Security Operations 4.1 Flashcards

Given a Scenario apply common security techniques to computing resources

1
Q

Secure Baselines - Establish

A

Security Baselines need to be established. All application instances must follow this baseline. List of security baselines is often already established and provided by the manufacture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Secure Baselines - Deploy

A

How do we put those baselines into action. How do we deploy the baselines. May require multiple deployment mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Baselines- Maintain

A

Many of these are maintained through best practices. Test and measure to avoid conflicts. Audit baselines to make sure they maintain in effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardening targets - Mobile Phones

A

Bug fixes and security Patches, Prevent any known vulnerabilities.
Segmentation can protect data (Company data and user data are separated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Harding Techniques- Workstations

A

User desktops and laptops likely use windows, macOS, Linux, etc
Constant monitoring and updates
Remove unnecessary software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Infrastructure Devices

A

Examples: Switches, routers
They often have an embedded OS, with a limited OS.

Harden by not using default credentials and checking with the manufacturer for security updates. Not usually updated frequently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud infrastructure

A

Secure the cloud management workstation. Use principle of least privilege. All services, network setting, application rights and permissions.
Configure endpoint detection and response.
Always have back ups - Cloud to cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Servers

A

Make sure operating system is updated. Make sure user accounts have minimum password lengths. Network access and security. Server should have anti-virus and anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCADA/ICS - hardening techniques.

A

Supervisory Control and Data Acquisition System

Provide insight into the the systems. Should be hardened with the use of segmentation no access from the outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Embedded system - Hardening techniques

A

Hardware and software designed for a specific function. Can be difficult to harden, unlikely to have a security patch. Important to provide additional security by putting them on a segmented network and a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RTOS - hardening techniques

A

Real time operating system.
An operating system with a deterministic processing schedule. Industrial equipment, automobiles, military environments.

Isolated from the rest of the network
Run with the minimum services which helps to prevent for exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IoT - hardening devices.

A

Internet of things
Heating, cooling and lighting. Home automation, wearable technology.
Put updates for IoT’s at a high priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Securing Wireless and Mobile - Site Survey

A

Determine the existing wireless landscape. Sample the existing wireless spectrum. Identify existing access points. Work around existing frequencies.
Heat maps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless survey tools - Security.

A

Shows signal coverage, Potential interference, Built-in tools, 3rd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile Device management -Securing Wireless and Mobile

A

Manage company owned and user-owned mobile devices. Centralised management of mobile devices.Employer can implement security controls and segmentation on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BYOD -Securing Wireless and Mobile

A

Bring your own device.
Employee own the device. Difficult to secure. Policies and procedures are necessary to keep personal devices secure

16
Q

COPE - Securing Wireless and Mobile

A

Corporate owned, personally enabled.
Used as both a corporate device and a personal device.

Organisation Keeps full control of the device. Similar to company-owned laptops.

CYOD - Choose your own device.

17
Q

Security challenges relating to mobile phones?

A

-Can be easily hidden on somebodies person
-Contain a lot of data
-Can be located anywhere in the world

18
Q

Wifi - Securing Wireless and Mobile

A

Encrypt the data with VPN
On path attacks - allow/ and or modify data.
Denial of service - Frequency interference.

19
Q

Bluetooth - Securing Wireless and Mobile

A

High speed communication over short distances. There is a formal pairing process to prevent unauthorised connections.

20
Q

Wireless network settings - WPA2 what is it?

A

Used to encrypt wireless data

21
Q

WPA2 Problem.

A

WPA2 has a problem where the hash associated with the four way handshake at the during the connection is derived by an attacker.

Once the hash is derived, attackers run it through a brute force attack to find the pre -shared key.

A weak PSK is easier to brute force, GPU processing and Cloud based password cracking make finding the PSK easier.

22
Q

WPA3 and GCMP

A

Stronger encryption used with WPA3 than WPA2

GCMP - Galois/ Counter mode Protocol - stronger encryption.

Includes data confidentiality
Message integrity check

23
Q

WPA3 Changes the PSK authentication process.

A

Includes mutual authentication. Creates a shared session key on the end devices rather than sending hashes these keys across the network. Nothing for the attacker to brute force.

24
Q

SAE

A

Simultaneous Authentication of Equal.

The way in which pre-shared keys are derived in WPA3

A diffie-hellman derived key exchanged with an authentication component.
Everyone uses a different session key
Included in IEEE Standard

25
Q

Radius (A AAA server)

A

Authentication protocol, Remote authentication dial in user service. Including connections on a local network.

26
Q

EAP

A

Extensible Authentication Protocol.

27
Q

Input validation

A

Analysing data and making sure it matches the data entry that what was expected.

28
Q

Secure cookies

A

Bits of information stored on your computer by bowser. Information inside the cookie can be valuable to the attacker. Secure cookies often used.

Sensitive information often not put in cookies.

28
Q

Static code analyses (SAST)

A

Used to find security flaws in applications. Not everything can be identified through analysis. Helps to find many security vulnerabilities such as buffer overflows, database injections but not everything can be identified by analysis.

29
Q

Code Signing

A

A way to check if the code on an application is the same code that was sent by the manufacturer.

Has the application been modified in any way?
Can you confirm that the application was written by a specific developer.

Code is digitally signed. If the code. The OS will analyse the code and then alert if anything has changed.

30
Q

Sandboxing the application

A

The application begins executing but only has access to the data it needs for the application to work.

Developers will create code in a separated sandbox so they do not impact the production during development.

Sandbox used in mobile devices which keeps applications separated from having access to the rest of the personal details on the phone.

31
Q

Application security Monitoring

A

View blocked attacks, SQL injection attempts. patched vulnerabilities