Stuff from Exams I don't know Flashcards

1
Q

Types of MAC Mandatory Access Control environments:

A

Hierarchical

Compartmentalized

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Generational Fuzzing AKA Intelligent Fuzzing

A

A form of fuzzing that develops inputs based on models of expected inputs to perform the same task. This is also sometimes called intelligent fuzzing. A form of fuzzing that modifies known inputs to generate synthetic inputs that may trigger unexpected behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Regression Testing

A

testing software functions based on prior test scenarios to ensure that a change has not negatively impacted the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCAP Protocol - NIST

A

The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization, including e.g., FISMA (Federal Information Security Management Act, 2002) compliance. The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP. An example of an implementation of SCAP is OpenSCAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

zzuf

A

Input fuzzing tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Diddling

A

Changing data with malicious intent before or during input to the system. The act of making small changes to data, typically malicious in intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XST Attack

A

Method to steal Cookies:

A Cross-Site Tracing (XST) attack involves the use of Cross-site Scripting (XSS) and the TRACE or TRACK HTTP methods. According to RFC 2616, “TRACE allows the client to see what is being received at the other end of the request chain and use that data for testing or diagnostic information.”, the TRACK method works in the same way but is specific to Microsoft’s IIS web server. XST could be used as a method to steal user’s cookies via Cross-site Scripting (XSS) even if the cookie has the “HttpOnly” flag set or exposes the user’s Authorization header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPTED - Crime prevention through environmental design 5 strategies

A

Strategies: Natural Surveillance, Natural Access Control, Territorial Reinforcement, activity support, Maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XDRF

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

E-Discovery reference model steps

A

Identification. …
Preservation. …
Collection. …
Processing. …
Review. …
Analysis. …
Production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Forensic Disk Controller

A

Performs four functions,

write blocking,
returning data requested by a read operation,
access-significant information from the device,
reporting errors from the device back to the forensic host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Limit Check

A

Type of input control:
An input control text that assesses the value of a data field to determine whether values fall within set limits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dry pipe, vs wet pipe, vs pre-action

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Calculation of SYMMETRIC keys needed in a large group for all to communicated securely.

A

(n(n-1))/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Calculation of ASYMMETRIC keys needed in a large group for all to communicated securely.

A

2 times people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Output Encoding - AKA Encoding

A

Defensive technique against injection attack:

involves translating special characters into some different but equivalent form that is no longer dangerous in the target interpreter, for example translating the < character into the < string when writing to an HTML page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Escaping

A

Injection Attack defensive technique:

Escaping involves adding a special character before the character/string to avoid it being misinterpreted, for example, adding a \ character before a “ (double quote) character so that it is interpreted as text and not as closing a string.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Type 1 error

A

False Positive

Remember - in Biometrics it is better to FAIL SAFE. So a False Positive = False Rejection

19
Q

Type 2 Error

A

False Negative

In biometrics this is a FALSE ACCEPT. This is Negative, and failing open.

NOT GOOD

20
Q

Real evidence

A

Real physical object

21
Q

Documentary Evidence

A

Documentation, logs.

22
Q

Testimonial evidence

A

Witness interview on stand

23
Q

Primary Evidence

A

Original copies/objects

24
Q

Secondary Evidence

A

Certified copies

25
Q

Hearsay Evidence

A

He said she said sort of situations. Second hand accounts of an event. Not admissable.

26
Q

Direct Evidence

A

Primary evidence, i.e. Security camera footage showing a person breaking into a store and stealing items;

27
Q

Corroborative Evidences

A

Supports the validity of another piece of evidence. “Paints the picture” of a situation.

If you swear before a judge that you saw a suspect in front of a convenience store at a certain time, the store’s security video might be corroborating evidence for your testimony. If you accuse your neighbor of denting the door of your car, a corresponding dent in her bumper could be corroborating evidence.

28
Q

Conclusive evidence

A

Conclusive – so good, that we can adjourn court after it.

Evidence that must, as a matter of law, be taken to establish some fact in issue and that cannot be disputed. For example, the certificate of incorporation of a company is conclusive evidence of its incorporation.

29
Q

Best Evidence Rule

A

Original evidence is best - not copies.

30
Q

Parol Evidence Rule

A

Parol – Written signed agreements can only be amended by written signed agreements (not parol evidence)

31
Q

Hearsay Evidence rule

A

States that hearsay evidence shall not be permitted

32
Q

SPML

A

Provisioning protocol

Service Provisioning Markup Language is an XML-based framework, being developed by OASIS, for exchanging user, resource and service provisioning information between cooperating organizations.

33
Q

COPPA - The Children’s Online Privacy Protection Act of 1998

A

COPPA - The Children’s Online Privacy Protection Act of 1998

If you own or operate a website, you’re probably already familiar with the Children’s Online Privacy Protection Act (COPPA). This law, passed in 1998, requires that the operators of websites used by children under the age of 13 take precautionary measures to ensure the privacy of those children. After 15 years of existence, the Federal Trade Commission (FTC) recently announced new COPPA compliance rules that will go into effect beginning on July 1, 2013.

34
Q

Land Attack

A

A LAND Attack is a Layer 4 Denial of Service (DoS) attack in which, the attacker sets the source and destination information of a TCP segment to be the same. A vulnerable machine will crash or freeze due to the packet being repeatedly processed by the TCP stack.

35
Q

FISMA

A

The Federal Information Security Management Act (FISMA) was originally passed in 2002 as part of the Electronic Government Act. FISMA defines a framework of guidelines and security standards to protect government information and operations.

36
Q

FERPA

A

The Family Educational Rights and Privacy Act of 1974 is a United States federal law that governs the access to educational information and records by public entities such as potential employers, publicly funded educational institutions, and foreign governments

37
Q

Take-Grant Model

A

The Take-Grant model is another confidentiality-based model that supports four basic operations: take, grant, create, and revoke.

This model allows subjects with the take right to remove take rights from other subjects. Subjects possessing the grant right can grant this right to other subjects.

The create and revoke operations work in the same manner: Someone with the create right can give the create right to others and those with the revoke right can remove that right from others.

38
Q

What does Accountability rely on?

A

Authorization, identification, audit trails

39
Q

XTACACS

A

Extended TACACS

An alternative to RADIUS. TACACS is available in three versions: original TACACS, XTACACS (extended TACACS), and TACACS+. TACACS integrates the authentication and authorization processes. XTACACS keeps the authentication, authorization, and accounting processes separate. TACACS+ improves XTACACS by adding two-factor authentication.

40
Q

XACML - Extensible Access Control Markup Language

A

XACML is a standard language for access control that allows for communication between the access control system and implementation, even if they are from a different vendor

41
Q

Does a router perform IPv4 to IPv6 translations?

A

TECHNICALLY - no. A gateway does.

In reality - yes.

42
Q

Clipping (in log sampling)

A

Form of non-statistical sampling that reduces the amount of logs in the database, based off of thresholds.

43
Q

COBIT - Control Objectives for Information Technology

A

Framework for evaluating controls in an organization. Can be used for architecting the environment AND for auditing.

The COBIT framework specifically manages control variables within IT and how they align with business practices.