Security Flashcards

(72 cards)

1
Q

CIA triad

A

Applies to data, usually requiring balancing tradeoffs:
_ confidentiality
_ integrity
_ availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

InfoSec

A

_ information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SecOps

A

_ security operations

_ discipline within IT responsible for protecting assets by reducing the risk of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

asset

A

_ person, device, location, or information that SecOps aims to protect from attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attack

A

_ action taken by a threat that exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

risk

A

_ potential of a threat to exploit a vulnerability via an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

threat

A

_ something or someone that can exploit a vulnerability

_ person, software, or natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vulnerability

A

_ a weakness in software, hardware, facilities, or humans that a threat can exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advanced persistent threat (APT)

A

_ when malware remains undetected for a long time waiting for the right time to attack
_ by remaining idle, it infects backups too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

zero-day

A

_ when a vulnerability or exploit is not yet public

_ likely no patch for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion prevention system (IPS)

A

_ can look for suspicious patterns of code, block it immediately, and send it for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blue, red, white, and purple teams

A

_ red team attempts to compromise security
_ blue team attempts to defined security
_ white team may observer and referee
_ “purple team” is when red and blue teams come together to debrief and cross-train

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

White hat, black hat, gray hat hackers

A

_ white hat - perform attacks when authorized in order to find vulnerabilities
_ black hat - criminals
_ gray hat - no malicious intent, but may not have obtained permission, could be breaking law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Script kiddie

A

_ copycat criminals
_ hack for curiosity or entertainment
_ unsophisticated
_ may not realize the consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

wiretapping

A

_ eavesdropping between communicating people or computers
_ might use a packet sniffer or attach to hardware
_ might use an EMF listener; a reason to use fiber optics
_ ethernet switches make this hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability scanner

A

_ examines specific ports, so use a port scanner first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NX-bit

A

_ no-execute bit
_ flags memory for either storage or execution
_ reduces change of buffer overflow vulnerabilities
_ only available in special CPUs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

spoofing

A

_ pretending to be something else in order to gain access
_ man-in-the middle attack - pretending to be client to the actual server and server to the actual client
_ ARP poisoning - causes an Ethernet switch to flood all traffic to every port (including the attacker’s computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DoS

A

_ Denial-of-Service
_ may use features of ICMP, such as ping
_ attacker can make the echo replies go to another computer rather than their computer, minimizing stress on attacker’s computer
_ ping-of-death = obsolete vulnerability whereby server would crash for a malformed ICMP packet
_ ping flood attack = overwhelms computer with pings having randomized source addresses
_ smurf attack = (1) a DDoS, thousands of computers bombard the victim; (2) the attacker sends a forged ICMP echo-request packet to the broadcast address of a large IP subnet so all of the computers on the subnet receive the message; (3) the attacker specifies the victim’s address as the source address
_ SSL attack = wastes computer resources setting up and tearing down SSL encryption sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

honeypot

A

_ server designed to look authentic
_ contains fictitious data
_ intended to draw hackers
_ can be used to collect data on the attacker
_ “tar pit” variation is designed to slow the attacker so that the intrusion detection system can do a trace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Rootkit attack

A

_ software designed to give a user root or admin access and full control over the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Backdoor attack

A

_ means of bypassing authentication or encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trojan horse

A

_ misleads users into installing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

confidentiality

A

_ part of the CIA triad
_ limits access to information (at odds with availability)
_ goal is to prevent an unauthorized user from accessing, copying, or transmitting information
_ need-to-know policy (aka least privilege policy)
_ reduce exposure by destroying unneeded copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
integrity
_ helps determine the trustworthiness of information _ includes verification _ ensures accuracy of the data _ where information came from _ whether information was changed en route _ encryption helps with integrity _ digital signatures or one-way hashes (e.g. SHA-3) can provide integrity _ version control can provide integrity _ e.g. a man-in-the-middle attack violates integrity, intentional or accidental deletion or modification of data, equipment malfunctions, natural phenomena such as EMP
26
availability
_ ensuring data is always accessible to authorized users _ includes making server highly available _ includes minimizing downtime _ have a disaster recovery plan _ back up data off site _ e.g. DoS attacks, unplanned downtime, accidental changes to access controls incorrectly removing authorized users
27
Packet filter
_ a firewall that operates at layers 3 and 4 _ checks the protocol and the source and destination IP addresses and ports _ only concerned with the packet address label (header) _ no filtering on payload
28
Circuit-level gateway
_ a middleman firewall that helps conceal identity of client and server from each other _ may change IP address and port numbers _ uses Network Address Translation (NAT) _ uses Port address Translation (PAT)
29
Stateful inspection
_ state of the connection between two computers _ can identify traffic as “conversational” and automatically create temporary firewall rules that permit two-way traffic for the duration of the connection _ minimizes the number of rules otherwise needed by a packet filter
30
Application-aware firewall
_ aka layer-7 firewall _ a proxy server _ act as middlemen reading packet application payloads
31
Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
_ based on a DB of known behaviors and payload signatures _ IDS monitors to detect threats _ IPS intercepts and blocks threats _ both have a “tap mode”, where they only listen to a network, which suffices for IDS _ “in line mode” = positioned to intercept and block traffic _ IPS supports many network ports that operate as input/output pairs _ some IPS devices block based on file type, such as to exclude .EXE files _ either software or physical devices
32
OSI layer 1 security
_ security varies by physical medium (e.g. CAT6 cabling can be monitored for EMF, but fiber optic cabling can’t) _ includes locks on doors, equipment _ radio jamming
33
OSI layer 2 security
_ e.g. capturing a WAP encrypted password for decryption _ e.g. ARP poisoning - attacker sends special Ethernet frames that overwhelm the switch’s “forwarding information base (FIB)” database, forcing the switch to send traffic to everyone, including someone’s packet sniffer _ e.g. VLAN hopping attack, taking advantage of an Ethernet switch configured in trunk mode (aka tagging mode), allowing computers to send/receive traffic on any VLAN _ e.g. spoofing that impersonates another computers MAC
34
OSI layer 3 security
_ e.g. ping DoS attacks _ e.g. pinging to find available computers _ e.g. spoofing that impersonates another computer’s IP _ intrusion prevention systems can prevent these attacks
35
OSI layer 4 security
_ e.g. port scanner to find open ports | _ a packet filtering firewall can defend against attacks
36
OSI layer 5 security
_ e.g. RPC attacks
37
OSI layer 6 security
_ e.g. man-in-the-middle attacks where attacker fools victim into accepting a false security certificate _ can be mitigated using an application-layer proxy or an IPS _ important to train users about fake security certificates
38
OSI layer 7 security
_ every app has its own vulnerabilities _ e.g. injection attacks, buffer overrun attacks _ vulnerability scanners can find known problems _ a reverse proxy or IPS can scan packet payloads
39
ciphertext
Encrypted data
40
Symmetric key encryption
_ aka private key encryption _ send and receiver must have the same cipher key _ exchange of key is point of greatest vulnerability _ the German Enigma machine used a symmetric key cipher that took years to break _ much faster to encrypt and decrypt than asymmetric ciphers
41
Asymmetric key encryption
_ e.g. public key infrastructure (PKI) _ anyone can use the public key to encrypt data _ only the private key can decrypt the data _ the public key can can decrypt data encrypted with the private key to verify the source of the data, providing a digital signature _ no need to share a private key first and risk exposure _ lots of computation required for large blocks of data _ the public key gets transferred in the form of a certificate issued by a certificate authority (CA)
42
non-repudiation
_ inability to deny the source of data
43
Elliptic curve cryptography (ECC)
_ uses algebraic elliptic curves to create keys that a smaller than traditional keys but more difficult to crack
44
End-to-end encryption
_ when data is stored both in transit and at rest | _ data is never stored or transmitted in the clear
45
SSL/TLS handshake
_ client encrypts a token with the server’s public key _ server decrypts the token using its private key _ the token is then used as the private key in a symmetric key cipher for data exchange
46
IPSec
_ internet protocol security _ a way to encrypt IP traffic at layer 3 _ common in VPN tunnels (PPTP - point-to-point tunneling) _ tunneling = “encapsulation” within an untrusted network _ also used in site-to-site encryption such as between devices such as firewalls or routers _ devices can offload the encryption processing from computers _ uses the Authentication Header (AH) protocol for data integrity, the encapsulating security payload (ESP) for encryption, and the security associations (SA) for key exchange. _ often used with internet key exchange (IKE and IKEv2) _ can be used with pre-shared symmetric keys
47
Advanced Encryption Standard (AES)
_ the current most secure algorithm for storing and encrypting data at rest _ symmetric key cipher _ uses different key and block sizes _ up to 14 transformations on data _ AES-128, AES-192, AES-256 (latter used in banking) -- different key lengths _ most devices use AES-256 today
48
AES-NI
_ AES new instructions _ hardware acceleration supporting AES encryption _ up to 10 GB/sec _ particularly useful on wireless devices
49
Retention policy
_ policy on how long a piece of data should be available, whether accessible or archived _ regulations may dictate _ regulations may also indicate the governmental district in which the data must reside
50
DEK
_ data encryption key | _ key used to encrypt and decrypt data at rest
51
Protecting DEKs
_ rotate/change DEKs regularly to limit time available for an attacker to use a stolen key _ use a method that does not require disclosing the key: encrypt the DEK using a KEK and only temporarily decrypt the DEK
52
KEK
_ Key encryption key _ asymmetric key _ used to protect DEKs _ stored in a KMS
53
KMS
_ key management system _ stores DEKs encrypted with KEKs _ grants access to keys based on the provided KEK _ app decrypts DEKs for temporary use, but does not store decrypted DEKs _ the system itself does the encryption and decryption, so the keys are never revealed _ controlled by a master key, which must be protected _ protect the master key by encrypting it, and then protect that encrypted key by encrypting it again; each encryption requires effort to break, so little need for more than 3 or 4 key encryptions
54
Federated identity management
_ allows internet users to authenticate to your app via federated identity servers at Google, Facebook, Twitter _ a federated identity server creates a token that is unique to the user for your app so the app can base identity on this token, without disclosing private information _ your app therefore does not need a unique username and password for the user
55
IAM
_ identity and access management | _ provides identity and access control services
56
Multifactor identification
_ aka “MFA” or “2-factor” or “2FA” _ use of multiple authentication requirements _ second could be providing information only you know, using your biometrics, or using a physical device you have (e.g. cell phone) _ text and email are NOT considered strong MFA _ virtual MFA apps (to generate a code) or physical tokens are better
57
Service account authentication
_ typically does not use username and password | _ uses API keys
58
Wireless encryption standards, weakest to strongest
_ WEP _ WPA _ WPA2 _ WPA3
59
3DES
_ “triple DES” _ symmetric algorithm that uses obsolete DES algorithm 3 times to encrypt data _ uses 3 keys _ 56-bit encryption _ modern hardware can crack it by brute force in less than a day _ most organizations have phased it out
60
WAP
_ wireless access port
61
WEP
_ Wired Equivalent Privacy _ one of the first wireless standards, by IEEE in 1997 _ key either 10 or 26 hex digits (40 bits or 104 bits) _ modern computers can crack in under a day _ deprecated in 2004, replaced by WPA
62
WPA
_ Wi-Fi protected access _ defined jointly by the Wi-Fi Alliance and the IEEE _ created as short-term solution, awaiting the more secure 802.11i standard _ based on the draft 802.11i standard at the time _ uses variable-length alphanumeric passphrase, 8-63 characters _ uses TKIP, which generates a new 128-bit encryption key for each packet sent _ but had security vulnerabilities
63
WPA2
_ aka IEEE 802.11i _ published in 2004 by Wi-Fi Alliance and IEEE _ the wireless standard for 15 years _ mandatory support for CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol), which is part of AES, providing confidentiality, authentication, and access control to the network _ still had weaknesses
64
WPA3
_ released in January 2018 _ minimum key strength is 192 bits for enterprise connections _ also has a personal mode with lower key strength _ no more passphrase: now uses SAE (simultaneous authentication of equals) to exchange the network key (part of the 802.11-2016 standard); eliminates the need to tell other people of the passphrase in personal mode _ implements PFS (perfect forward secrecy), ensuring that no more than one session can ever be compromised at a time _ uses encryption management frames of 802.11w
65
Ad-hoc mode
_ wireless communication mode _ peer-to-peer _ does not use WAP _ mainly used for initially setting up devices instead of requiring connection with a physical cable _ also sometimes for transferring files between devices, such as a camera and a laptop _ does not require a wireless router or access point
66
Wireless infrastructure
_ devices connect via a wireless router, which is a combined WAP and router _ router acts like an Ethernet switch
67
802.1x
_ also 802.11x _ works wired or wireless _ clients (“supplicants”) connect to an “authenticator” to request access to the network; the authenticator may be a wireless device _ the authenticator delegates the decision to an authentication server, which indicates what ports the user can access; this server runs RADIUS (remote authentication dial-in user service) or EAP (extensible authentication protocol) _ authentication is either by username/password or by PKI certificates _ grants the user access only to authorized ports _ 802.1x clients can also check the versions of antivirus scanners to make sure they conform to corporate requirements
68
Deauth attack
_ deauthentication attack on a wireless network _ a DoS attack that can force any or all clients off the network _ the attacker doesn’t even need to be on the network _ users can simply reconnect, but attacker may continue the attack or force users to reconnect through a false access point or to capture the 4-way handshake to gain info on the network _ WPA3 prevents this attack _ WPA2 makes it difficult for the attacker to read encrypted data
69
Fake access point
_ attack on a wireless network _ attacker sets up a wireless network having no security _ attacker watches all data in the clear _ can redirect an unwitting user to a different location _ can modify data _ if you must use an unsecured network, create a VPN tunnel _ avoid using unsecured Wi-Fi hotspots
70
AAA
_ authentication - verifying identity _ authorization - what user may access _ accounting (auditing) - verifies restrictions, providing a forensic trail; should be stored in a different location from the data being audited write-only to make it harder for the attacker to cover his tracks
71
Device hardening
The process of: _ reviewing security settings _ updating device software _ testing security such as by attempting to breach defenses
72
How to harden devices
_ change the default passwords _ remove unnecessary logins after periodic review _ enforce a strong password policy (enforce if possible) _ require users to change passwords frequently _ implement MFA _ remove unnecessary services _ keep patches up to date on all devices (manufacturers often patch 90 days before public disclosure of the vulnerability) _ limit physical access to the device _ only allow changes from a trusted network -- none from the public side; disallow changes to a WAP from other wireless devices _ require encryption on wireless networks (WPA2 or WPA3) _ audit all access (e.g. using Syslog); get alerts too _ back up and store a copy remotely