prep Flashcards
(144 cards)
Decentralized Governance
Decision-making authority distributed throughout the
organization
○ Enables quicker decisions and local responsiveness
Risk Tolerance
The level of risk an organization is willing to accept without countermeasure
■ Determines the urgency of vulnerability remediation
Risk Appetite
Willingness to pursue or retain risk
RTO
Real Time Objective:
○ Maximum acceptable time before severe impact
○ Target time for restoring a business process
Designed for real-time applications that process data without significant delays
Critical for time-sensitive applications like flight navigation and medical equipment
BAD: at buffer overflow protection
ECC
Elliptic Curve Cryptography
● Efficient and secure, uses algebraic structure of elliptical curves
● Commonly used in mobile devices and low-power computing
● Six times more efficient than RSA for equivalent security
uses Shorter Keys
Symmetric
Uses the same key for encryption and decryption
private key encryption
Asymmetric
Uses a pair of keys for encryption and decryption
often called “Public Key Cryptography”
● Public key for encryption
● Private key for decryption
No need for shared keys
802.1x Authentication
■ Provides port-based authentication for wired and wireless networks
Fail-Open
Allow traffic to pass during a failure, maintaining connectivity but reducing security
Ex: tunnel traffic
Fail-closed
Blocks all traffic during a failure, prioritizing security over connectivity
Zero-Day Exploits
■ Attacks that target previously unknown vulnerabilities
WPA
Wi-Fi Protected Access
Risk Assessments
Managerial control
Regularly assess threats and vulnerabilities specific to your organization, and update it with significant changes
SASE
Secure Access Service Edge
-Cloud-based service integrating security and wide area networking
- Addresses challenges of securing and connecting users and data across distributed locations
Port 22
SSH
Secure Shell Protocol
Layer 4 Firewall
Transport Layer
- Provides less granularity for blocking or allowing traffic based on application payload
Concerned with destination IP addresses and port numbers
Layer 5 Firewall
Session Layer
Side Loading
Installing apps from unofficial sources bypassing the device’s default app
store
● Can introduce malware; download apps from official sources with strict
review processes
Like a rootkit
Layer 7 Firewall
Application layer
Make granular decisions about traffic based on application payload
Deals with URLS, HTTP, and specific app functions
Logic Bomb
Malicious code that’s inserted into a program, and the malicious code will only
execute when certain conditions have been met
Code Signing is widely used in which hashing algorithm?
RSA
● Supports digital signatures, encryption, and key distribution
TOC
Time-of-Check
a type of race condition
● Attackers manipulate a resource’s state after it is checked but before it is
used
● For example, overdrawing a bank account due to a time delay between
checking and transferring funds
race condition
Multiple processes or threads accessing shared resources simultaneously
Sanitization
Thorough process to make data inaccessible and irretrievable from storage medium using traditional forensic methods
■ Applies to various storage media
Can be Reused