Weak Spots Flashcards
(35 cards)
SAML
Used to exchange authentication and authorization information between federated organizations; often SSO
SPML
Service Provisioning Markup Language. Designed for exchanging user information for federated identity SSO purposes; can display LDAP based directory information in XML format.
SPML is used to provision users, resources, and services, not for authentication and authorization
Type 4 Authentication
Somewhere you are (IP/MAC address)
Type 5 Authentication
Something you do (signature, pattern unlock)
Due Care
Due care principle states that an individual should react in a situation using the same level of care that would be expected from any reasonable person.
Due Diligence
Due diligence is more specific than due care; states that an individual assigned a responsibility should exercise due care to complete it accurately in a timely manner
SOC 1
Financial audit report; has Type 1 and Type 2.
“focuses guidance for auditors assessing financial statement controls at service organizations”; internal use
SOC 2
IT security audit report; has Type 1 and Type 2; available to management and others under strict NDA–not widely public
SOC 3
More generalized, less sensitive version of SOC 2 IT security audit report ; public facing document, sanitized
Atomicity
All or nothing; if part fails, the entire tx must fail and roll back
Consistency
Rules must be all still in tact after a tx
Isolation
Txs operate separately from each other. One tx must complete in its entirety, before the next is allowed to modify the same data
Durability
One a tx is committed to a db, it must be preserved, by way of backup mechanisms such as tx logs
Confusion
Relationship between key and ciphertext. One bit change in key should cause 50% change in ciphertext
Diffusion
Relationship between plain text and cipher text. One bit change in plain text should cause 50% change in ciphertext
SOC (#) Type 1
Describes controls and provides auditors opinion based on that description. Covers a single point in time and does not involve actual testing of the controls
SOC (#) Type 2
Covers a minimum 6 month point in time and includes opinion of auditor about effectiveness based on ACTUAL testing
SDLC (First half)
1) Project initiation and planning; 2) Functional requirements definition; 3) System design specification
SDLC (Second half)
4) Development and implementation; 5) Documentation and common program controls; 6) Testing and evaluation (which includes certification and accreditation); 7) Transition to production / implementation
Swapping
Moving entire process from memory to disk
Paging
Moving fixed-length blocks of memory to disk
DARPA TCP/IP Model Layers To to Bottom
Application / Host-to-host Transport / Internet / Network access
What layers are segements, packets, frames, and bits at
Transport/segments Network/packet Datalink/frames Physical/bits
GDPR provisions
data breach notification in 72 hours; each member nation must create a centralized data protection authority; individuals must have access to their own data; information must be transferrable; individuals have right to be forgotten / have information deleted