Term
|
Definition
The process of identifying the threats, vulnerabilities and impact of a loss of data or the ability to process the data. |
|
|
Term
Other names for Risk Assessment? |
|
Definition
Risk Analysis and Risk Calculation |
|
|
Term
|
Definition
Annual Loss Expectancy - monetary measure of the loss that could be expected in a year. |
|
|
Term
|
Definition
Single Loss Expectancy - monetary measure of a one time loss. |
|
|
Term
|
Definition
Asset value - part of SLE. The actual value of what is at risk. |
|
|
Term
|
Definition
Exposure Factor - part of SLE. What is the real threat of losing the asset. |
|
|
Term
|
Definition
Annualized Rate of Occurrence - likelihood of an event occurring within a year. |
|
|
Term
What is the formula for Risk Impact Calculation? |
|
Definition
|
|
Term
What are the 3 tiers of risk management? |
|
Definition
Tier 1: organization level Tier 2: mission/business process level Tier 3: information system level |
|
|
Term
|
Definition
International Organization for Standardization |
|
|
Term
|
Definition
International Electrotechnical Commission |
|
|
Term
What does FISMA stand for? |
|
Definition
Federal Information Security Management Act |
|
|
Term
What is NIST's responsibility? |
|
Definition
NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems |
|
|
Term
|
Definition
Office of Management and Budget |
|
|
Term
What is included in a risk management process? |
|
Definition
1. Framing risk 2. Assessing risk 3. Responding to risk 4. Monitoring risk |
|
|
Term
|
Definition
Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and is typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence |
|
|
Term
What does NIST stand for? |
|
Definition
National Institute for Standards and Technology |
|
|
Term
Name the 3 types of controls identified by NIST to respond to risk. |
|
Definition
- Management - Operational - Technical |
|
|
Term
List the Management Control Type responsibilities |
|
Definition
- Risk Assessment - Planning - System and Services Acquisition - Certification, Accreditation and Security Assessment |
|
|
Term
List the Operational Control Type responsibilities |
|
Definition
- Personal Security - Physical and Environmental Protection - Contingency Planning - Configuration Management - Maintenance - System and Information Integrity - Media Protection - Incident Response - Awareness and Training |
|
|
Term
List the Technical Control Type responsibilities |
|
Definition
- Identification and Authentication - Access Control - Audit and Accountability - System and Communication Protection |
|
|
Term
|
Definition
The on-going process of being prepared to deal with a situation when a risk becomes and event. |
|
|
Term
|
Definition
|
|
Term
What are the 4 components of BIA? |
|
Definition
- Identify Critical Functions - Prioritize Critical Business Functions - Calculate a Time Frame for Critical Systems Loss - Estimate the Tangible and Intangible Impact on the Organization. |
|
|
Term
|
Definition
- Authorization - Authentication - Access |
|
|
Term
|
Definition
The process of determining is someone or something is, in fact, who or what it is declared to be. |
|
|
Term
Of the 3 A's, which is the process of verifying the identification? |
|
Definition
|
|
Term
|
Definition
The process of determining what a particular identity is allowed to do. |
|
|
Term
|
Definition
The method to allow or deny access to various resources based on Authentication and Authorization. |
|
|
Term
Which "A" determines "who"? |
|
Definition
|
|
Term
Which "A" determines "what"? |
|
Definition
|
|
Term
Which "A" determines "how"? |
|
Definition
|
|
Term
What are 5 ways of authentication? |
|
Definition
1. Something you know (aka password) 2. Something you have (CAC) 3. Something you do (action on screen) 4. Something you are ... location 5. Something you are ... finger prints |
|
|
Term
What are the 3 main types of authentication? |
|
Definition
1. Single factor 2. Mutual 3. Multi-factor |
|
|
Term
|
Definition
Single Factor Authentication |
|
|
Term
|
Definition
|
|
Term
What is Mutual Authentication? |
|
Definition
When a server is authenticated in addition to the user. |
|
|
Term
What is Multi-factor Authentication? |
|
Definition
When 2 or more authentication methods are used. |
|
|
Term
What 2 objects does an OS use to enforce network and resource access? |
|
Definition
|
|
Term
|
Definition
|
|
Term
(T/F) A security token contains the rights and access privileges of a user account |
|
Definition
|
|
Term
What are 4 ways to control access to network resources |
|
Definition
- MAC - DAD - RBAC (role) - RBAC (rule) |
|
|
Term
|
Definition
|
|
Term
|
Definition
Discretionary Access Control |
|
|
Term
What do the 2 types of RBAC stand for? |
|
Definition
Rule and Role Based Access Control |
|
|
Term
|
Definition
An access control solely managed by an administrator. |
|
|
Term
|
Definition
Users can dynamically share resources with others. |
|
|
Term
Which access control is used by Unix via Owner, Group, Other? |
|
Definition
|
|
Term
Which access control is considered most secure? |
|
Definition
|
|
Term
Which access control is considered inflexible? |
|
Definition
|
|
Term
Which version of RBAC uses preconfigured security policies? |
|
Definition
Rule Based Access Control. |
|
|
Term
|
Definition
Rule Based Access Control |
|
|
Term
(T/F) Rule and Role BAC are often used together. |
|
Definition
|
|
Term
Give 5 examples of authentication protocols |
|
Definition
- PAP - CHAP - SPAP - TOTP - HOTP |
|
|
Term
|
Definition
Password Authentication Protocol |
|
|
Term
What does SPAP stand for? |
|
Definition
Shiva Password Authentication Protocol |
|
|
Term
What does CHAP stand for? |
|
Definition
Challenge Handshake Authentication Protocol |
|
|
Term
What does TOTP stand for? |
|
Definition
Time-based One Time Protocol |
|
|
Term
What does HOTP stand for? |
|
Definition
HMAC-based One Time Protocol |
|
|
Term
|
Definition
- not used because it sends username/password in the clear |
|
|
Term
|
Definition
Same as PAP, but encrypts the username/password. But uses the same reversibly encrypted form. So its susceptible to replay attack. Record the password, then resend the password to login. |
|
|
Term
What is the replay attack? |
|
Definition
Attacker captures packets and replays them to gain access to the network. |
|
|
Term
|
Definition
An authentication protocol where it periodically verifies the identity of the client by using a 3-way handshake verification process. (More like a 3-step handshake - SYN, ACK, ACK-ACK, also known as TCP handshake) |
|
|
Term
What does HMAC stand for? |
|
Definition
Hash-based Message Authentication Code |
|
|
Term
(T/F) TOTP uses a secret key |
|
Definition
|
|
Term
(T/F) HOTP uses a secret key |
|
Definition
|
|
Term
|
Definition
|
|
Term
(T/F) TOTP uses a hash function |
|
Definition
|
|
Term
What are the 7 authentication services? |
|
Definition
- RADIUS - TACACS+ - XTACACS - LDAP - Secure LDAP - SAML - Kerberos |
|
|
Term
What does RADIUS stand for? |
|
Definition
Remote Authentication Dial-In User Service |
|
|
Term
|
Definition
An authentication service where a server authenticates the user via username/password. It is a single-point of entry for a private network |
|
|
Term
Which authentication service provides centralized management for all remote connections? |
|
Definition
|
|
Term
(T/F) RADIUS server is not used anymore because it was originally used for dial-up service. |
|
Definition
|
|
Term
What does TACACS+ stand for? |
|
Definition
Terminal Access Controller Access-Control System |
|
|
Term
What does XTACACS stand for? |
|
Definition
Extended Terminal Access Controller Access-Control System |
|
|
Term
Which authentication service allows credentials to be accepted from multiple methods? |
|
Definition
|
|
Term
(T/F) TACACS+ accepts credentials from Kerberos |
|
Definition
|
|
Term
What authentication service replaced TACACS? |
|
Definition
|
|
Term
What additional services is provided by XTACACS over TACACS? |
|
Definition
Combines authentication with authorization and added logging for auditing. |
|
|
Term
What does LDAP stand for? |
|
Definition
Light-weight Directory Access Protocol |
|
|
Term
|
Definition
An authentication service where a standardized protocol is used to store information on users, systems, networks, etc. |
|
|
Term
What does LDAPS stand for? |
|
Definition
|
|
Term
|
Definition
LDAP where communication is encrypted using SSL/TLS |
|
|
Term
|
Definition
|
|
Term
What port does LDAPS use? |
|
Definition
|
|
Term
What is the most popular authentication service used today? |
|
Definition
|
|
Term
What does SAML stand for? |
|
Definition
Security Assertion Markup Language |
|
|
Term
|
Definition
An XML based open-standard data format for exchanging authentication and authorization data |
|
|
Term
Which authentication service is used for single-sign on capability from a browser? |
|
Definition
|
|
Term
Which authentication service is used for single sign-on for networks? |
|
Definition
|
|
Term
|
Definition
An authentication service where a user is given a token. This token is provided to a server (KDC). The KDC authenticates and provides a service token. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is the lifespan of a TGT |
|
Definition
|
|
Term
What is the lifespan of a service ticket? |
|
Definition
|
|
Term
What is one of the most popular authentication services? |
|
Definition
|
|
Term
What is "Least privilege"? |
|
Definition
Granting users with the least amount of privileges to do their job |
|
|
Term
What does "separation of duties" mean? |
|
Definition
Providing levels of permissions and privileges, such as: - System Administrator - local administrator - regular users - restricted users |
|
|
Term
What is "time of day restrictions"? |
|
Definition
Restricting users to login within a timeframe, such as 9-to-5. |
|
|
Term
|
Definition
Refers to the IEEE 802.11 standard for defining communication over wireless LAN. |
|
|
Term
(T/F) 802.11x allows authentication at the central authority instead of the WAP |
|
Definition
|
|
Term
|
Definition
An operating system that meets government requirements for security. |
|
|
Term
|
Definition
Common Criteria is a document listing the common set of security standards for a Trusted OS. |
|
|
Term
The CC is a joint effort between which countries? |
|
Definition
US, UK, Germany, France, Netherlands, and Canada |
|
|
Term
|
Definition
Evaluation Assurance Levels. 7 evaluation criteria in the CC |
|
|
Term
|
Definition
System operates correctly, security threats not considered serious |
|
|
Term
|
Definition
- Good design practices from product developers - Security not a priority |
|
|
Term
|
Definition
Conscientious development to establish moderate levels of security |
|
|
Term
|
Definition
- Requires security engineering based on good commercial development practices - Common benchmark for commercial systems |
|
|
Term
Most operating systems, such as, Apple OS, Windows, and Linux OS are certified at what EAL? |
|
Definition
EAL4+ (EAL4 with some aspects of EAL5) |
|
|
Term
|
Definition
- Security engineering has been implemented from early design of the OS - Requires special design considerations |
|
|
Term
|
Definition
- High level of specialized security engineering - Provides strong protection from penetration attackers |
|
|
Term
|
Definition
- Intended for extremely high levels of security - Requires extensive measuring and independent testing of every component |
|
|
Term
What are the 4 layers of TCP/IP? |
|
Definition
1. Application 2. Transport 3. Internet 4. Network access |
|
|
Term
What TCP/IP layer are HTTP and SMTP located? |
|
Definition
|
|
Term
What TCP/IP layer are TCP and UDP located? |
|
Definition
|
|
Term
What TCP/IP layer are IP, ARP, and ICMP located? |
|
Definition
|
|
Term
What TCP/IP layer deals with hardware? |
|
Definition
|
|
Term
Which TCP/IP layer is also known as the host-to-host layer? |
|
Definition
|
|
Term
What protocol name is "connectionless"? |
|
Definition
UDP - User Datagram Protocol |
|
|
Term
What does ICMP stand for? |
|
Definition
Internet Control Message Protocol |
|
|
Term
|
Definition
Address Resolution Protocol |
|
|
Term
How many ports does TCP/IP provide? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What port is used by FTP? |
|
Definition
|
|
Term
What port is used by Telnet? |
|
Definition
|
|
Term
What port is used by SMTP? |
|
Definition
|
|
Term
What port is used by TACACS? |
|
Definition
|
|
Term
What port is used by HTTPS? |
|
Definition
|
|
Term
What port is used by POP3? |
|
Definition
|
|
Term
What port is used by IMAP? |
|
Definition
|
|
Term
What are Well-Known ports? |
|
Definition
- 0-1024 - reserved for specific protocols and services - do not use these except for well-known services, such as port 143 for IMAP only |
|
|
Term
What are Registered ports? |
|
Definition
- 1024-49151 - reserved for specific services |
|
|
Term
What are Dynamic or Private ports? |
|
Definition
- 49152-65535 - Used for custom or temporary purposes |
|
|
Term
|
Definition
device that isolates one network from another |
|
|
Term
What are the 3 main firewall functions? |
|
Definition
- packet filter - proxy firewall - stateful packet inspection |
|
|
Term
What is a Packet filter firewall? |
|
Definition
- allows/denies based on port - can just drop the packet or send rejection notification packet |
|
|
Term
What is a Proxy firewall? |
|
Definition
- intermediary between 2 networks - receives request, if allowed, re-packages and forwards - hides internal IP |
|
|
Term
(T/F) Proxy firewall hides the internal IP address |
|
Definition
|
|
Term
(T/F) Proxy firewalls are more costly and complex than other solutions |
|
Definition
|
|
Term
(T/F) Proxy firewalls usually use just 1 NIC |
|
Definition
F, proxy firewalls usually use 2 NICs (Network Interface Cards) |
|
|
Term
What is a dual-homed network? |
|
Definition
- proxy firewall - 2 NICs - 1 NIC for private network - 1 NIC for public network |
|
|
Term
(T/F) Proxy firewalls often provide caching where data is returned from memory and the request never leaves the server |
|
Definition
|
|
Term
(T/F) Packet filter firewall is considered stateless |
|
Definition
|
|
Term
(T/F) Proxy firewall is considered stateless |
|
Definition
|
|
Term
|
Definition
Stateful Packet Inspection |
|
|
Term
|
Definition
- remembers aspects of the traffic - makes decision based on previous occurrences - may require complex configuration - if unsolicited packet comes from unknown IP, firewall rejects it. But if the request came from internal/private network for the same unknown IP, then the subsequent response will be allowed to enter |
|
|
Term
|
Definition
Another name for SPI firewall |
|
|
Term
|
Definition
device that connects 2 or more networks |
|
|
Term
What is the difference between a Switch and a Router |
|
Definition
Router connects networks. Switch creates networks. |
|
|
Term
|
Definition
server that acts as an intermediary for requests from clients seeking resources from other servers |
|
|
Term
How is a proxy server commonly implemented? |
|
Definition
|
|
Term
What are some other services that a proxy server provides? |
|
Definition
- caching commonly accessed resources - filtering incoming/outgoing requests - load balancing |
|
|
Term
|
Definition
Intrusion Detection System - software that monitors network traffic activity |
|
|
Term
What are the 4 types of IDS's? |
|
Definition
- Behavior-based IDS - Signature-based IDS - Anomaly-based IDS - Heuristic IDS |
|
|
Term
What type of IDS will detect unusual high traffic? |
|
Definition
|
|
Term
What type of IDS will detect policy violations? |
|
Definition
|
|
Term
What does MD-IDS stand for? |
|
Definition
Misuse Intrusion Detection System |
|
|
Term
What type of IDS is used to look at attach signatures and audit trails? |
|
Definition
|
|
Term
What is an Anomaly-based IDS? |
|
Definition
An IDS that looks for out of the ordinary things, deviated from a baseline. |
|
|
Term
|
Definition
An IDS that uses an algorithm to analyze traffic |
|
|
Term
|
Definition
Intrusion Protection System |
|
|
Term
(T/F) An IPS takes IDS to the next level |
|
Definition
|
|
Term
|
Definition
Performs IDS functionality, then takes action to block the offending traffic |
|
|
Term
(T/F) An IDS can drop packets to prevent traffic |
|
Definition
|
|
Term
|
Definition
Unified Threat Management |
|
|
Term
|
Definition
A device that provides a firewall, plus: - network intrusion prevention - gateway anti-virus scans - gateway anti-spam functionality - VPN - content filtering - load balancing - reporting |
|
|
Term
What are some advantages of a UTM? |
|
Definition
- reduced complexity of using a single box/single vendor - simplicity of single software install and maintenance - simplified management of plug-n-play - web-based GUI management - lower training required - meets most security requirements |
|
|
Term
What are some disadvantages of a UTM? |
|
Definition
- single point of failure - single point of compromise - traffic may exceed UTM's capability |
|
|
Term
(T/F) Advantages of UTM outweigh the disadvantages |
|
Definition
|
|
Term
What is a protocol analyzer? |
|
Definition
- usually software - used to capture and analyze traffic on a network |
|
|
Term
|
Definition
|
|
Term
(T/F) Protocol analyzers can be used by hackers to collect intrusion information |
|
Definition
|
|
Term
What is the best defense against a sniffer? |
|
Definition
|
|
Term
(T/F) You will still be able to see from/to IP addresses of encrypted data. |
|
Definition
|
|
Term
What's another name for "layered security"? |
|
Definition
|
|
Term
What are some of the network security levels? |
|
Definition
- Physical Security - Data Security - Network Design/Structure Security |
|
|
Term
What are some examples of Physical Security? |
|
Definition
guards, protected passwords, 2-factor authentication, card readers |
|
|
Term
What are some examples of Data Security? |
|
Definition
- Authorization/Authentication - Encryption - Tunneling |
|
|
Term
What are some examples of Network Design/Structure Security? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What's another name for DMZ? |
|
Definition
|
|
Term
(T/F) A DMZ is a separate network |
|
Definition
|
|
Term
(T/F) A DMZ is on the private network |
|
Definition
F, it is neither totally on the private or the public network. |
|
|
Term
(T/F) A DMZ protects against internal threats |
|
Definition
|
|
Term
(T/F) Routers of a VLAN will not pass broadcasts to other network segments |
|
Definition
|
|
Term
(T/F) Hosts can be in a VLAN segment regardless of physical location on the network. |
|
Definition
|
|
Term
|
Definition
Virtual Local Area Network, where hosts can be logically/virtually separated into groups on a network via software within a router. |
|
|
Term
(T/F) VLANs offer a layer of security |
|
Definition
|
|
Term
(T/F) NAT is a function of a firewall |
|
Definition
|
|
Term
|
Definition
Client request -> src=192.168.1.154/dest=72.6.8.10 -> Firewall -> src=123.123.1.2/dest=72.6.8.10 -> Destination
Destination sends response -> src=72.6.8.10/dest=123.123.1.2 -> Firewall -> src=72.6.8.10/dest=192.168.1.154 |
|
|
Term
List some examples of malware types. |
|
Definition
- spyware - adware - rootkits - trojan horses - logic bombs - backdoors - botnets - ransomeware |
|
|
Term
What is the difference between spyware and adware? |
|
Definition
They both can be just benign and just install marketing information, but spyware can install information collection to capture your passwords. |
|
|
Term
|
Definition
malware that executes when a predefined event occurs. |
|
|
Term
What is a "zombie" computer? |
|
Definition
When a malware is installed onto a computer and receives instructions from some other computer. |
|
|
Term
|
Definition
A computer that controls "zombie" computers. |
|
|
Term
|
Definition
A form of spyware that takes control of a system and demands payment before the system can be unlocked. |
|
|
Term
What are the 8 common viruses? |
|
Definition
- Armored - Companion - Macro - Multipartite - Phage - Polymorphic - Retro - Stealth |
|
|
Term
What is an Armored virus? |
|
Definition
- Made to be difficult to detect - Made to prevent examination of code - May include decoys to make analysis difficult |
|
|
Term
What is an Companion virus? |
|
Definition
- Attaches itself to a legitimate program and when launched, creates a new program with a different extension. - May make Registry changes |
|
|
Term
|
Definition
- Exploits enhancement programmability to certain applications (i.e.. macros in MS Word and Excel) - Fastest growing exploitation |
|
|
Term
What is an Multipartite virus? |
|
Definition
- attacks in multiple ways, such as, boot sector, executables, applications, ... - continues to do damage, while you deal with one aspect of the virus |
|
|
Term
|
Definition
- Modifies other programs - Can affect databases |
|
|
Term
What is an Polymorphic virus? |
|
Definition
- Can change form to avoid detection - May encrypt itself to avoid detection |
|
|
Term
What's the term used when a virus can change itself or encrypt itself? |
|
Definition
|
|
Term
|
Definition
- Attacks or bypasses the anti-virus software installed on your computer. - Attempts to destroy the anti-virus definitions |
|
|
Term
What is an Stealth virus? |
|
Definition
- Masks itself to avoid detection - May attach itself to the boot sector - May move itself from file to file during virus scan to avoid detection |
|
|
Term
What is the number one cause of failure for anti-virus software to detect an infection? |
|
Definition
|
|
Term
What are the 10 types of attacks? |
|
Definition
- DOS - Spoofing - Pharming - Phishing - Xmas - Man-in-the-middle - Replay - Smurf - Privilege Escalation - Password |
|
|
Term
|
Definition
Makes resources so busy that authorized users cannot make requests. |
|
|
Term
What is a Spoofing attack? |
|
Definition
- Capturing and modifying data on its way to a destination |
|
|
Term
What's another name for Spoofing? |
|
Definition
|
|
Term
What is a Pharming attack? |
|
Definition
Traffic intended to one host is redirected to another host |
|
|
Term
What is a Phishing attack? |
|
Definition
- Requesting information by making a request look legitimate - A form of social engineering. |
|
|
Term
|
Definition
- Phishing directed to a group or person - Messages that appear from a trusted source. |
|
|
Term
|
Definition
VOIP version of Phishing. |
|
|
Term
|
Definition
- attack using nmap (network mapping utility) - firewall/open port attack |
|
|
Term
What is "Man-in-the-middle" attack? |
|
Definition
- rogue router or software placed between a server and a host - forwards data to attacker |
|
|
Term
|
Definition
- data is captured and replayed later. - for example, capture a user's username/password, then later that evening, replay it to login. |
|
|
Term
|
Definition
- spoof target computer's IP and begin issuing broadcast using that IP - network becomes overloaded |
|
|
Term
What is a Privilege Escalation attack? |
|
Definition
- attacker gains more privilege than they should have |
|
|
Term
(T/F) Privilege Escalation attack is usually associated with a backdoor |
|
Definition
|
|
Term
What is a Password attack? |
|
Definition
when an account is attacked repeatedly in order to crack the password |
|
|
Term
What are 5 variations of the Password attack? |
|
Definition
- Brute-Force attack - Dictionary attack - Hybrid attack - Birthday attack - Rainbow attack |
|
|
Term
What is a Brute-Force attack? |
|
Definition
- type of Password attack - attacker guesses passwords until successful |
|
|
Term
What is a Dictionary attack? |
|
Definition
- type of Password attack - similar to Brute-Force attack - attacker uses dictionary words to guess password until successful |
|
|
Term
|
Definition
- type of Password attack - combination of Brute-Force and Dictionary attack |
|
|
Term
What is a Birthday attack? |
|
Definition
- type of Password attack - attempt to create the same hash used in the authentication process - statistically speaking, the more people you have in the room, the likelihood of people with the same hash gets higher |
|
|
Term
What is a Rainbow attack? |
|
Definition
- type of Password attack - Compares values in an existing table of hashed phrases or words to a password hash |
|
|
Term
What is the most dangerous and difficult security risk to identify and control? |
|
Definition
|
|
Term
What is a Client-side attack? |
|
Definition
attacks on a client machine, usually malware |
|
|
Term
What is "Typo Squatting"? |
|
Definition
Registering domain names that are common misspellings of valid URLs |
|
|
Term
|
Definition
|
|
Term
What is a "Watering Hole" attack? |
|
Definition
Poisoning a site that is frequently visited, such as, hosted email sites |
|
|
Term
What is a "Transitive Access" attack? |
|
Definition
Takes advantage of transitive access (A trusts B and B trusts C, therefor A trusts C). Attacks on C now has access to A & B, not just B. |
|
|
Term
(T/F) Transitive access can be granted to domains |
|
Definition
|
|
Term
What are the 9 examples of application attacks? |
|
Definition
- XSS - SQL Injection - LDAP Injection - XML Injection - Directory Traversal/Command Injection - Buffer Overflow - Integer Overflow - Zero-day Exploits - Cookies and Attachments |
|
|
Term
|
Definition
|
|
Term
|
Definition
- attacker injects client side code into a web page |
|
|
Term
|
Definition
- SQL is injected into data that is entered on a webpage - data is sent to database and run as SQL, not entered as data. |
|
|
Term
What is "LDAP Injection"? |
|
Definition
Similar to SQL Injection, but using LDAP code injection |
|
|
Term
|
Definition
Similar to SQL Injection, but using XML path queries. |
|
|
Term
What is Directory Traversal/Command Injection attack? |
|
Definition
- Attacker gains access to restricted directories, such as the root directory - Injecting OS commands into requested data. |
|
|
Term
What is a Buffer Overflow attack? |
|
Definition
Sending more data than a program is capable of accepting |
|
|
Term
(T/F) When an application errors due to Buffer Overflow attack, the error message can contain private information |
|
Definition
|
|
Term
What is an Integer Overflow attack? |
|
Definition
Similar to Buffer Overflow, but sending an integer that's too large. |
|
|
Term
What is a Zero-day Attack? |
|
Definition
Attack on a security hole before a patch is released. |
|
|
Term
(T/F) Zero-day attack occurs often with web browsers |
|
Definition
|
|
Term
What is a Cookies/Attachments attack? |
|
Definition
Additional information saved to be retrieved later. This data can be exploited later. |
|
|
Term
List 4 wireless networking standards |
|
Definition
- 802.11a - 802.11b - 802.11g - 802.11n |
|
|
Term
|
Definition
- Frequency: 5 GHz - Speed: up to 54 Mbps - Max range: 150 feet - Required WAP and NIC be 802.11a compliant |
|
|
Term
(T/F) 802.11a was widely accepted |
|
Definition
F, not widely accepted due to the range limitation of 150 ft |
|
|
Term
(T/F) 802.11a was the first standard for wireless networking |
|
Definition
|
|
Term
What are the 802.11b specs? |
|
Definition
- Frequency: 2.4 GHz - Speed: 11 Mbps - Max range: 300 feet |
|
|
Term
What are the 802.11g specs? |
|
Definition
- Frequency: 2.4 GHz - Speed: 54 Mbps - Max range: 300 feet |
|
|
Term
(T/F) 802.11g is backward compatible with 802.11a |
|
Definition
F, it's compatible with 802.11b |
|
|
Term
What does MIMO stand for? |
|
Definition
Multiple In, Multiple Out |
|
|
Term
|
Definition
- Frequency: 2.4 and 5 GHz - Speed: Theoretical 600 Mbps, Normal 100 Mbps - Max range: 300 feet - Supports MIMO with multiple antennas |
|
|
Term
(T/F) 802.11n is backward compatible with 802.11g, 802.11b, and sometimes 802.11a |
|
Definition
|
|
Term
List 3 wireless encryption types. |
|
Definition
|
|
Term
|
Definition
- Wireless Access Point - Wireless Application Protocol |
|
|
Term
|
Definition
Wired Equivalency Privacy |
|
|
Term
(T/F) WEP is highly used today |
|
Definition
F, extremely vulnerable to attack |
|
|
Term
|
Definition
- 40 bit encryption - some vendors provided 104 bit encryption |
|
|
Term
|
Definition
|
|
Term
(T/F) WPA is widely used today |
|
Definition
|
|
Term
|
Definition
- Addressed security of WEP - Has weaknesses - Added user authentication - Uses TKIP - Based on 802.1x and EAP - Depends on authentication server, like RADIUS |
|
|
Term
What does TKIP stand for? |
|
Definition
Temporal Key Integrity Protocol |
|
|
Term
|
Definition
Extensible Authentication Protocol |
|
|
Term
|
Definition
- Wifi Protected Access 2 - Uses AES |
|
|
Term
(T/F) WPA is currently the most secure wireless networking protocol |
|
Definition
|
|
Term
What is Wireless Application Protocol? |
|
Definition
- wireless data transmission standard designed to provide wireless networking for wireless devices - TCP/IP for wireless devices - Uses WML - Uses WMLScript |
|
|
Term
|
Definition
- Wireless Markup Language - HTML for wireless devices |
|
|
Term
|
Definition
- Scripting language for wireless devices |
|
|
Term
|
Definition
- Protocol for wireless networks - Expands on PPP authentication - Used to connect computer to Internet |
|
|
Term
|
Definition
|
|
Term
|
Definition
- EAP-TLS - EAP-PSK - EAP-MD5 - LEAP - PEAP |
|
|
Term
What does LEAP stand for? |
|
Definition
|
|
Term
(T/F) LEAP is preferred over PEAP |
|
Definition
|
|
Term
What does PEAP stand for? |
|
Definition
|
|
Term
|
Definition
An authentication protocol that establishes an encrypted channel between the server and client |
|
|
Term
What is considered the strongest version of EAP? |
|
Definition
|
|
Term
What are the 5 main wireless attack types? |
|
Definition
- Rogue access point - Jamming - Interference - Evil twin - Replay attack |
|
|
Term
What is a Rogue Access Point attack? |
|
Definition
- unauthorized Wireless Access Point - used for man-in-the-middle attack |
|
|
Term
What's the difference between Jamming and Interference? |
|
Definition
Interference is unintentional |
|
|
Term
|
Definition
A rogue access point used for phishing attacks |
|
|
Term
What is Application Hardening? |
|
Definition
Ensuring Applications are updated and configured correctly for secure operation. |
|
|
Term
What are the 3 database tier models? |
|
Definition
- One tier: db and apps on one server - Two tier: apps on client machine, and db on a server - Three tier: client, server, db machines |
|
|
Term
What are the 3 types operating system patches? |
|
Definition
- Service Pack - Patch - Hotfix |
|
|
Term
|
Definition
- Cumulative updates designed to correct known issues - Should be tested before applied. - Should be applied as soon as possible |
|
|
Term
|
Definition
- Provides additional functionality or non-urgent fix - Often optional |
|
|
Term
|
Definition
- urgent fix for security flaw - not optional - apply ASAP |
|
|
Term
(T/F) Application level updates are kept more up to date than OS level updates |
|
Definition
|
|
Term
What does OWASP stand for? |
|
Definition
Open Web Application Security Project |
|
|
Term
What does CERT stand for? |
|
Definition
Computer Emergency Response Team |
|
|
Term
(T/F) The entire network is only as strong as its weakest host |
|
Definition
|
|
Term
What are the 2 ways to establish and maintain security? |
|
Definition
- keep hosts updated with malware protection - keep hosts at an established security baseline |
|
|
Term
|
Definition
|
|
Term
What are 5 file permission levels? |
|
Definition
- Full Control - Modify - Read and Execute - Read - Write |
|
|
Term
What does Full Control on a file mean? |
|
Definition
- Read, Write, Execute, Modify, and assign permissions to other users |
|
|
Term
What is the one additional permission assigned to folders? |
|
Definition
|
|
Term
What's another name for security baseline? |
|
Definition
Performance baseline, and sometimes, software baseline |
|
|
Term
What is a Security Baseline Analyzer? |
|
Definition
a software tool that scans computers and creates security report |
|
|
Term
(T/F) Users should have minimum required permissions |
|
Definition
T (note the word "required") |
|
|
Term
What does DHCP stand for? |
|
Definition
Dynamic Host Control Protocol |
|
|
Term
(T/F) DHCP is an authenticated protocol |
|
Definition
|
|
Term
|
Definition
|
|
Term
What are 3 main attacks on a DNS? |
|
Definition
- DOS - Network Footprinting - DNS Poisoning |
|
|
Term
|
Definition
- Compromising record integrity - changing DNS names to point to wrong IPs |
|
|
Term
|
Definition
|
|
Term
|
Definition
Domain Name System Security Extensions. It is additional protocol added to DNS to add security. It adds authentication, data integrity, and authenticated denial of existence |
|
|
Term
|
Definition
|
|
Term
What does IETF stand for? |
|
Definition
Internet Engineering Task Force |
|
|
Term
|
Definition
|
|
Term
What does it mean to "Authorize" a DHCP server |
|
Definition
To enable DHCP on that server. Also known as "Activating" a DHCP server. |
|
|
Term
How can fault tolerance be implemented? |
|
Definition
- Data backups - Data management (e.g.. RAID) - Clustering - Load Balancing |
|
|
Term
What is the most important part of a PC? |
|
Definition
|
|
Term
What does RAID stand for? |
|
Definition
Redundant Array of Independent Disks |
|
|
Term
(T/F) RAID is always hardware based |
|
Definition
F, it can be hardware or software based |
|
|
Term
|
Definition
- offers striping - not fault tolerant |
|
|
Term
|
Definition
|
|
Term
|
Definition
When data is broken up into separate blocks and written to multiple disks at the same time. Makes for fast writing. Also known as disk striping |
|
|
Term
|
Definition
- offers disk mirroring - is fault tolerant |
|
|
Term
What's it the disadvantage of RAID 1? |
|
Definition
Unable to use full purchased disk space because half is used for fault tolerance. |
|
|
Term
Is RAID 1 fault tolerant? |
|
Definition
|
|
Term
|
Definition
- offers striping with parity - 3 or more disks |
|
|
Term
How many disks, at a minimum, are in RAID 5? |
|
Definition
|
|
Term
What are the different clustering modes? |
|
Definition
- Active clustering - Passive clustering |
|
|
Term
What is Active clustering? |
|
Definition
- All nodes in the cluster are providing services - If one node fails, the other node provides all services - Performance may be reduced until failed node is back online |
|
|
Term
What is Passive clustering |
|
Definition
- Only one node provides services - Other node provides services if active node fails |
|
|
Term
(T/F) clustering can be expensive due to knowledge and attention |
|
Definition
|
|
Term
What are the 3 types of backup? |
|
Definition
- Full backup - Differential backup - Incremental backup |
|
|
Term
|
Definition
Every file has an archive bit set to 0 or 1. 0 means the data has been backed up and has not been modified since the last backup. 1 means it has been modified since the last backup |
|
|
Term
Which type of backup takes the longest? |
|
Definition
|
|
Term
Which type of backup is easiest to use for data recovery? |
|
Definition
|
|
Term
|
Definition
All files are backed up and archive bits set to 0 |
|
|
Term
What is a Differential backup? |
|
Definition
Makes a copy of all files that have been modified since the last full backup. Looks for the archive bit set to 1. |
|
|
Term
(T/F) Differential backup requires a full backup. |
|
Definition
|
|
Term
(T/F) Differential backup sets the archive bit back to 0 |
|
Definition
|
|
Term
(T/F) Full backup sets the archive bit back to 0 |
|
Definition
|
|
Term
(T/F) If a full backup was done on Sunday, and a daily differential backup is performed, and a failure occurs on Thursday morning, restoring the full backup and Wednesday's differential will recover all data. |
|
Definition
|
|
Term
(T/F) As more and more modifications occur, each differential backup gets bigger and takes longer. |
|
Definition
|
|
Term
(T/F) An Incremental backup does not need a full backup. |
|
Definition
F, a full backup needs to be performed to create the baseline for incremental backups. |
|
|
Term
What is an Incremental backup? |
|
Definition
Makes a copy of all files that have been modified since the last full backup. Looks for the archive bit set to 1. |
|
|
Term
(T/F) An Incremental backup sets the archive bit back to 0 |
|
Definition
|
|
Term
(T/F) If a full backup was done on Sunday, and a daily incremental backup is performed, and a failure occurs on Thursday morning, restoring the full backup and Wednesday's incremental will recover all data. |
|
Definition
F, need to restore full, then each incremental backup since the full backup |
|
|
Term
Which backup type is the fastest? |
|
Definition
|
|
Term
Which backup type is the slowest and most complex recovery type? |
|
Definition
|
|
Term
What are the 4 types of clouds? |
|
Definition
- Private - Public - Community - Hybrid |
|
|
Term
Which organization defined the cloud types? |
|
Definition
|
|
Term
(T/F) A private cloud can be on or off premise |
|
Definition
|
|
Term
(T/F) A private cloud does not need to be internet based |
|
Definition
T, it could consist of an organization's internal networks. |
|
|
Term
|
Definition
A cloud infrastructure dedicated to the organization and not shared with others. |
|
|
Term
(T/F) Private clouds are more vulnerable to security issues than Public clouds |
|
Definition
|
|
Term
|
Definition
Cloud infrastructure made available to the general public. |
|
|
Term
What is a Community cloud? |
|
Definition
Multiple organizations sharing a cloud infrastructure due to common needs. |
|
|
Term
|
Definition
Composition of 2 or more cloud types (private, public, community) |
|
|
Term
Which cloud type requires the most administrative overhead and security? |
|
Definition
|
|
Term
What are the 3 cloud based service models defined by NIST? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Software as a Service where software is runnable via a cloud service. |
|
|
Term
|
Definition
Platform as a Service where applications are deployed onto a cloud infrastructure. |
|
|
Term
(T/F) PaaS allows cloud infrastructure to be managed |
|
Definition
|
|
Term
(T/F) PaaS allows for applications to be managed |
|
Definition
|
|
Term
(T/F) SaaS allows for applications to be managed. |
|
Definition
|
|
Term
|
Definition
Infrastructure as a Service where cloud services, such as, processing, storage, and networks are provisioned. |
|
|
Term
(T/F) IaaS allows operating systems and arbitrary applications to be managed by the cloud |
|
Definition
|
|
Term
(T/F) In IaaS, the customer manages the cloud infrastructure |
|
Definition
F, customer does not manage any cloud infrastructure. In IaaS, the cloud provisions services. The infrastructure is still managed by the cloud provider. |
|
|
Term
What are the 2 main security concerns with cloud computing? |
|
Definition
- multi-tenancy - laws and regulations |
|
|
Term
Explain multi-tenancy concerns. |
|
Definition
- different clients' data co-exist on the same machine - data separation controlled by configuration of cloud infrastructure - so your data could be at risk by other clients or by cloud provider - you must also protect your data from other cloud consumers |
|
|
Term
Explain laws and regulation concerns pertaining to the cloud. |
|
Definition
- cloud consumer retains the responsibility for legal compliance - cloud removes a lot of control over your data |
|
|
Term
(T/F) Cloud consumer retains the responsibility for legal compliance |
|
Definition
|
|
Term
(T/F) Cloud provider retains the responsibility for legal compliance |
|
Definition
|
|
Term
(T/F) Data placed in the cloud should be backed up locally |
|
Definition
|
|
Term
What is Social Engineering? |
|
Definition
Exploiting the trusting nature of people to gain information or access |
|
|
Term
(T/F) Social engineering can be done over email. |
|
Definition
|
|
Term
What are the 7 common social engineering attack types. |
|
Definition
- shoulder surfing - dumpster diving - tailgating - impersonation - hoaxes - whaling - vishing |
|
|
Term
(T/F) Shoulder surfing includes reading information on desks. |
|
Definition
|
|
Term
(T/F) Green initiatives can increase exposure of secure data. |
|
Definition
T, like putting secure documents for recycling instead of burning. |
|
|
Term
(T/F) Impersonation can be in person or via email. |
|
Definition
|
|
Term
What's the difference between Vishing and phishing over the phone? |
|
Definition
- VOIP has no caller ID, tracing, or other land-line related features. (may not be true, but this is what the exam says) |
|
|
Term
What is the best defense against social engineering? |
|
Definition
|
|
Term
With respect to social engineering, what is "consensus" or "social proof"? |
|
Definition
- playing on people's desire to be right - overly polite or encouraging |
|
|
Term
With respect to social engineering, what is "scarcity"? |
|
Definition
Convincing someone to act quickly due to limited opportunity. |
|
|
Term
With respect to social engineering, what is "urgency"? |
|
Definition
- similar to scarcity but with respect to time. |
|
|
Term
With respect to social engineering, what is "familiarity"? |
|
Definition
- mental guards are lowered when you like someone. - you like someone because they compliment you or do you favors. - you like someone with common interests, common job aspects, etc |
|
|
Term
With respect to social engineering, what is "trust"? |
|
Definition
- Providing information, assistance, or service that implies reciprocation is proper. - I do something for you, then you should do something for me. |
|
|
Term
What protocol is used by FTP? |
|
Definition
|
|
Term
What protocol is used by SSH? |
|
Definition
|
|
Term
What protocol is used by SFTP? |
|
Definition
|
|
Term
What protocol is used by SCP? |
|
Definition
|
|
Term
What protocol is used by TFTP? |
|
Definition
|
|
Term
What protocol is used by FTPS? |
|
Definition
|
|
Term
What protocol is used by SMTP? |
|
Definition
|
|
Term
What protocol is used by POP3? |
|
Definition
|
|
Term
What protocol is used by IMAP4? |
|
Definition
|
|
Term
What protocol is used by Telnet? |
|
Definition
|
|
Term
What protocol is used by TACACS? |
|
Definition
|
|
Term
What protocol is used by TACACS+? |
|
Definition
|
|
Term
What protocol is used by SSL? |
|
Definition
|
|
Term
What protocol is used by L2TP? |
|
Definition
|
|
Term
What protocol is used by PPTP? |
|
Definition
|
|
Term
What protocol is used by RDP? |
|
Definition
|
|
Term
What protocol is used by DNS? |
|
Definition
|
|
Term
What protocol is used by DHCP? |
|
Definition
|
|
Term
What protocol is used by HTTP? |
|
Definition
|
|
Term
What protocol is used by HTTPS? |
|
Definition
|
|
Term
What protocol is used by Kerberos? |
|
Definition
|
|
Term
What protocol is used by NNTP? |
|
Definition
|
|
Term
What protocol is used by SNMP? |
|
Definition
|
|
Term
What protocol is used by LDAP? |
|
Definition
|
|
Term
What port is used by SSH? |
|
Definition
|
|
Term
What port is used by SFTP? |
|
Definition
|
|
Term
What port is used by SCP? |
|
Definition
|
|
Term
What port is used by TFTP? |
|
Definition
|
|
Term
What port is used by FTPS? |
|
Definition
|
|
Term
What port is used by L2TP? |
|
Definition
|
|
Term
What port is used by PPTP? |
|
Definition
|
|
Term
What port is used by RDP? |
|
Definition
|
|
Term
What port is used by DNS? |
|
Definition
|
|
Term
What port is used by DHCP? |
|
Definition
|
|
Term
What port is used by DHCP? |
|
Definition
|
|
Term
What port is used by Kerberos? |
|
Definition
|
|
Term
What port is used by NNTP? |
|
Definition
|
|
Term
What port is used by NNTP? |
|
Definition
|
|
Term
What port is used by SNMP? |
|
Definition
|
|
Term
|
Definition
Physical security where a locked door allows a person to enter, but the exit door is also a locked door and will not unlock until entrance door is closed and the person is authorized |
|
|
Term
|
Definition
Science of altering data to make it unreadable to anyone who does not possess the decryption method |
|
|
Term
|
Definition
Method used to hide characters to hide their value |
|
|
Term
|
Definition
Process of using a cipher |
|
|
Term
|
Definition
Process of hiding a message in a medium, such as digital image, audio, or other file |
|
|
Term
What is symmetric cryptography? |
|
Definition
Data is encrypted and decrypted based on the same secret key |
|
|
Term
What type of cryptography is where both sender and receiver have the same key? |
|
Definition
|
|
Term
What types of ciphers are used by symmetric cryptography |
|
Definition
|
|
Term
What's the difference between block and stream ciphers |
|
Definition
block works on data chunks. stream works on each bit. |
|
|
Term
Which type of cryptography is faster to encrypt/decrypt? |
|
Definition
|
|
Term
(T/F) Symmetric cryptography is not as strong as asymmetric cryptography. |
|
Definition
F, it's just as strong, but not as secure. |
|
|
Term
(T/F) Symmetric cryptography is not as secure as asymmetric cryptography. |
|
Definition
|
|
Term
What is asymmetric cryptography? |
|
Definition
Uses 2 keys. One for encryption and the other for decryption. Keys are known as public and private keys. Sender and receiver have different keys. |
|
|
Term
What are the 3 characteristics of a cryptographic hash? |
|
Definition
- must be one way - variable length input produces fixed length output - algorithm must have few or no collisions |
|
|
Term
What is a hashing algorithm collision? |
|
Definition
2 different inputs create the same output |
|
|
Term
|
Definition
Public Key Infrastructure |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption |
|
|
Term
|
Definition
Registration Authority, not Recovery Agent |
|
|
Term
|
Definition
PKI role that assures valid and correct registration. Sometimes called a subordinate CA |
|
|
Term
|
Definition
|
|
Term
|
Definition
A third party that can provide entity (person/business providing PKI certificate) information on behalf of the CA |
|
|
Term
(T/F) The private key is always used to encrypt and the public key is always used to decrypt |
|
Definition
F, if public key encrypts and private key decrypts, then it is a key exchange operation. if private key encrypts and public key decrypts, its a digital signature operation |
|
|
Term
|
Definition
authentication and confidentiality |
|
|
Term
|
Definition
Certificate Revocation List |
|
|
Term
(T/F) The CRL can have suspended and expired certificates |
|
Definition
|
|
Term
What is a Recovery Agent? |
|
Definition
live person a couple people that recover lost keys. |
|
|
Term
(T/F) Recovery Agent is mandatory |
|
Definition
F, if key is lost, just need to add it to the CRL and a new key created. |
|
|
Term
|
Definition
- Agency or key archival system where copy or copies of your private key(s) are kept - May have several databases containing parts of the private key - Not available to Recover Agent. - Available for law enforcement with warrant |
|
|
Term
(T/F) Key Escrow is mandatory |
|
Definition
|
|
Term
(T/F) Digital certificates verify the owner of the private key |
|
Definition
F, verifies owner of public key |
|
|
Term
|
Definition
Verifies the key owner's identity and sends it to the CA to issue the certificate |
|
|
Term
What is the set of standards for PKI? |
|
Definition
|
|
Term
What is the current version for X.509 certificates? |
|
Definition
|
|
Term
What is the current version for X.509 CRL? |
|
Definition
|
|
Term
What's in a X.509 certificate? |
|
Definition
- digital signature - version - serial number - signature algorithm ID - issuer name - validity period - subject name - subject public key information - issuer unique identifier - subject unique identifier |
|
|
Term
|
Definition
Certificate Signing Request |
|
|
Term
(T/F) The RA can issue certificates to offload the workload from the CA |
|
Definition
F, only the CA can issue certificates |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
(T/F) SSL uses asymmetric and symmetric encryption |
|
Definition
T, asymmetric to establish connection, then symmetric for communication |
|
|
Term
|
Definition
|
|
Term
|
Definition
software based encryption |
|
|
Term
|
Definition
hardware based encryption |
|
|
Term
What does it mean to have a NIC in "promiscuous" mode? |
|
Definition
NIC reads every packet even if its not addressed to that NIC |
|
|
Term
What are the 2 Event logs in Windows? |
|
Definition
Application and Security logs |
|
|
Term
What are 6 main aspects of the OS to harden. |
|
Definition
- Services - Management Tools/Applications - Software - Patches - User Access Control - File system |
|
|
Term
|
Definition
computer system designed to be attacked |
|
|
Term
What are 2 forms of detection-style security? |
|
Definition
|
|
Term
|
Definition
- often used interchangeably with honey-pot - used to slow attack, not contain attack |
|
|
Term
What are 2 legal considerations of using a honey-pot? |
|
Definition
|
|
Term
(T/F) Enticement is legal in the US |
|
Definition
|
|
Term
(T/F) Entrapment is legal in the US |
|
Definition
|
|
Term
What is a false positive? |
|
Definition
An alert that is not a security issue |
|
|
Term
What is a false negative? |
|
Definition
No alert that should have been |
|
|
Term
What are the 3 classifications of information? |
|
Definition
- Public - Private or Internal - Restricted |
|
|
Term
What is Limited Distribution? |
|
Definition
Public information except for some of it. |
|
|
Term
What does Full Distribution mean? |
|
Definition
Public information made available to the general public |
|
|
Term
What is Restricted Information? |
|
Definition
Information that could seriously damage an organization if disclosed. |
|
|
Term
What are the 3 concepts concerning information access? |
|
Definition
- Confidentiality - Integrity - Availability |
|
|
Term
|
Definition
- Confidentiality - Integrity - Availability |
|
|
Term
|
Definition
- Health Insurance Portability and Accountability Act - Mandates standards and procedures for the storage, use, and transmission of personal medical information |
|
|
Term
What is the Gramm-Leach-Bliley Act? |
|
Definition
- Also known as the Financial Modernization Act of 1999 - Requires financial institutions to develop privacy notices and to notify customers that they are entitled to privacy - Can't release info w/o customer permission |
|
|
Term
What is the Computer Fraud and Abuse Act? |
|
Definition
- Allows FBI to prosecute hackers, spammers, and others like terrorists. - Protects government and financial institutions from intrusion |
|
|
Term
What is the Family Educational Rights and Privacy Act? |
|
Definition
- Prevents educational institutions from releasing information to unauthorized parties without the student's or student's parents permission (only if minor) - institution must disclose student records to the student |
|
|
Term
What is the Computer Security Act of 1987? |
|
Definition
- Requires Federal agencies to identify and protect systems that store sensitive information - Provide regular training for employees. - Provide audits to protect data privacy |
|
|
Term
What is the Cyberspace Electronic Security Act? |
|
Definition
Gives law enforcement the right to gain access to encryption keys and cryptography methods |
|
|
Term
What is the Cyber Security Enhancement Act? |
|
Definition
Allows Federal agencies access to ISPs and other data transmission facilities to monitor communications of individuals suspected of committing computer crimes using the Internet. |
|
|
Term
|
Definition
- The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 - Gives the US Government extreme latitude in pursuing criminals who commit terrorist acts. |
|
|
Term
What is an Interoperability Agreement |
|
Definition
Agreements between multiple companies working together to determine things like data ownership and data management responsibilities |
|
|
Term
What are the 4 documents that need to be in an Interoperability Agreement? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Memorandum of Understanding |
|
|
Term
|
Definition
Interconnection Security Agreement |
|
|
Term
|
Definition
Defines the level of service provided |
|
|
Term
|
Definition
- Usually applies to Government agencies - Agreement for ongoing purchases and services between Government agencies and private companies |
|
|
Term
|
Definition
A brief summary of the responsibilities of each company |
|
|
Term
|
Definition
Documents the technical requirements of the connected systems |
|
|
Term
What is meant by Storage Segmentation? |
|
Definition
- Storing data in separate storage areas. - Makes encryption faster and more efficient |
|
|
Term
What is meant by Device Access Control? |
|
Definition
Limiting the number of devices provided to employees. |
|
|
Term
|
Definition
|
|
Term
(T/F) Disaster Recovery Plan is part of the BCP |
|
Definition
|
|
Term
|
Definition
Incident Response Policies |
|
|
Term
What are the 5 steps in an Incident Response? |
|
Definition
- Identify - Investigate - Repair - Document - Procedural Adjustments |
|
|
Term
|
Definition
|
|
Term
|
Definition
Maximum amount of time a resource can be down |
|
|
Term
What does MTBF stand for? |
|
Definition
Mean Time Between Failure |
|
|
Term
|
Definition
Life expectancy of hardware |
|
|
Term
What does MTTR stand for? |
|
Definition
Mean Time to Restore or Repair |
|
|
Term
|
Definition
How long it takes to repair |
|
|
Term
What are the 3 things in an SLA? |
|
Definition
|
|
Term
|
Definition
It's an agreement between vendors as to responsibilities of source code |
|
|
Term
What are 3 classifications of security testing? |
|
Definition
- Black box - White box - Gray box |
|
|
Term
What is Black Box Testing? |
|
Definition
Tester has no knowledge of the system and functions like an outside attacker |
|
|
Term
What is White box testing? |
|
Definition
- Tester is familiar with the system - Similar to rogue employee |
|
|
Term
What is Gray box testing? |
|
Definition
Tester has limited knowledge of the system |
|
|
Term
What are 2 ways of security testing? |
|
Definition
- Non-intrusive - Intrusive |
|
|
Term
What is Non-intrusive testing? |
|
Definition
- passive testing - non-disruptive - weaknesses not exploited |
|
|
Term
What is intrusive testing? |
|
Definition
- identify and exploit weaknesses - systems are penetrated - not done during normal operations |
|
|
Term
|
Definition
Nonrepudiation is the assurance that someone cannot deny something. Typically, nonrepudiation refers to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. |
|
|