Objective 1.2 Flashcards

Summarize fundamentals security concepts

1
Q

CIA Triad

A

C - Confidentiality
I - Integrity
A - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ensures that information is only accessible to those with the appropriate authorization. (Ex: encryption)

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

\\\\\\\\\\\\\\\\\\

Ensures the data remains accurate and unaltered unless modification is required. (Ex: checksums, hashing)

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensures that information resources are accessible and functional when needed by authorized users. (ex: website up and running all the time regardless the traffic it’s receiving.)

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 new elements to CIA triad making it a pentagon

A

N - Non-repudiation
A - Authentication
CIANA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Guaranteeing that specific action or event has taken place and cannot be denied by the parties involved. (Ex: A digitally signed email. That’s going to ensure that I cannot deny sending you that particular message because my digital signature is attached to it)

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Process of verifying the identity of a user or system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of verifying the identity of a user or system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Defines what actions or resources a user can access.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Act of tracking user activities and resources usage, typically for audit or billing purpose.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity, and availability of information systems and data.

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Controls Categories

A

Technical
Managerial
Operational
Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of Security Controls

A

Preventative
Deterrent
Detective
Corrective
Compensating
Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ZeroTrust: ???

Consists of adaptative identity, threat scope reduction, policy-driven access control, and secured zones.

A

.ZeroTrust: Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ZeroTrust: ???

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points.

A

ZeroTrust: Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Confidentiality importance

A
  1. Protect personal privacy
  2. Maintaint a business advantage
  3. Achieve a regulatory compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

5 methods to achieve CONFIDENTIALITY

A
  1. Encryption
  2. Access Control
  3. Data Masking
  4. Physical Secutiry Measures
  5. Training and Awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ensure only authorized personnel can access certain types of data

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Process of converting data into code to prevent unathorized access

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Method that involves obscuring data within a database to make it inacessible for unauthorized users while retaining the real data’s authencity and use for authorized users.

A

Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.

A

Physical Security Measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Conduct regular training on the security awareness best practices that employees can use to protect the organization’s sesitive data.

A

Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
most important thing linked to Confidentiality
**ENCRYPTION**
26
Integrity importance
1. Ensure **DATA ACCURACY** 2. Maintain **TRUST** 3. Maintain **SYSTEM OPERABILITY**
27
5 methods to achieve INTEGRITY
1. Hashing 2. Digital Signatures 3. Checksums 4. Access Controls 5. Regular Audits
28
Process of **converting data into fixed-size value**.
Hashing
29
most important thing linked to Integrity
**HASHING**
30
[Hashing] The result of hashing function is called...
Hash Digest
31
[Hashing] The Hash Digest will almost serve like a...
Digital Fingerprint
32
Use **encryption to ensure integrity and authencity**.
Digital Signatures
33
[Digital Sign.] How is the process of digitally sign a file?
1. Hash the file (**Integrity**) 2. Hash Digest is Encrypted using users private key (**Authencity**) Now this data is digitally signed and any alterations in the file will drastically change the file's hash, wich in turn, would invalidate that digital signature.
34
Method to **verify the integrity of data during transmission**
Checksums
35
**Ensure that only authorized individuals can modify data** and reduce the risk of unintentional or malicious alterations.
Access Controls
36
Involve **reviewing logs and operations to ensure that only authorized changes have been made** and any discrepancies are addressed.
Regular Audits
37
Availability importance
1. Ensure **business continuity**. 2. Maintaining **customer trust**. 3. Upholding an **organization's reputation**.
38
most important thing linked to Availability
**REDUNDANCY**
39
4 methods to achieve AVAILABILITY
1. Server Redundancy 2. Data Redundancy 3. Network Redundancy 4. Power Redundancy
40
Involves using **multiple servers in a load balancer** so that if one is overloaded or fails, the other servers can take over the load to continue supporting end users.
Server Redundancy
41
Involves **storing data in multiple places**.
Data Redundancy
42
Ensures **if one network path fails, the data can travel through another route.**
Network Redundancy
43
Involves using **backup power sources – like generations and uninterrupted powersupplies – to ensure that an organization's systems remain operational** during periods of power disruption or outages within a local service area.
Power Redundancy
44
Non-repudiation importance
1. **Confirming authenticity** of digital transactions. 2. **Ensuring integrity**. 3. **Providing accountability**.
45
most important thing linked to Non-repudiation
**DIGITAL SIGNATURES**
46
Authentication methods
1. smth you know 2. smth you have 3. smth you are 4. smth yo do 5. swh you are
47
Relies on **information that a user can recall**.
Smth you know (Knowledge Factor)
48
Relies on the user presenting a **physical item to autheticate themselves**.
Smth you have (Possession Factor)
49
**Relies on the user providing a unique physical or behaviorial characteristic** of the person to validate that they are who they claim to be.
Smth you are (Inherence Factor)
50
Relies on the user conducting a unique **action to prove who they are**.
Smth you do (Action Factor)
51
Relies on the **user being in the certain geographic location** before access is granted.
Swh you are (Location Factor)
52
2 autentication methods.
**2FA** - Two Factor Authentication
53
2 or more autentication methods.
**MFA** - Multi Factor Authentication
54
Importance of Authentication
1. Prevent **unauthorized access**. 2. Protect user **data privacy**. 3. Ensure **resource validity**.
55
most important thing linked to Authentication
**MFA** - Multi Factor Authentication
56
[Authetication] Knowledge Factor
Smth you know Ex: login and password.
57
[Authetication] Possession Factor
Smth you have Ex: OTP (One Time Password)
58
[Authetication] Inherence Factor
Smth you are Ex: Iris or fingerprint.
59
[Authetication] Action Factor
Smth you do Ex: handwriten samples.
60
[Authetication] Location Factor
Swh you are Ex: Just open the door if you are within 20meters.
61
Which are the types of Authorization mechanisms controls?
* role-based * rule-based * attribute-based
62
Importance of Authorization
1. **Protect sesitive data** 2. **Maintain system integrity** in organizations 3. Create more **streamlined user experiences**
63
Importance of ACCOUNTING
1. Logging into the system 2. Accessing files 3. Modifying configuration settings 4. Downloading or installing software 5. Attempting unauthorized actions on systems and networks
64
5 things to a robust audit system
1. Audit Trail 2. Regulatory Compliance 3. Forensic Analysis 4. Resource Optimization 5. User Accountability
65
[Accounting] Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a specific user or point in time.
Audit Trail
66
[Accounting] Maintains a comprehensive record of all the users' activities.
Regulatory Compliance
67
[Accounting] Uses detailed accounting and event logs that can help cybersecurity experts understand what happened , how it happened, and how to prevent similar incidents from ocurring again in the future.
Forensic Analysis
68
[Accounting] Organization can ........... system performance and minimize costs by tracking ........... utilization and allocation decisions.
Resource Optimization
69
[Accounting] Thorough accounting system ensures users' actions are monitored and logged, deterring potential misuse and promoting adherence to the organization's policies.
User Accountability
70
Tools related to Accountability
* Syslog servers * Network analysis tools * SIEMs (Security Information and Event Management systems)
71
CIA Triad
C - Confidentiality I - Integrity A - Availability
72
2 new elements to CIA triad making it a pentagon
N - Non-repudiation A - Authentication CIA**NA**
73
most important thing linked to Confidentiality
**ENCRYPTION**
74
most important thing linked to Integrity
**HASHING**
75
most important thing linked to Availability
**REDUNDANCY**
76
most important thing linked to Non-repudiation
**DIGITAL SIGNATURES**
77
most important thing linked to Authentication
**MFA** - Multi Factor Authentication
78
Deception and Disruption Technologies
* Honeypots * Honeynets * Honeyfiles * Honeytoken
79
Decoy systems or servers designed to attract and deceive potential attackers, simulating real-world IT assets to study their techniques.
Honeypots
80
Creates an entires network of decoy systems to observe complex, multi-stage attacks.
Honeynets
81
Decoy files placed within systems to detect unauthoried access or data breaches.
Honeyfiles
82
Fake pieces of data, like a fabricated user credential, inserted into databases or systems to alert administrators when they are accessed or used.
Honeytoken
83
How could I learn from the different threat actors that are your network is to set up an utilized DECEPTION and DISRUPTION technologies, like?
- Honeypots - Honeynets - Honeyfiles - Honeytokens
84
The DECEPTION and DISRUPTION technologies will log, monitor and track threat actors so that we can learn about their...... ?
Tactics, techniques and procedures. (TTPs)
85
Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.
Deceptive and Disruption Technologies
86
Decoy system or network set up to attract potential hackers. Can also be used against insider threats to detect internal fraud, snooping, and malpractice.
Honeypot
87
Must be placed within a screened subnet or isolated segment that is easily accessed by potential attackers.
Honeypot
88
Network of honeypots to create a more complex system that is designed to mimic an entire network of systems, including servers, routers, and switches. Also logs all activities to provide a wealth of data about successful and unsuccessful atacks.
Honeynets
89
Have risks that the attacker could use to learn how production systems are configured
Honeypots and honeynets
90
Decoy file placed within a system to lure potential attackers. Are typically embedded with unique identifiers or watermarks to help track if it is stolen or copied, and it is usually placed under loose or less strict defenses that files that contain sensitive data might have.
Honeyfiles
91
Kind of files that can be used as a honeyfiles:
- Word-processing documents - Spreadsheets - Presentation files - Images - Database files - Executables
92
Piece of data or a resource that has no legitimate value or use but is monitored for access or use. Useful for detecting insider threats.
Honeytokens
93
An windows systems account deployed as 'admin' or 'root' just to monitor if a user would log into that account. Considering no legitimate user would ever log into that account, what kind of deception and disruptive technology we are talking about?
Honeytoken
94
Other Deceptive and Disrution Technologies:
- Using bogus DNS entries - Creating decoy directories - Generating dynamic page - Using port triggering - Spoofing fake telemetry data
95
Fake DNS entries introduced into a system's DNS server
Bogus DNS
96
Fake folders and files placed within a system's storage
Decoy Directories
97
Used in websites to present ever-changing content to web crawlers to confuse and slow down the threat actor.
Dynamic Page Generation
98
Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected
Port Triggering
99
System can respond to an attacker's network scan attempt by sending out fake data.
Fake Telemetry Data
100
Prevent people from accessing your facilities
Fences
101
Prevent vehicles from getting too close to your facilities
Bollards