Security Flashcards

1
Q

CIA triad

A

Confidentiality like encryption
Integrity like hashing
Availability like uptime or redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-compliant System

A

System that is not compliant with the configuration baseline of what is approved by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuration baseline

A

set of recommendations for deploying a computer in a hardened configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unprotected System

A

system not protected by any antivirus or firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unpatched System

A

system without patches or updates applied even though they are available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some Windows releases that are EOL as of 2023?

A

Windows XP
Windows Vista
Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bring Your Own Device (BYOD)

A

Use of personal devices in an office environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero-day Exploit

A

unknown exploit that exposes previously unknown vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial of Service (DOS)

A

attack that attempts to make a computer or server’s resources unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Flood Attack

A

type of DoS that attempts to send more packets to a server or host than it can handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ping Flood

A

Flood attack that happens when too many pings (ICMP echo) are being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SYN Flood

A

Attacker initiates multiple TCP sessions but never completes the three-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Permanent Denial of Service (PDoS)

A

attack that exploits a security flaw to permanently break a networking device by reflashing its firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fork Bomb

A

attack that creates a large number of processes to use up the available processing power of a computer. It is not considered a “worm” because it does not infect the programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distributed Denial of Service (DDoS)

A

uses lots of machines to attack a server to create a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS Amplification

A

the attacker typically uses a botnet or a group of compromised computers to send a large number of DNS queries to open DNS resolvers. The source IP address of these queries is spoofed on the hackers machine to make it look like they are coming from the victim’s IP address. When the open DNS resolvers respond to these queries, the response is sent to the spoofed source IP address, which is the victim’s IP address. Because the response is typically much larger than the original query, this can overwhelm the victim’s network and cause a denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Blackhole/Sinkhole

A

identifies attacking IP addresses and routes them to a non-existent server through the null interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spoofing

A

occurs when an attacker masquerades as another person by falsifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ARP Spoofing/”Poisoning”

A

sending fake ARP messages to a local netowkr in order to associate a fake MAC address with a legitimate IP address, thereby intercepting network traffic intended for the legitimate device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

On-Path Attack

A

occurs when an attacker puts themself between the victim and the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Replay

A

occurs when valid data is captured by the attacker and is then repeated immediately, or delayed, and then repeated. an example is capturing someone’s log-in credentials and storing it, and then logging into their account later on in the day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Relay attack

A

when the attacker inserts themself in between the two hosts and intercepts legitimate communication but relaying the information to a C2 or 3rd party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SSL Stripping

A

when an attacker tricks the encryption application into presenting the user with an HTTP connection instead of an HTTPS connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Downgrade Attack

A

when an attacker attempts to have a client or server abandon a higher security mode in favor of a lower security mode by intercepting the communication between two systems that are negotiating the protocol version to be used, and then modifying the negotiation messages to suggest an older and less secure protocol version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SQL injection
attack consisting of the insertion or injection of an SQL query via input data from the client to a web application
26
Injection Attack
insertion of additional information or code through data input from a client to an application. Common types are SQL, HTML, XML, LDAP
27
Cross-Site Scripting (XSS)
when an attacker embeds malicious scripting commands on a trusted website
28
Stored/Persistent - XSS attack
attacker injects malicious code into a web application that is then stored on the server and served to all users who access the page. Like adding a comment with XSS injection of a JS alert that whenever someone else loads the page, it shows them that alert. Blind XSS is the same but you cannot see it, like adding XSS into a private report comment to an admin.
29
Reflected - XSS attack
when an attacker injects malicious code into a website that is then reflected back to the user in a dynamic response, such as a search query or a form submission. The victim's browser then executes the malicious code, allowing the attacker to steal sensitive information or perform other malicious actions on behalf of the victim.
30
Document Object Model (DOM) - XSS attack
attempt to exploit the victim's web browser
31
How to prevent SQL injections?
ensure your website has data validation and sanitizing user inputs
32
How to prevent XSS attacks?
with output encoding and proper input validation
33
Cross-Site Request Forgery (XSRF/CSRF)
when an attacker tricks a user into performing an action on a website that they did not intend to perform while they are already authenticated on the website. An example is an attacker sending a malicious link that when clicked, will have the victim go to their online banking app and transfer funds to the attackers account.
34
How to prevent XSRF/CSRF?
with tokens, encryption, XML file scanning, and cookie verification
35
Password Analysis Tool
Used to test the strength of passwords to ensure password policies are being followed
36
Password Cracker
uses comparative analysis to break passwords and systematically continues guessing until the password is determined
37
What are the different types of password cracking methods?
password guessing, dictionary attack, brute-force attack, cryptanalysis attack
38
Password Guessing
occurs when a weak password is simply figured out by a person
39
Dictionary Attack
method where a program attempts to guess the password by using a list of possible passwords
40
Brute-Force Attack
method where a program attempts to try every possible combination until it cracks the password
41
Cryptanalysis Attack
comparing a precomputed encrypted password to a value in a lookup table. Example is a rainbow attack - breaching the target machines password storage of hashes, and using a rainbow table to compare.
42
Insider Threat
An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company
43
Logic Bomb
specific type of malware that is tied to either a logical event or a specific time
44
Boot sector - Virus
virus that is stored in the first sector of a hard drive and is loaded into memory upon boot. Only targets MBR and is installed via removable media
45
Macro - Virus
virus embedded into a document and is executed when the document is opened by the user
46
Program - Virus
seeks out executables or application files to infect
47
Multipartite - Virus
combines boot and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer
48
Encryption - Virus
uses a cipher to encrypt its contents to avoid any antivirus software
49
Polymorphic - Virus
will encrypt its own code in a unique way so that is appears different each time it infects a new file or system in order to evade antivirus software
50
Metamorphic - Virus
has the ability to rewrite itself entirely before attempting to infect a file
51
Armored - Virus
has a layer of protection to confuse a program or a person who's trying to analyze it
52
Hoax Viruses
tries to trick a user to infect its own machine
53
Worm
malicious software that can replicate itself without any user interaction
54
Trojan
a piece of malicious software that is disguised as a piece of harmless or desirable software
55
Remote Access Trojan (RAT)
provides the attacker with remote control of a victim computer
56
Stealth Viruses
a category for any virus protecting itself
57
Virus
malicious code that runs on a machine without the user's knowledge and infects the computer when executed
58
Ransomware
malware that restricts access to a victim's computer system until a ransom is received
59
Spyware
malware that secretly gather information about the user without their consent
60
Adware
displays advertisements based on your activity. falls into the category of spyware
61
Grayware
software that isn't benign nor malicious and tends to behave improperly without serious consequences
62
Rootkit
software designed to gain administrative level control over a system without detection. commonly installed thru a DLL injection or shim
63
DLL injection
malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime
64
Driver Manipulation
attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level
65
Botnet
a collection of compromised computers under the control of a master node
66
7 steps of removing malware
1. Identify the symptoms of a malware infection 2. Quarantine/isolate the infected systems 3. Disable System Restore 4. Remediate the infected system 5. Schedule automatic updates and scans 6. Enable System Restore and create a new restore point 7. Provide end user security awareness training
67
Phishing
a social engineering attack where the malicious actor communicates with the victim from a supposedly reputable source to lure the victim into divulging sensitive information
68
Spearphishing
uses the same technology and techniques but is a more targeted version of phishing
69
Whaling - Phishing
focused on key executives within an organization or other key leaders, executives, and managers in the company
70
Vishing
Occurs when the message is being communicated to the target using the voice functions of a telephone
71
Business Email Compromise (BEC)
occurs when an attacker takes over a high-level executive's email account and orders employees to conduct tasks
72
Pharming
tricks users into divulging private information by redirecting a victim to a website controlled by the attacker or penetration tester
73
Tailgating
when an attacker attempts to enter a secure portion of a building by following an authorized person into that area, without their knowledge
74
Piggybacking
Similar to tailgating, but happens with the knowledge or consent of the employee
75
Shoulder Surfing
using direct observation to obtain info from an employee
76
Dumpster Diving
actually looking in garbage or recycling bins for personal or confidential information
77
Evil Twin
a fraudulent Wi-Fi access point or web server that appears to be legitimate but is set up to eavesdrop on wireless communications
78
Karma Attack
exploits the behavior of Wi-Fi devices due to a lack of access point authentication protocols being implemented
79
Preferred Network List (PNL)
a list of the SSIDs of any access points the device has previously connected to and will automatically connect to when those networks are in range
80
Captive Portal
a web page that the user of a public-access network is obligated to view and interact with before access is granted (sign in with google to access wifi)
81
Personal Firewall
software application that protects a single computer form unwanted internet traffic
82
Clean Desk Policy
by the end of the day, employees clean their desks and leave nothing out that may be takes as a password or a PIN
83
Physical Controls
implemented to increase physical security posture
84
Logical Controls
implemented through hardware or software to prevent or restrict access
85
Managerial Controls
implemented to manage the organization's personnel and assets
86
Principle of Least Privilege
uses the lowest level of permissions needed to complete a job function
87
Discretionary Access Control (DAC)
access control method where access is determined by the owner of the resource
88
Mandatory Access Control (MAC)
access control policy where the computer system and administrator decides who gets access
89
Role-based Access Control (RBAC)
access method that is combined by the system that focuses on a set of permissions versus an individual's permissions. Based on roles such as a loan processor group who is allowed to view and modify certain documents.
90
Power User
user who is not a normal user and also not a normal administrator
91
Zero-Trust
security framework that requires the users to be authenticated, authorized, and validated
92
Time-Based One-Time Password (TOTP)
generated by combining a secret key, known only to the user and the authentication system, with the current time. The result is a unique, one-time code that is valid for only a short period of time, typically 30 seconds
93
HMAC-Based One-Time Password (HOTP)
2FA authentication mechanism that generates a one-time password based on a secret key and a counter value.
94
In-Band Authentication
relies on an identity signal from the same system requesting the user authentication
95
Out-of-Band Authentication
uses a separate communication channel to send the OTP or PIN
96
Enterprise Mobility Management (EMM)
enables centralized management and control of corporate mobile devices. manages not only mobile devices, but also applications, content, and data in an enterprise environment.
97
Remote Wipe
used to send remote commands to a mobile device from a MDM solution to delete its data settings
98
Active Directory (AD)
allows to get information from the network about all of your systems, users, and computers
99
Security Group
allows to easily assign permissions to a set of users or workstations
100
Organizational Unit (OU)
way of dividing the domain into different administrative realms
101
Folder Redirection
allows to change the target of a personal folder
102
Pre-Shared Key
same encryption key is used by the access point and the client. Only used in symmetric encryption algorithms
103
Wired Equivalent Privacy (WEP)
original 802.11 wireless security standard that claims to be as secure as a wired network. Uses IV
104
Wi-Fi Protected Access (WPA)
replacement for WEP, which uses TKIP, Message Integrity Check (MIC), and RC4 encryption
105
Wi-Fi Protected Access version 2 (WPA2)
802.11i standard to provide better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking
106
Wi-Fi Protected Setup (WPS)
automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable. Always disable it
107
Wi-Fi Protected Access 3 (WPA3)
Latest and most secure version of wireless network encryption currently available. 192-bit or 128-bit key. Uses AES with GCMP
108
Simultaneous Authentication of Equals (SAE)
a secure password-based authentication and password authenticated key agreement that relies on forward secrecy
109
Forward Secrecy
assures the session keys will not be compromised even if the long-term secrets used in the session key exchange have been compromised. Generates a new session key for each connection.
110
Remote Authentication Dial-In User Service (RADIUS)
cross-platform protocol that authenticates and authorizes users to services, and accounts for their usage
111
Terminal Access Controller Access Control System Plus (TACACS+)
Cisco-proprietary protocol that provides separate authentication, authorization, and accounting services
112
Diameter
peer-to-peer (meaning Diameter node can communicate with each-other without a central controller) protocol created as a next-generation version of RADIUS
113
Lightweight Directory Access Protocol (LDAP)
cross-platform protocol that centralizes info about clients and objects on the network
114
Single Sign-On (SSO)
enables users to authenticate once and receive authorizations for multiple services across the network. In an Active Directory environment, Kerberos is used as the authentication protocol for SSO.
115
Kerberos
uses symmetric encryption and the Key Distribution Center to conduct authentication and authorization functions
116
What are the steps for Kerberos authentication?
1. The user sends a request to the Authentication Server (AS) for a Ticket-Granting Ticket (TGT). 2. The AS verifies the user's identity and sends back a TGT encrypted with a secret key shared between the client and the Kerberos server. 3. The user sends a request to the Ticket-Granting Server (TGS) with the TGT for a service ticket for a specific resource. 4. The TGS verifies the TGT's authenticity and checks the user's authorization to access the requested resource. 5 If the TGT is valid and the user is authorized, the TGS creates a service ticket encrypted with a secret key shared between the TGS and the resource server and sends it back to the user. 6. The user sends the service ticket to the resource server. 7. The resource server verifies the service ticket by decrypting it with its secret key, and grants access to the requested resource if the ticket is valid.
117
802.1x framework
used for port-based authentication on both wired and wireless networks. uses RADIUS or TACACS+
118
Extensible Authentication Protocol (EAP) and what are the different types?
allows for numerous different mechanisms of authentication. EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP.
119
EAP-MD5
utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication
120
EAP-TLS
during authentication, the client and server exchange digital certificates without the need for a username and password but instead the client needs to provide a private key that matches the public key in the digital certificate. TLS is used to establish a secure channel before authentication.
121
EAP-TTLS
requires a digital certificate on the server and a password on the client for its authentication. TLS tunnel is established before username and password are provided to prevent eavesdropping.
122
EAP Flexible Authentication via Secure Tunneling (EAP-FAST)
uses certificates, credentials, and a TLS tunnel to encrypt traffic between client and server. first client and server exchange credentials, then a TLS tunnel is established, then the client provides credentials and is authenticated. the TLS tunnel remains until the end of the connection.
123
Protected EAP (PEAP)
uses server certificates and Microsoft's Active Directory databases to authenticate a client's password. also sets up a TLS tunnel for encryption. first establishes a TLS tunnel, then the client verifies the server certificate, then the client gives username and password.
124
Lightweight EAP (LEAP)
a proprietary protocol that only works on Cisco-based devices
125
Corporate Owned/Business Only (COBO) - Devices
purchased by the company and only used by the employee for work-related purposes
126
Corporate Owned/Personally Enabled (COPE) - Devices
company provides a device used for work and/or personal use by employees
127
Choose Your Own Device (CYOD)
allows employees to choose a device from an approved list of vendors or devices
128
Storage Segmentation - Devices
creates a clear separation between work and personal data on a device into separate partitions.
129
Mobile Device Hardening
1. Update your device to the latest software 2. Install Antivirus 3. Train users on proper security and use of their device 4. Only install apps from the official app stores 5. Do not jailbreak or root your device 6. Only use version 2 SIM cards for your devices 7. Turn off all unnecessary features on your device 8. Turn on encryption for voice and data 9. Use strong passwords or biometrics 10. Don't allow BYOD
130
What are some vulnerabilities of IoT devices?
1. Insecure Defaults 2. Hard-coded configurations 3. Cleartext communication 4. Data leakage
131
Local Sign-in
uses Local Security Authority (LSA) to compare the submitted credentials to the SAM database
132
Network Sign-in
uses Kerberos to perform network authentication
133
Remote Sign-in
allows users to access the local network by using a VPN or a web portal (SSL/TLS)
134
Account Management
set of policies that determine what rights and privileges each user has on a given computer or network
135
What are some encryption methods for data in motion?
TLS or SSL, IPSec or L2TP, WPA2 with AES
136
What are some encryption methods for data at rest?
Full disk encryption, folder encryption, file encryption, database encryption
137
Degaussing - data destruction
exposes the hard drive to a powerful magnetic field which in turn causes previously-written data to be wiped from the drive
138
Purging (Sanitizing) - data destruction
act of removing data in such a way that it cannot be reconstructed using any know forensic techniques. Typically involves overwriting the entire drive with zeros multiple times.
139
Erasing or Wiping data - data destruction
the process of destroying old data by writing over the location on the hard drive or solid state device with new data
140
Low-level Format - data destruction
procedure provided by the manufacturer which will reset the data back to its factory condition
141
Self-Encrypting Drive - data destruction
a particular type of hardware that will encrypt the entire disk. getting rid of the key after.
142
Incident Response
a set of procedures an investigator follows when examining a computer security incident
143
Incident Management Program
consists of monitoring and detection of security events on a computer network and the use of proper responses to those security events
144
Chain of Custody
the record of evidence history from collection to court presentation and disposal
145
Faraday Bag
shields devices from outside signals to prevent data from being altered, deleted, or added to a new device.
146
Legal Hold
preserves all relevant information when litigation is reasonably expected to occur
147
.bat file
text-based file containing Windows commands and is interpreted from the command line environment
148
.ps1 file
used within windows inside the PowerShell environment. more complex scripts than a batch file
149
.vbs file
scripting language based on the Visual Basic programming language
150
.sh file
bash script used within linux
151
.py file
python language file used in Windows, Linux, and Mac
152
Pseudocode
generic language used to teach new learners how to program a computer
153
.js file
JavaScript used for automations in webpages and macOS systems
154
What is a dropper?
type of malware that is designed to deliver and install other malicious programs. Stage 1 dropper, delivers the Stage 2 payload.