL5: Semi-formally designed and tested
EAL6: Semi-formally verified, designed, and tested
EAL7: Formally verified, designed, and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
3 Digital Signature Standards
DSA - Digital Signature Algorith RSA - Rivest-Shamir-Adleman cryptosystem ECDSA - Eliptical Curve Digital Signature Algorithm
26
Fire Type Code A
Ash: Wood or Paper Suppression Agent = Water or Soda Acid
27
Fire Type Code B
Boils: Gas or Oils Suppression Agent = Halon, CO2, Soda Acid (NEVER WATER)
28
Fire Type Code C
Current: Electrical Equipment Suppression Agent = Halon, CO2
29
Fire Type Code D
Ding Ding: Metal Suppression Agent = Dry Powder
30
Fire Type Code K
Kitchen: Oil or Fat Suppression Agent = Wet Chemicals
31
Sag
Temporary Low Voltage
32
Spike
Temporary High Voltage
33
Surge
Prolonged High Voltage
34
Fault
Short Loss of Power
35
Brownout
Prolonged Low Voltage
36
Blackout
Prolonged Loss of Power
37
Physical Gate Classes
I : Residential (home use) II : Commercial/General (parking garage) III : Industrial/Limited Access (loading docks) IV : Restricted Access (Airport or Prison)
38
Asymmetric Algorithms
``` RSA DSA ECC El Gamal Diffie-Hellman Knapsack ```
39
Symmetric Algorithms
``` DES 3DES AES IDEA Blowfish Twofish RC4 SAFER ```
40
Biba Model
Information Flow Model Focused on INTEGRITY! Simple Integrity Axiom = No Read Down * Integrity Axiom = No Write Up
41
Bell-Lapadula Model
Information Flow Model Focused on CONFIDENTIALITY! Simple Security Property = No Read Up * Security Property = No Write Down
42
Clark-Wilson Model
INTEGRITY Model Access to objects only through programs Don't touch my shit! Untrusted users aren't allowed to have access to resources without going through a protected application.
43
Graham-Denning Model
Focuses on relationship between subjects and objects.
44
The Ring Model
Ring 0 = Kernel Ring 1 = Other OS components Ring 2 = Device Drivers Ring 3 = User Applications
45
Generic Security Architecture Layers
1. Hardware 2. Kernel and Device Drivers 3. OS 4. Applications
46
EAP
Extensible Authentication Protocol Authentication at Layer 2
47
LEAP
Significant flaws, should not be used
48
EAP-TLS
Very secure but complex and costly Uses PKI Secure Tunnel Server and client certificate
49
EAP-TTLS
Simplified EAP-TLS Drops client side cert Cheaper and less secure
50
PEAP
Protected EAP | Competitor to TTLS
51
TCP 20-21
FTP
52
TCP 22
SSH (SFTP)
53
TCP 23
Telnet
54
TCP 25
SMTP
55
TCP/UDP 53
DNS
56
UDP 67-68
DHCP / BOOTP
57
TCP 80
HTTP
58
TCP 143
IMAP
59
TCP/UDP 389
LDAP
60
TCP 636
LDAP over SSL or TLS
61
UDP 69
TFTP
62
TCP 443
HTTPS
63
TCP 445
AD
64
TCP 1433-1434
Microsoft SQL
65
TCP 3389
RDP (Microsoft Terminal Services)
66
TCP 137 TCP 138 UDP 139
NetBIOS
67
Circuit Level Firewall
Layer 5 (Short Circuit - Johnny 5) Monitor TCP Handshakes
68
Stateful Inspection Firewall
Layer 5 (5tateful) Have access to conversation, state table, context of packets 3rd Generation
69
Static Packet Filtering Firewall
Layer 3 (Static Pack3t) Simple and fast Rules based on packet source, destination, port, etc. 1st Generation
70
Kernel Proxy / Application Firewall
Layer 7 Control AD; Uses dynamic TCP/IP stacks to inspect network packages 5th Generation
71
PAP
Password Authentication Protocol Sends Password unencrypted
72
CHAP
Challenge Handshake Authentication Protocol Used by PPP servers to authenticate remote clients Encrypts username and password and re-authenticates periodically.
73
OSI : Application Layer
Layer 7 Applications: Web Browser, messaging apps, word processing Protocols: FTP, SNMP, Telnet, SMTP, HTTPS, SSL, SCP
74
OS : Presentation Layer
Layer 6 Data Conversion and character sets Translations: ANSI, ASCII Standards: JPEG, TIFF, MID, HTML, GIF
75
OSI : Session Layer
Layer 5 "Connections between applications" Protocols: NFS, SQL, RADIUS, PPTP, RPC
76
OSI : Transport Layer
Layer 4 Packet Sequencing, flow control, error detection Protocols: TCP, UDP, SSL, SSH-2
77
TCP 3 Way Handshake
SYN, SYN/ACK, ACK
78
OSI : Network Layer
Layer 3 Logical/Network Addressing Routing: Moving data from, a system on one LAN to a system on another LAN. IP Addresses and Routers Protocols: IPv4, IPv6, IPsec, ICMP, BOOTP, DHCP
79
OSI : Data Link Layer
Layer 2 Access to physical layer and LAN communication Data frames Ethernet cards, switches, bridges (Hardware addressing) 2 Sub layers (Media Access Control[MAC] and Logical Link Control[LLC]) Protocols: PPTP, L2TP, ARP, CHAP
80
OSI: Physical Layer
Layer 1 Physical Signaling: bits in voltages or light impulses Electrical, hardware, and software drivers Hubs, cables, USB, DSL, ISDN Physical topologies: BUS, MESH, STAR, TREEE
81
OSI Model Layers
All People Seem To Need Data Processing 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
82
TCP/IP Model Layers
AHIN - (3-1-1-2) Application (3) Host to Host (1) Internet (1) Network Access (2)
83
Most Common VPN Protocols
PPTP L2F L2TP IPsec
84
3 Factors of Authentication
1. Something you know 2. Something you have 3. Something you are
85
Disaster Recovery Tape Rotation Strategies
Tower of Hanoi Grandfather, Father, Son First In, First Out Six Cartridge Weekly
86
Incident Response Lifecycle
1. Preparation 2. Detection (aka identification) 3. Response (aka containment) 4. Mitigation (aka eradication) 5. Reporting 6. Recovery 7. Remediation 8. Lessons Learned
87
RAID 6
3 Disk Minimum Block level striping with double distributed parity 2 drive loss acceptable
88
RAID 4
3 Disks Minimum Block Level striping with dedicated parity
89
RAID 5
3 Disks Minimum Block level striping with distributed parity Hot Swappable 1 Drive loss acceptable
90
RAID 3
3 Disks Minimum Byte Level Striping with dedicated parity Parity drive is SPOF
91
RAID 1
2 Disks Minimum Mirrored Set Fault tolerance from single disk failure; expensive Redundancy only, not speed
92
RAID 0
2 Disks Minimum Striped Improved performance but no fault tolerance
93
CMM
Software Capability Maturity Model 1. Initiating 2. Repeatable 3. Defined 4. Managed 5. Optimizing