Quantum Review Flashcards
(60 cards)
What is another term for a hash
One-way cryptograhpy
True or false IVs are commonly used in hashing or one-way cryptography
False, IVs are typically used for standard encryption
Which if the CIA Triad are the most important for ICS and OT Environments
Availability, because of the potential for harm and loss of life. If you cannot access an OT system, tehre could be a catastrophe
How can you mitigate detected XSS vulnerabilities
Output encoding, and escaping special characters - When you add a special character that affects how a string is interprereted, you can essentially mitigate the possiblity of code being executed by client browsers
What would the act of inserting untrusted data into a webpage best describe
Possible XSS. This could be through stored forms like a forum, or though manipulating the code stored in a website itself.
What is a main concern for many companies when deciding whether or not to archive or remove data
Data Retention Policy. When a company is sorting through old data assets, this is likley their top priority
True or False SOC 2 reports validate Security Controls
False, SOC 2 reports on Technical controls
True or False A pentest will test security controls, and a lack thereof, by safeley trying to exploit vulnerabilites
True
What is the purpose of a risk assessment
To determine what risks the organization exist, and then to determine what controls, if any to deploy
What is the first step to developing as SAT?
Understand the security posture. You need to understand the current weaknesses, vulnerabilities, and security issues to tailor the SAT to maximly benefit the org
What is proveneance for evidence
The history of the evidence, including how it was colelcted, handled, and the chain of custory.
Ensuring the COC is properly documented is important.
What is the difference between data didling and a salami attack
Data Diddling is an incremental attack where an attacker makes small random changes to hide their actvitiy
Salam attacks are when small transactions deduct tiny amounts of money from different accounts.
What is a policy
High level document that help guide decisions for senior management to make informaed decisions about the organization
Wat is a mission statement
A formal summary of the goals of an ORG
What layer of the OSI model does Eavesdropping occur?
Data-Link Layer
What layer of the OSI Model Do Trogans occur
Layer 7 - app layer
What layer of the model do Worms Exist
Layer 7
What layer of the OSI model do Fraggle attacks occur
Layer 5 - Transport
True or false, Rainbow tables are .txt files
False, they are databases containing hashes and the value used to generate that hash.
What is the next step following a risk assessment, risk and risk treatment for risk identified in the previous step
Perform risk assessment, the process is never complete, and you need to evaluate what you put in place is treated
Describe the sutherland Model
Focuses on preventing interference in order to ensure the integrity of data. Is used to prevent attacks like covert channels. Biba, Bell Lapadula, and Take-Grant do not prevent covert channels
What are the first 3 steps in E-Discovery
- Information Goverance - Ensure information is well organized
- Identification - Locate information covered by a discovery request
- Preservation - Protect discoverable information against deletion or alteration
What are the three steps following Preservation
- Collection - Gather info centrally for discovery
- Process - Sceen ollected infomration to filter out unecessary info prior to review
- Analysis - Deep inspection of content and context of remaining infomration
What are the final 2 steps to e-discovery
- Production - Places information into a form that can be shared
- Presentation - Displays information to people