Notes Flashcards
(33 cards)
5 Generations of Firewall
- Static/Stateless Packet Filtering
- Proxy/Application Layer Gateway
- Stateful Inspection
- Dynamic Packet Filtering
- Kernel Proxy
Wireless Networking Speeds and Frequency
- 802.11 - 2 Mbps - 2.4 Ghz
- 802.11a - 54 Mbps - 5 Ghz
- 802.11b - 11 Mbps - 2.4 Ghz
- 802.11g - 54 Mbps - 2.4 Ghz
- 802.11n - 200+ Mbps - 2.4 Ghz/ 5 Ghz
- 802.11 ac - 1 Gbps - 5 Ghz
ISC2 Canon
- Protect society, the commonwealth and the infrastructure
- Act honorably, honestly, justly, responsibly and legally
- Provide diligent and competent services to principals
- Advance and protect the profession
OSI Layer
- Physical
- Data Link Layer
- Network
- Transport
- Session
- Presentation
- Application
TCP/IP Layer
- Network (1,2)
- Internet (3)
- Transport (4)
- Application (5,6,7)
Biometric Enrollment Time and Throughput Rate
Throughput Rate is 6 seconds or faster
Enrollment Time is less than 2 minutes
Government Classification Scheme
- Top Secret
- Secret
- Confidential
- Sensitive
- Unclassified
Private Classification Scheme
- Confidential
- Private
- Sensitive
- Public
How to calculate loss
ALE = SLE * ARO SLE = AV * EF
ALE or annualized loss expectancy SLE or single loss expectancy ARO or annualized rate of occurence AV or asset value EF or exposure factor
Formula for Risk and Total Risk
Risk = Threat * Vulnerability
Total Risk = Threat * Vulnerability * Asset
Software Capability Maturity Model Stages
The stages of the SW-CMM are as follows:
Level 1: Initial
In this phase, you’ll often find hardworking people charging ahead in a disorganized fashion. There is usually little or no defined software development process.
Level 2: Repeatable
In this phase, basic life cycle management processes are introduced. Reuse of code in an organized fashion begins to enter the picture, and repeatable results are expected from similar projects. SEI defines the key process areas for this level as Requirements Management, Software Project Planning, Software Project Tracking and Oversight, Software Subcontract Management, Software Quality Assurance, and Software Configuration Management.
Level 3: Defined
In this phase, software developers operate according to a set of formal, documented software development processes. All development projects take place within the constraints of the new standardized management
model. SEI defines the key process areas for this level as Organization Process Focus, Organization Process Definition, Training Program, Integrated Software Management, Software Product Engineering, Intergroup Coordination, and Peer Reviews.
Level 4: Managed
In this phase, management of the software process proceeds to the next level. Quantitative measures are utilized to gain a detailed understanding of the development process. SEI defines the key process areas for this level as Quantitative Process Management and Software Quality Management.
Level 5: Optimizing
In the optimized organization, a process of continuous improvement occurs. Sophisticated software development processes are in place that ensure that feedback from one phase reaches to the previous phase to improve future results. SEI defines the key process areas for this level as Defect Prevention, Technology Change Management, and Process Change Management.
Components of IPSec
- AH - Authentication Header
- ESP - Encapsulating Security Payload
- IPComp - IP Payload Compression Protocol
- IKE - Internet Key Exchange
RAID level
RAID 0 - striping
RAID 1 - mirroring
RAID 2 - bit-level striping with dedicated Hamming-code parity
RAID 3 - byte-level striping with dedicated parity
RAID 4 - block-level striping with dedicated parity
RAID 5 - block-level striping with distributed parity
RAID 6 - lock-level striping with double distributed parity
RAID 10 - creates a striped set from a series of mirrored drives
Requirements for Patent
- New
- Useful
- NonObvious
Steps of Business Impact Analysis Process
- Identification of Priorities
- Risk Identification
- Likelihood Assessment
- Impact Assessment
- Resource Prioritization
HVAC computer requirements
- Temperature 60 to 75 F (15 to 23 C)
2. Humidity 40 to 60%
TCSEC Categories
- D minimal protection, any systems that fails higher levels
- C1 DAC; (identification, authentication, resource protection).
- C2 DAC; Controlled access protection (object reuse, protect audit trail).
- B1 MAC; (security labels) based on Bell LaPadula security model. Labeled security (process isolation, devices
- B2 MAC; Structured protection (trusted path, covert channel analysis). Separate operator/admin roles. Configuration management
- B3 MAC; security domain (trusted recovery, Monitor event and notification).
- A MAC; Formal, verified protection
VPN Protocols
- PPTP
- L2F
- L2TP
- IPSec
- SSL and TLS
Cipher Modes
- CBC - Cipher Block Cipher
- ECB - Electronic Code Book
- CFB - Cipher Feedback
- OFB - Output Feedback
- CTR - Counter
Wireless Frequency Access Technologies
- FHSS – Frequency Hopping Spread Spectrum, The entire range of available frequencies is employed, but only one frequency at a time is used.
- DSSS - Direct Sequence Spread Spectrum, employs all the available frequencies simultaneously in parallel. This provides a higher rate of data throughput than FHSS. DSSS also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.
- OFDM – Orthogonal Frequency-Division Multiplexing, employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular and thus do not cause interference with each other.
IEEE standard for Bluetooth
802.15
Incidence Response Steps
- Detection
- Response
- Reporting
- Recovery
- Remediation
- Review
STRIDE
- Spoofing
- Tampering
- Repudiation
- Information Disclosure
- Denial of Service
- Elevation of Privilege
POODLE
Padding Oracle On Downgraded Legacy Encryption