Security Principles Flashcards

(59 cards)

1
Q

What is the goal of minimizing attack possibilities?

A

Reduce the installed code to only what is necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the attack surface?

A

The set of points where an attacker can try to enter or extract data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What metrics count toward the attack surface?

A

Open sockets, pipes, RPC endpoints, services, and privileged services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many services should run by default?

A

As few as possible to minimize vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are ISAPI filters?

A

Microsoft’s web server services, also implemented by Apache mod_isapi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What increases attack surface in web servers?

A

Dynamic web pages and ISAPI filters/apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do weak ACLs affect security?

A

Files, directories, or registry keys with weak ACLs are vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why aim for secure defaults?

A

Reduces attack surface and improves performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is defense in depth?

A

Multiple layers of security controls to protect a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of defense in depth?

A

Bank security with guards, time-release doors, CCTV, and vault layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do time-release doors enhance security?

A

Prevent quick entry/exit, allowing remote locking to trap intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why don’t bank tellers access the vault?

A

Least privilege principle limits their access to reduce risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a feature of a bank vault?

A

Thick metal, multiple compartments, and controlled opening times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the least privilege principle?

A

Run processes with minimal privileges to limit damage from attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens if a vulnerability allows code injection?

A

Malicious code runs with the same privileges as the compromised process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How should web servers avoid admin privileges?

A

Run as low-privilege accounts, like Apache’s nobody account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does Apache manage privilege?

A

Main httpd process starts as root, spawns low-privilege processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Run As Different User?

A

A Windows 2000 feature to run apps with alternate credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Run as Administrator?

A

A Vista/Windows 7-10 feature to elevate app privileges temporarily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is closing an admin-privileged app safer?

A

Ends elevated privileges, reducing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is backward compatibility in security?

A

Ensuring new protocols work with older systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why is backward compatibility a security issue?

A

Insecure older versions may persist due to non-upgrading clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an example of a protocol with compatibility issues?

A

Server Message Block (SMB) protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When was secure SMB with packet signing introduced?

A

With Windows 98 and NT4 SP3.

25
What does SMB packet signing prevent?
Man-in-the-middle attacks and data tampering.
26
How does SMB ensure message integrity?
Digital signatures in packets, verified by client and server.
27
What is a man-in-the-middle attack?
An attacker impersonates a communicator to monitor or control data.
28
Why can attackers force old SMB versions?
Backward compatibility allows fallback to insecure versions.
29
What is Internet Protocol Security (IPSec)?
A protocol addressing TCP/IP insecurities.
30
Why is IPSec not enabled by default?
Not all servers support it, maintaining TCP/IP vulnerabilities.
31
Why are security features not inherently secure?
Must be correctly chosen and implemented for specific threats.
32
When is SSL/TLS ineffective?
If the client-to-server data stream isn’t the attack target.
33
What is security by obscurity?
Relying on hidden information for protection.
34
Why avoid security by obscurity?
Obscured information is easily discovered, offering weak defense.
35
Why should code and data not be mixed?
Mixing enables exploits, like viruses in email or web scripts.
36
What was Lotus 1-2-3’s security issue?
Macros mixed code with data, enabling dangerous actions.
37
How does Office XP handle code and data?
Disables macro execution by default, user sets policy.
38
What should developers do with security bugs?
Fix them and search for similar issues in the app.
39
Why are security flaws compared to cockroaches?
Finding one suggests more exist in the code.
40
How should security bugs be fixed?
Address the root cause openly, not just symptoms.
41
Why avoid covering up security bugs?
Leads to conspiracy theories and distrust.
42
What is an example of a low-privilege account?
Apache’s nobody account for handling web requests.
43
What is the benefit of configurable protocol versions?
Allows clients to choose secure versions, reducing legacy risks.
44
What attacks does secure SMB close?
Man-in-the-middle and data-tampering attacks.
45
Why is TCP/IP considered insecure?
Lacks built-in protections against common network attacks.
46
What is the role of a bank guard in defense in depth?
Provides an outer layer of physical security.
47
How do CCTV cameras contribute to security?
Monitor all areas, deterring and recording threats.
48
What is a secure default in app development?
Disabling unnecessary features to reduce attack surface.
49
Why count open sockets in attack surface?
Each socket is a potential entry point for attackers.
50
What are open pipes in security?
Communication channels that could be exploited if unsecured.
51
What is an RPC endpoint?
A remote procedure call point, vulnerable if exposed.
52
Why minimize services running with high privileges?
Reduces risk of system-wide compromise if exploited.
53
How do weak ACLs on files increase risk?
Allow unauthorized access or modification.
54
What is the default policy for macros in modern apps?
User decides whether to allow execution, not automatic.
55
Why fix security issues openly?
Builds trust and avoids speculation about hidden flaws.
56
What is the risk of running web servers as admin?
Exposes the system to severe compromise if hacked.
57
Why is upgrading protocols challenging?
Large client bases may resist or delay upgrades.
58
What is packet signing in SMB?
Adding digital signatures to packets for authenticity.
59
Why is defense in depth like a bank?
Multiple independent layers ensure robust protection.