Searching...
Flashcards in this deck (703)
  • What are the categories of security controls?

    • Technical controls
    • Managerial controls
    • Operational controls
    • Physical controls
    security controls
  • What do technical controls include?

    • Operating system controls
    • Firewalls
    • Anti-virus
    security technical
  • What are managerial controls?

    • Security policies
    • Standard operating procedures
    security managerial
  • What are operational controls?

    • Implemented by people
    • Security guards
    • Awareness programs
    security operational
  • What do physical controls limit?

    • Physical access
    • Guard shacks
    • Fences
    • Locks
    • Badge readers
    security physical
  • What is the purpose of preventive controls?

    • Block access to a resource
    security preventive
  • What are examples of deterrent controls?

    • Application splash screens
    • Posted warning signs
    security deterrent
  • What do detective controls do?

    • Identify and log an intrusion attempt
    security detective
  • What are corrective controls used for?

    • Apply a control after an event has been detected
    security corrective
  • What are compensating controls?

    • Control using other means when existing controls aren’t sufficient
    security compensating
  • What is the CIA Triad?

    • Confidentiality
    • Integrity
    • Availability
    security cia
  • What does confidentiality prevent?

    Unauthorized disclosure of information

    security confidentiality
  • What is integrity in security?

    Data can't be modified without detection

    security integrity
  • What does availability ensure?

    Systems and networks must be operational

    security availability
  • What is the role of encryption?

    Encode messages for authorized access only

    security encryption
  • What does hashing do?

    Map data of arbitrary length to fixed length

    security hashing
  • What are digital signatures used for?

    Verify the integrity of data

    security digital
  • What does availability ensure?

    Information is accessible to authorized users.

    security availability
  • What is redundancy in services?

    Build services that will always be available.

    security redundancy
  • What does fault tolerance mean?

    System continues to run even when a failure occurs.

    security fault_tolerance
  • What is the purpose of patching?

    Stability and closing security holes.

    security patching
  • What is non-repudiation?

    You can’t deny what you’ve said; there's no taking it back.

    security non-repudiation
  • How does a signature add non-repudiation?

    It proves you really did sign the contract.

    security signature
  • What is proof of integrity?

    Verify data does not change; remains accurate and consistent.

    security integrity
  • What is a hash in cryptography?

    Represents data as a short string of text; a fingerprint.

    security hashing
  • What happens if the data changes?

    The hash changes, indicating data integrity is compromised.

    security data_integrity
  • What does proof of origin ensure?

    Proves the message was not changed and authenticates the source.

    security proof_of_origin
  • How is a digital signature created?

    Hash the original plaintext and encrypt it with a private key.

    security digital_signature
  • What is the AAA framework?

    Identification, Authentication, Authorization, and Accounting.

    security aaa
  • What is identification in the AAA framework?

    This is who you claim to be, usually your username.

    security identification
  • What does authentication verify?

    Proves you are who you say you are, using passwords and factors.

    security authentication
  • What does authorization determine?

    What access you have based on your identification and authentication.

    security authorization
  • What does accounting track?

    Resources used, such as login attempts.

    security accounting
  • What are the three main components of security?

    • Authentication
    • Authorization
    • Accounting
    security components
  • What does authentication verify?

    • Who you say you are
    • Password and other factors
    authentication security
  • What is the purpose of authorization?

    To determine access rights based on identification and authentication.

    authorization security
  • What does accounting track in security?

    • Login time
    • Data sent and received
    • Logout time
    accounting security
  • How can a device be authenticated?

    By placing a digitally signed certificate on the device.

    authentication device
  • What is a Certificate Authority (CA)?

    An organization that creates and digitally signs certificates for devices.

    certificate ca
  • What is the role of a CA's digital signature?

    It is used to validate the certificate.

    certificate validation
  • What does an authorization model help with?

    It defines access rights by Roles, Organizations, Attributes, etc.

    authorization model
  • What is a simple relationship in authorization?

    • User -> Resource
    authorization relationship
  • What is Gap Analysis?

    A comparison of where you are with where you want to be.

    gap_analysis security
  • What is the purpose of choosing a framework in Gap Analysis?

    To work towards a known baseline.

    framework gap_analysis
  • Name a standard for information security management systems.

    ISO/IEC 27001

    standards security
  • What does Zero Trust in network security entail?

    Everything must be verified; nothing is inherently trusted.

    zero_trust network_security
  • What are key elements of a Zero Trust approach?

    • Multi-factor authentication
    • Encryption
    • Monitoring and analytics
    zero_trust security
  • What is the Zero Trust principle?

    Everything must be verified. Nothing is inherently trusted. Use multi-factor authentication and encryption.

    security zerotrust
  • What are the planes of operation in networking?

    • Data plane: Processes data packets.
    • Control plane: Manages data plane actions.
    networking planes
  • What is a Policy Enforcement Point (PEP)?

    The gatekeeper that allows, monitors, and terminates connections.

    security pep
  • What does a Policy Decision Point do?

    It makes authentication decisions.

    security pdp
  • What is the role of a Policy Engine?

    Evaluates access decisions based on policy and other information.

    security policyengine
  • What are security zones?

    Categorize access based on trust levels: trusted, untrusted, internal, external.

    security zones
  • What is the purpose of fencing in physical security?

    Build a perimeter to prevent unauthorized access.

    security fencing
  • What does CCTV stand for?

    Closed Circuit Television.

    security cctv
  • What is the function of access control vestibules?

    Control access by managing door operations.

    security accesscontrol
  • What is two-person integrity/control?

    Minimizes exposure to attacks by requiring two individuals for access.

    security twopersoncontrol
  • What is the purpose of physical protection at the reception area?

    Validates identification of existing employees

    security reception
  • What is two-person integrity/control?

    Minimizes exposure to an attack; no single person has access to a physical asset

    security control
  • What should an access badge include?

    • Picture
    • Name
    • Other details Must be worn at all times and electronically logged
    security badges
  • How does lighting enhance security?

    More light means more security; attackers avoid lit areas

    security lighting
  • What is the function of infrared sensors?

    Detects infrared radiation in both light and dark; common in motion detectors

    sensors infrared
  • What do pressure sensors detect?

    Detects a change in force; used in floor and window sensors

    sensors pressure
  • What is the purpose of honeypots?

    Attracts attackers and traps them; creates a virtual world to explore

    deception security
  • What are honeynets?

    A real network that includes multiple devices; builds a larger deception network

    deception network
  • What are honeyfiles?

    Files with fake information designed to attract attackers; alerts sent if accessed

    deception files
  • What are honeytokens used for?

    Tracks malicious actors; adds traceable data to the honeynet

    deception tracking
  • What is change management?

    Process for making changes like upgrades, patches, or configuration changes

    management change
  • What is the change approval process?

    Formal process to manage change; includes request forms, risk analysis, and approvals

    management approval
  • What is the role of ownership in change management?

    An individual manages the change process; ensures the process is followed

    management ownership
  • Who are considered stakeholders in change management?

    Individuals or groups impacted by the change; they provide input

    management stakeholders
  • What can change management include?

    • One individual
    • The entire company
    change_management process
  • What should be upgraded for shipping?

    • Software for shipping labels
    • Accounting reports
    • Product delivery timeframes
    • Revenue recognition
    software shipping
  • What is impact analysis?

    • Determine risk value
    • Classify as high, medium, low
    impact_analysis risk_management
  • What risks can occur without change?

    • Security vulnerability
    • Application unavailability
    • Unexpected downtime
    risk_management change
  • What is a sandbox testing environment?

    • No connection to production
    • Technological safe space
    testing sandbox
  • What is a backout plan?

    • A way to revert changes
    • Prepare for the worst, hope for the best
    backout_plan change_management
  • When should changes be scheduled?

    • Avoid work hours
    • Consider overnight for less disruption
    maintenance scheduling
  • What is the standard operating procedure for change management?

    • Critical for organization
    • Well documented and available
    sop change_management
  • What is the role of the technical team in change management?

    • Concerned with 'how' to change it
    technical_team change_management
  • What is an allow list?

    • Only approved applications run
    • Very restrictive
    security allow_list
  • What defines the scope of a change?

    • Specifies covered components
    • Change approval is specific
    scope change_management
  • How can downtime be minimized?

    • Switch to secondary system
    • Automate the process
    downtime change_management
  • What is required after implementing new configurations?

    • Common to require a restart
    • Reboot the OS or service
    restart configuration
  • What can you do to recover from a power outage?

    • Bounce the service
    • Stop and restart the service or daemon
    service recovery
  • What should you do with legacy applications?

    • Document the system
    • Create specific processes and procedures
    applications legacy
  • What are dependencies in system management?

    • Complete A requires completing B
    • A service won't start without active services
    dependencies management
  • How can documentation become outdated?

    • Changes in configurations
    • Updates to policies and procedures
    documentation management
  • What is the purpose of version control?

    • Track changes over time
    • Easily revert to previous settings
    version_control management
  • What is Public Key Infrastructure (PKI)?

    • Policies, procedures, hardware, software, people
    • Manage digital certificates
    pki security
  • What is symmetric encryption?

    • Uses a single shared key
    • Fast but challenging to distribute
    encryption symmetric
  • What is asymmetric encryption?

    • Uses two mathematically related keys
    • Public key shared, private key kept secret
    encryption asymmetric
  • What is key escrow?

    • 3rd-party holds your decryption keys
    • Can be a legitimate business arrangement
    key_management security
  • What is important when managing encryption keys?

    • Clear processes and procedures
    • Trust in the 3rd-party managing keys
    key_management process
  • What is Alice’s public key?

    • sBcBAE
    • BCAAQ
    • BQJYtX
    • ToCRA
    cryptography keys
  • What is ciphertext?

    • sBcBAE
    • BCAAQ
    • BQJYtX
    • ToCRA
    cryptography encryption
  • What does Alice use to decrypt ciphertext?

    Her private key

    cryptography decryption
  • What is asymmetric encryption?

    Using a public key to encrypt and a private key to decrypt.

    cryptography encryption
  • What is data at rest?

    Data stored on devices like SSD, hard drives, USB drives, cloud storage.

    data storage
  • What is an example of full-disk encryption?

    BitLocker, FileVault

    encryption security
  • What is file encryption?

    Encrypting individual files using EFS or third-party utilities.

    encryption files
  • What is transport encryption?

    Protecting data while it traverses the network.

    encryption network
  • What does a VPN do?

    Encrypts all data transmitted over the network.

    encryption vpn
  • What is the significance of cryptographic keys?

    They determine the output of encrypted data, hash values, and digital signatures.

    cryptography keys
  • What is the typical length for symmetric keys?

    Commonly 128-bit or larger.

    cryptography keys
  • What does key stretching do?

    Makes a weak key stronger through multiple hashing processes.

    cryptography keys
  • What is a challenge of key exchange?

    Sharing an encryption key securely over an insecure medium.

    cryptography key_exchange
  • What is in-band key exchange?

    Sending the key over the network protected by additional encryption.

    cryptography key_exchange
  • What is a session key?

    A symmetric key shared using asymmetric encryption for data encryption.

    cryptography keys
  • What is a session key?

    A shared key used to encrypt data.

    cryptography keys
  • How should session keys be implemented?

    • Changed often (ephemeral keys)
    • Unpredictable
    cryptography keys
  • How is a symmetric key created from asymmetric keys?

    Using public and private key cryptography.

    cryptography keys
  • What does a Trusted Platform Module (TPM) provide?

    • Cryptographic functions
    • Persistent memory
    • Secure storage
    hardware security
  • What is a Hardware Security Module (HSM) used for?

    • Store thousands of cryptographic keys
    • High-end cryptographic hardware
    hardware security
  • What is a key management system?

    A centralized manager for various keys across services.

    management security
  • What is a secure enclave?

    A protected area for secrets, isolated from the main processor.

    hardware security
  • What is obfuscation?

    The process of making something unclear or difficult to understand.

    security techniques
  • What is steganography?

    Concealed writing; hiding information in plain sight.

    security techniques
  • What are common steganography techniques?

    • Embed messages in TCP packets
    • Use images
    • Invisible watermarks
    security techniques
  • What are yellow dots on printers used for?

    Tracking printed documents

    printing security
  • What is audio steganography?

    Modify audio files to hide messages

    steganography audio
  • What is video steganography?

    Use image steganography on video sequences

    steganography video
  • What is tokenization?

    Replace sensitive data with non-sensitive placeholders

    data security
  • How is tokenization used in credit card processing?

    Uses a temporary token during payment

    payments security
  • What is data masking?

    Hide some original data to protect PII

    data privacy
  • What do hashes represent?

    Data as a short string, a message digest

    hashing data
  • What is a collision in hashing?

    Different inputs create the same hash

    hashing collision
  • Why shouldn't you use MD5?

    It has a collision problem

    hashing security
  • What is salting in hashing?

    Adding random data to a password before hashing

    hashing security
  • What is a digital signature?

    Proves message integrity and source

    security authentication
  • What is blockchain?

    A distributed ledger for tracking transactions

    blockchain technology
  • What is a digital certificate?

    Binds a public key with a digital signature

    security certificates
  • What is a public key certificate?

    Binds a public key with a digital signature and other details about the key holder.

    certificates security
  • What does a digital signature add?

    Adds trust; PKI uses Certificate Authorities for additional trust.

    certificates security
  • What is X.509?

    Standard format for digital certificates.

    certificates standards
  • What are typical details in a digital certificate?

    • Serial number
    • Version
    • Signature Algorithm
    • Issuer
    • Name of the cert holder
    • Public key
    • Extensions
    certificates details
  • What is the root of trust?

    An inherently trusted component, such as HSM or Certificate Authority.

    trust security
  • What does a Certificate Authority (CA) do?

    Digitally signs website certificates, providing trust.

    certificates ca
  • What is a Certificate Signing Request (CSR)?

    A request sent to the CA containing a public key to be signed.

    certificates csr
  • What are self-signed certificates?

    Internal certificates not signed by a public CA; used within an organization.

    certificates self-signed
  • What is a wildcard certificate?

    Supports many different domains; applies to all server names in a domain.

    certificates wildcard
  • What is a Certificate Revocation List (CRL)?

    Maintained by the CA; contains revoked certificates.

    certificates revocation
  • What is OCSP stapling?

    Status information is stored on the certificate holder’s server and stapled into the SSL/TLS handshake.

    certificates ocsp
  • What is OCSP?

    Online Certificate Status Protocol for checking certificate revocation.

    security protocol
  • How is OCSP status included in SSL/TLS?

    It is stapled into the handshake and signed by the CA.

    security ssl/tls
  • What is a CSR?

    Certificate Signing Request sent to a CA for validation.

    security certificates
  • What are the steps to create a certificate?

    1. Create a key pair and send public key to CA.
    2. CA validates identity.
    3. CA signs and returns certificate.
    security certificates
  • What is a threat actor?

    An entity responsible for an event impacting another's safety.

    security threats
  • What are the motivations of threat actors?

    • Data exfiltration
    • Espionage
    • Service disruption
    • Blackmail
    • Financial gain
    • Philosophical beliefs
    security threats
  • What defines nation-state attackers?

    Government entities with massive resources and high sophistication.

    security threats
  • What characterizes unskilled attackers?

    Run pre-made scripts, motivated by disruption or data exfiltration.

    security threats
  • What is a hacktivist?

    A hacker motivated by philosophy or revenge, often sophisticated.

    security threats
  • What is an insider threat?

    Internal entity motivated by revenge or financial gain, with institutional knowledge.

    security threats
  • What is organized crime in cybersecurity?

    Professional criminals motivated by money, often very sophisticated.

    security threats
  • What is shadow IT?

    Working around internal IT, often building unauthorized systems.

    security it
  • What is Shadow IT?

    • Working around internal IT
    • Builds own infrastructure
    it security
  • What are threat vectors?

    • Methods used by attackers
    • Also called 'attack vectors'
    security threats
  • What is a common message-based vector?

    • Phishing attacks
    • Links in emails or texts
    security phishing
  • What is a file-based vector?

    • Malicious code in files
    • Adobe PDF, ZIP/RAR, Microsoft Office
    security files
  • What is vishing?

    • Phishing over the phone
    security vishing
  • What is a vulnerable software vector?

    • Infected executables
    • Known or unknown vulnerabilities
    security software
  • What are unsecure network vectors?

    • Ease of access for attackers
    • Non-encrypted data exposure
    security network
  • What is the risk of open service ports?

    • Every open port is an opportunity
    • Application vulnerabilities
    security ports
  • What is the concern with default credentials?

    • Most devices have default usernames and passwords
    security credentials
  • What can removable devices do?

    • Infect air-gapped networks
    • Data exfiltration via USB
    security removable_devices
  • What are some social engineering attacks?

    • Invoice scams
    • Cryptocurrency scams
    security social_engineering
  • What is war dialing?

    • Large-scale phone call attacks
    security war_dialing
  • What is the purpose of input validation in browsers?

    • Avoid running malicious code
    security input_validation
  • What is call tampering?

    • Disrupting voice calls
    security voice
  • What is the significance of cloud usage in Shadow IT?

    • Unencumbered by internal IT
    • Potential for innovation
    it cloud
  • What expands the attack surface in an application?

    More services

    security applications
  • What must firewall rules allow?

    Traffic to an open port

    security firewall
  • What should you do with default credentials?

    Change them

    security credentials
  • What provides full control of a device?

    The right credentials

    security credentials
  • What can be tampered with in the supply chain?

    Infrastructure or manufacturing process

    security supply_chain
  • What is a risk of managed service providers (MSPs)?

    Access to multiple customer networks

    security msp
  • What was the 2013 Target breach related to?

    Vendor access

    security breach
  • What can counterfeit networking equipment install?

    Backdoors

    security counterfeit
  • What is phishing?

    Social engineering with spoofing

    security phishing
  • What should you check to avoid phishing?

    The URL

    security phishing
  • What is business email compromise?

    Attackers spoof email sources

    security email
  • What is typosquatting?

    A type of URL hijacking

    security phishing
  • What is vishing?

    Voice phishing over phone

    security vishing
  • What is smishing?

    SMS phishing

    security smishing
  • What is the pretext in impersonation?

    Setting a trap with an actor and story

    security impersonation
  • What is a common tactic in identity fraud?

    Using someone's personal information

    security identity_fraud
  • What type of fraud involves credit cards?

    Credit card fraud

    security credit_card_fraud
  • What can attackers gain access to in bank fraud?

    Your bank account

    security bank_fraud
  • What is bank fraud?

    • Attacker gains access to your account
    • Opens a new account
    fraud banking
  • What is loan fraud?

    • Your information is used for a loan
    • Or lease
    fraud loans
  • What is government benefits fraud?

    • Attacker obtains benefits on your behalf
    fraud government
  • How to protect against impersonation?

    • Never volunteer information
    • Don’t disclose personal details
    • Always verify before revealing info
    security impersonation
  • What is a watering hole attack?

    • Attackers target websites frequented by victims
    • Infect third-party sites
    cybersecurity attacks
  • What is required for executing a watering hole attack?

    • Determine victim group websites
    • Infect those sites
    cybersecurity attacks
  • What happened in January 2017?

    • Attack targeted financial institutions
    • Downloaded malicious JavaScript to specific IPs
    cybersecurity events
  • What is defense-in-depth?

    • Layered defense approach
    • Firewalls and IPS
    security defense
  • What is misinformation/disinformation?

    • Disseminate factually incorrect information
    • Create confusion and division
    socialengineering misinformation
  • What is brand impersonation?

    • Pretend to be a well-known brand
    • Create impersonated sites
    fraud impersonation
  • What is memory injection?

    • Add code into memory of existing process
    • Hide malware inside the process
    malware memory
  • What is DLL injection?

    • Inject a path to a malicious DLL
    • Runs as part of the target process
    malware dll
  • What does memory forensics do?

    • Finds malicious code in memory
    • Analyzes running processes
    forensics malware
  • What is a buffer overflow?

    Overwriting a buffer of memory that spills over into other memory areas.

    security buffer_overflow
  • What do developers need to perform to prevent buffer overflows?

    Bounds checking.

    security development
  • What is a race condition?

    A programming issue where multiple processes happen simultaneously, potentially leading to errors.

    security programming
  • What does TOCTOU stand for?

    Time-of-check to time-of-use attack.

    security toctou
  • What can cause a reboot loop in systems?

    Improper handling of file system problems, as seen in the Mars rover 'Spirit'.

    security system
  • What should you always do when installing software updates?

    Keep your operating system and applications updated.

    security updates
  • What is a best practice for software updates?

    Always have a known-good backup.

    security best_practices
  • Why should you confirm the source of updates?

    To avoid installing potentially malicious software.

    security updates
  • What is a common issue with malicious updates?

    Not every update is equally secure.

    security malware
  • What can help ensure the safety of installed applications?

    Only install from trusted sources.

    security trust
  • What should you do to verify app updates?

    Visit the developer’s site directly - Don’t trust random update buttons or files

    security updates
  • What do many operating systems require for apps?

    They require signed apps - Don't disable security controls

    security operating_systems
  • What is the Solarwinds Orion supply chain attack?

    Attackers added malicious code to updates - Reported in December 2020

    security attacks
  • What is a foundational computing platform?

    An operating system (OS) - Everyone has one

    computing operating_systems
  • How complex are operating systems?

    Remarkably complex - Millions of lines of code

    complexity operating_systems
  • What is Patch Tuesday?

    2nd Tuesday of each month - Normal month of Windows updates

    updates windows
  • What vulnerabilities were reported on May 9, 2023?

    • 50 security patches
    • 8 Elevation of Privilege
    • 4 Security Feature Bypass
    • 12 Remote Code Execution
    security vulnerabilities
  • What is a best practice for OS vulnerabilities?

    Always update - Monthly or on-demand updates

    best_practices security
  • What is code injection?

    Adding your own information into a data stream - Enabled by bad programming

    security coding
  • What is SQL injection (SQLi)?

    Putting your own SQL requests into an application - Shouldn't be allowed

    security sql
  • How can SQL injection be executed?

    Often executed in a web browser - Inject in a form or field

    security sql_injection
  • What is Cross-site Scripting (XSS)?

    A common web app vulnerability - Takes advantage of user trust

    security xss
  • What is a non-persistent (reflected) XSS attack?

    Web site allows scripts in user input - Attacker emails a link with malicious script

    security xss
  • What is a persistent (stored) XSS attack?

    Attacker posts a message with payload - Everyone viewing the page gets it

    security xss
  • What is a malicious payload?

    A payload that spreads quickly to all viewers of a page, making it 'persistent'.

    security malware
  • What happens when someone views a malicious message?

    It can be posted to their page and propagate further.

    security propagation
  • What vulnerability did Aaron Guzman discover in Subaru?

    A token that never expires, allowing unauthorized access.

    security vulnerability
  • What is a potential risk of a valid token?

    Allows any service request, including adding an email to another's account.

    security tokens
  • How can you protect against XSS?

    • Be cautious with untrusted links
    • Disable JavaScript
    • Keep software updated
    • Validate input
    security xss
  • What is firmware?

    The operating system inside hardware devices.

    security firmware
  • What does EOL stand for?

    End of life, when a manufacturer stops selling a product.

    security eol
  • What is EOSL?

    End of service life, no longer supported or patched by the manufacturer.

    security eosl
  • What are legacy platforms?

    Older devices running outdated software that may pose security risks.

    security legacy
  • What is a significant concern regarding technology EOSL?

    Lack of security patches and updates for unsupported products.

    security concerns
  • What are virtualization vulnerabilities?

    • Local privilege escalations
    • Command injection
    • Information disclosure
    security virtualization
  • What is VM escape?

    Breaking out of the VM to interact with the host OS or hardware.

    security virtualization
  • What can you control after escaping the VM?

    • Control the host
    • Control other guest VMs
    security virtualization
  • What happened in March 2017 at Pwn2Own?

    • JavaScript engine bug in Microsoft Edge
    • Windows 10 kernel bug
    • Hardware simulation bug in VMware
    security events
  • What does the hypervisor manage?

    The relationship between physical and virtual resources.

    security virtualization
  • What percentage of organizations use MFA for management console users?

    76% are not using MFA.

    security cloud
  • What is a common type of attack in the cloud?

    Denial of Service (DoS).

    security cloud
  • What is authentication bypass?

    Exploiting weak or faulty authentication.

    security cloud
  • What is SQL injection?

    Getting direct access to a database.

    security web
  • What is a risk in the supply chain?

    Attackers can infect any step along the chain.

    security supply_chain
  • What should be considered for service providers?

    Ongoing security audits included in the contract.

    security service_providers
  • What should be included with the contract for service providers?

    Ongoing security audits of all providers

    security contracts
  • What was targeted in the Target Corp. breach?

    40 million credit cards stolen

    security breach
  • How was the HVAC firm infected in the Target breach?

    Malware delivered in an email

    security malware
  • What kind of credentials were stolen from the HVAC techs?

    VPN credentials

    security credentials
  • What network was used to infect cash registers in the Target breach?

    A wide-open Target network

    security network
  • What is a key factor in trusting hardware providers?

    Supply chain cyber security

    security hardware
  • What should be controlled tightly among vendors?

    Use a small supplier base

    security vendors
  • What should security be part of in design?

    The overall design

    security design
  • What company was involved in a counterfeit product scandal in July 2022?

    Cisco

    security counterfeit
  • What should be confirmed during software installation?

    Digital signature

    security software
  • What significant attack involved Solarwinds Orion?

    Solarwinds supply chain attack

    security attack
  • What was compromised in the Solarwinds attack?

    Software updates

    security updates
  • What common vulnerability involves open permissions?

    Leaving a door open for hackers

    security vulnerabilities
  • What should be done to protect admin accounts?

    Disable direct login to root accounts

    security admin
  • What protocols should be avoided due to lack of encryption?

    Telnet, FTP, SMTP, IMAP

    security protocols
  • What should be used instead of default settings?

    Change to custom configurations

    security settings
  • What botnet exploits default configurations?

    Mirai botnet

    security botnet
  • What do firewalls manage?

    Traffic flows based on port number

    security firewalls
  • What is important to manage access?

    • Firewall
    • Traffic flows
    • Port number/application
    security firewall
  • What should you do with firewall rulesets?

    • Test
    • Audit
    • Double/triple check
    security firewall
  • What are challenges in mobile device security?

    • Additional security policies
    • Small size
    • Constantly in motion
    security mobile
  • What data do mobile devices often contain?

    • Personal data
    • Organizational data
    security mobile
  • What is jailbreaking/rooting?

    • Gaining access
    • Custom firmware
    • Circumvent security features
    security mobile
  • What is sideloading?

    • Installing apps manually
    • Circumvents security
    security mobile
  • What are zero-day vulnerabilities?

    • Unknown vulnerabilities
    • No fix available
    security vulnerabilities
  • What is a zero-day attack?

    • Attack without a patch
    • Difficult to defend against
    security vulnerabilities
  • What is malware?

    • Malicious software
    • Gathers information
    security malware
  • What types of malware exist?

    • Viruses
    • Worms
    • Ransomware
    • Trojan Horse
    • Keylogger
    security malware
  • How do you get malware?

    • Vulnerabilities
    • Email links
    • Drive-by downloads
    security malware
  • What is ransomware?

    • Malware that encrypts data
    • Requires payment for decryption
    security malware
  • What is ransomware?

    Malware that encrypts files and demands payment for decryption.

    malware ransomware
  • How can you protect against ransomware?

    • Always have an offline backup
    • Keep your OS and applications updated
    • Update anti-virus/anti-malware signatures
    protection ransomware
  • What is a virus?

    Malware that can reproduce itself and needs user execution to spread.

    malware virus
  • How do viruses spread?

    Through file systems or networks by executing a program.

    malware virus
  • What are the types of viruses?

    • Program viruses
    • Boot sector viruses
    • Script viruses
    • Macro viruses
    malware virus
  • What is a fileless virus?

    A stealth attack that operates in memory and avoids detection.

    malware virus
  • What is a worm?

    Malware that self-replicates without user action, spreading via networks.

    malware worm
  • How do worms spread?

    They self-propagate and can take over many systems quickly.

    malware worm
  • What is spyware?

    Malware that spies on users, capturing data like keystrokes.

    malware spyware
  • How can you protect against spyware?

    • Maintain anti-virus/anti-malware
    • Be cautious during installations
    • Regularly backup data
    protection spyware
  • What is bloatware?

    Unwanted applications installed by manufacturers that use storage space.

    software bloatware
  • How can you remove bloatware?

    • Identify and remove unwanted apps
    • Use built-in uninstallers
    • Consider third-party uninstallers
    removal bloatware
  • What are keyloggers?

    Malware that captures keystrokes and sends them to attackers.

    malware keylogger
  • What can malware log?

    • Web site login URLs
    • Passwords
    • Email messages
    • Keystrokes
    • Clipboard content
    • Screen activity
    • Instant messaging
    • Search engine queries
    malware logging
  • What is a logic bomb?

    A malicious code that waits for a predefined event to execute.

    malware logic_bomb
  • What is a time bomb?

    A type of logic bomb that activates based on a specific time or date.

    malware logic_bomb
  • What happened on March 19, 2013 in South Korea?

    Email with malicious attachment sent; Trojan installed malware.

    malware history
  • What did the malware do on March 20, 2013?

    Activated logic bomb, deleted storage and master boot record.

    malware history
  • What is SCADA?

    Supervisory Control and Data Acquisition system used in industrial control.

    malware scada
  • How can you prevent a logic bomb?

    • Implement formal change control
    • Use electronic monitoring
    • Conduct constant auditing
    security prevention
  • What is a rootkit?

    A malicious software that modifies core system files and is often invisible to the OS.

    malware rootkit
  • How can you find and remove rootkits?

    • Look for unusual behavior
    • Use specific rootkit removers
    • Secure boot with UEFI
    malware rootkit
  • What are physical attacks?

    Attacks that bypass digital security by gaining physical access to systems.

    security physical_attacks
  • What is brute force in physical security?

    Physically pushing through obstructions without needing a password.

    security physical_attacks
  • What is RFID cloning?

    Copying RFID badges or key fobs using duplicators.

    security rfid
  • What are environmental attacks?

    Attacks targeting the operating environment, like HVAC and power systems.

    security environmental_attacks
  • What is a Denial of Service (DoS) attack?

    An attack that overloads a service to make it unavailable.

    security dos
  • What is a Distributed Denial of Service (DDoS) attack?

    Using multiple computers to bring down a service.

    security ddos
  • What is a DDoS attack?

    An attack that uses an army of computers to overwhelm a service, causing a traffic spike.

    cybersecurity ddos
  • What is a botnet?

    A network of infected computers controlled by an attacker.

    cybersecurity botnet
  • What was the peak infection of the Zeus botnet?

    Over 3.6 million PCs.

    cybersecurity botnet
  • What is DNS poisoning?

    Modifying a DNS server to redirect requests.

    cybersecurity dns
  • What is domain hijacking?

    Gaining access to domain registration to control traffic flow.

    cybersecurity domain
  • What is URL hijacking?

    Redirecting users from a mistyped URL to a malicious site.

    cybersecurity url
  • What is typosquatting?

    Taking advantage of misspellings in domain names.

    cybersecurity typosquatting
  • What is a wireless deauthentication attack?

    A DoS attack that disconnects users from a wireless network.

    cybersecurity wireless
  • What does 802.11w address?

    Encryption of certain management frames to protect against attacks.

    cybersecurity wireless
  • What is RF jamming?

    Interfering signals that prevent wireless communication.

    cybersecurity jamming
  • What does wireless jamming do?

    Prevents wireless communication - Transmits interfering signals - Decreases signal-to-noise ratio

    wireless security
  • What is the difference between interference and jamming?

    Interference is unintentional - Jamming is intentional disruption

    wireless security
  • What is reactive jamming?

    Jamming occurs only when someone else tries to communicate

    wireless security
  • What is an on-path attack?

    Formerly known as man-in-the-middle - Redirects traffic without detection

    network security
  • What does ARP poisoning do?

    An on-path attack on the local IP subnet - ARP lacks security

    network security
  • What is a replay attack?

    An attacker reuses transmitted information - Requires raw network data access

    network security
  • What are browser cookies?

    Stored information by the browser - Used for tracking and session management

    web security
  • What is session hijacking?

    An attacker intercepts a session ID - Gains access using victim's credentials

    network security
  • What is pass the hash?

    An attacker captures username and password hash - Uses them to authenticate as the victim

    network security
  • What is malicious code?

    Code used to exploit vulnerabilities - Can be delivered through various techniques

    malware security
  • What are ways to get into a well-secured system?

    • Exploit with malicious code
    • Knock the pins out of a door hinge
    security access
  • What are types of malicious code?

    • Executable
    • Scripts
    • Macro viruses
    • Worms
    • Trojan horse
    malware types
  • What protects against malicious code?

    • Anti-malware
    • Firewall
    • Continuous updates
    • Secure computing habits
    protection security
  • What is WannaCry ransomware?

    • Executable that exploited a vulnerability in Windows SMBv1
    • Allowed arbitrary code execution
    malware ransomware
  • What is SQL injection?

    • Inserting SQL requests into an existing application
    • Application shouldn't allow this
    security injection
  • What is a replay attack?

    • Hacker captures useful information over the network
    • Replays data to impersonate someone else
    security attacks
  • What is privilege escalation?

    • Gaining higher-level access to a system
    • Exploiting a vulnerability or design flaw
    security access
  • What mitigates privilege escalation?

    • Patch quickly
    • Updated anti-virus software
    • Data Execution Prevention
    • Address space layout randomization
    security mitigation
  • What are common injection attack types?

    • HTML
    • SQL
    • XML
    • LDAP
    security injection
  • What is the purpose of bounds checking?

    • Prevent buffer overflows
    • Ensure data fits in allocated memory
    programming security
  • What is the role of HTTPS in security?

    • Encrypts data to prevent session hijacking
    • Protects session ID from being captured
    security encryption
  • What are tools for information gathering?

    • Wireshark
    • Kismet
    security tools
  • What is cross-site scripting?

    • Exploit that injects malicious scripts into web pages
    security xss
  • What is the CVE-2023-29336 vulnerability?

    • Win32k Elevation of Privilege Vulnerability
    • Affects Windows 10 and Server versions
    security vulnerability
  • What is CVE-2023-29336?

    Win32k Elevation of Privilege Vulnerability

    vulnerability cve
  • Which systems are affected by Win32k Kernel driver vulnerability?

    • Server 2008
    • Server 2008 R2
    • Server 2012
    • Server 2012 R2
    • Server 2016
    • Windows 10
    vulnerability windows
  • What privileges can an attacker gain from CVE-2023-29336?

    SYSTEM privileges

    vulnerability privileges
  • What are cross-site requests?

    Legitimate requests from different sources like websites and videos.

    web requests
  • What does client-side code do?

    Renders the page on the screen (HTML, JavaScript)

    web client-side
  • What does server-side code do?

    Performs requests from the client (HTML, PHP)

    web server-side
  • What is Cross-site Request Forgery (CSRF)?

    One-click attack that exploits user trust in a web application.

    security csrf
  • What is a significant oversight in web application development regarding CSRF?

    Lack of anti-forgery techniques.

    security csrf
  • What is directory traversal?

    Reading files from a web server outside the website’s directory.

    security directory-traversal
  • What can attackers exploit in directory traversal?

    Badly written web application code.

    security vulnerability
  • What is a birthday attack?

    Finding two different plaintexts with the same hash value.

    cryptography attack
  • What is a hash collision?

    Same hash value for two different plaintexts.

    cryptography collision
  • What vulnerability was identified with MD5?

    Collisions identified in 1996.

    cryptography md5
  • What is a downgrade attack?

    Forcing systems to use weaker encryption methods.

    security attack
  • What is a downgrade attack?

    Forces systems to use weaker encryption instead of strong encryption.

    security attacks
  • What vulnerability did the POODLE attack exploit?

    TLS vulnerability that forced clients to fallback to SSL 3.0.

    security vulnerabilities
  • Why won't modern browsers fallback to SSL 3.0?

    Due to significant cryptographic vulnerabilities.

    security browsers
  • What is SSL stripping?

    An on-path attack that rewrites URLs from HTTPS to HTTP.

    security attacks
  • What is a plaintext password?

    A password stored without encryption, making it readable.

    security passwords
  • What should you do if your application saves passwords as plaintext?

    Get a better application that hashes passwords.

    security passwords
  • What is hashing a password?

    Representing data as a fixed-length string, creating a message digest.

    security passwords
  • What is an example of a common hashing algorithm?

    SHA-256, used in many applications.

    security hashing
  • What is a spraying attack?

    Trying common passwords across multiple accounts to avoid lockouts.

    security attacks
  • What is a brute force attack?

    Trying every possible password combination until the correct one is found.

    security attacks
  • What happens during an online brute force attack?

    Attempts to log in repeatedly, often leading to account lockouts.

    security attacks
  • What is an indicator of compromise (IOC)?

    An event indicating a potential intrusion, such as unusual network activity.

    security ioc
  • What can cause an account lockout?

    Exceeded login attempts or administrative disabling of the account.

    security accounts
  • What does concurrent session usage refer to?

    Multiple logins from different locations by the same user.

    security sessions
  • What is an attacker's goal regarding blocked content?

    To remain undetected in the system for as long as possible.

    security attacks
  • What is a common reason attackers want to stay in a system?

    • System is unlocked
    • Keep doors and windows open
    security attackers
  • What should you look for to prevent blocked content?

    • Auto-update connections
    • Links to security patches
    • Third-party anti-malware sites
    • Removal tools
    security content
  • What types of segmentation can be used in a network?

    • Physical
    • Logical
    • Virtual
    networking segmentation
  • What is the purpose of access control lists (ACLs)?

    • Allow or disallow traffic
    • Restrict access to network devices
    security acls
  • What can be included in ACL configurations?

    • Source IP
    • Destination IP
    • Port number
    • Time of day
    • Application
    security acls
  • What is an example of a permission in an ACL?

    • Bob can read files
    • Fred can access the network
    security permissions
  • What is a unique method to allow applications in an allow list?

    • Application hash
    security allowlist
  • What does 'impossible travel' indicate in security?

    • Logon from different locations in a short time
    security indicators
  • What should be monitored for signs of an attack?

    • Significant changes in resource consumption
    • Unusual spikes in file transfers
    security monitoring
  • What does out-of-cycle logging refer to?

    • Logs occurring at unexpected times
    security logging
  • What can missing logs indicate?

    • Evidence of an attack
    • Attempt to cover tracks
    security logs
  • What might attackers do with company data?

    • Publish online
    • Release raw data without context
    security data
  • What may occur in conjunction with ransomware?

    • Raw data may be released without context
    security ransomware
  • What is incredibly important for system security?

    • Patching
    security patching
  • How often should updates be performed?

    • Monthly updates
    security updates
  • What does full disk encryption (FDE) do?

    • Encrypt everything on the drive
    security encryption
  • What is an example of full disk encryption?

    • BitLocker, FileVault
    security encryption
  • What should rights and permissions be set to?

    • The bare minimum
    security permissions
  • What must user accounts be limited to?

    • Minimal privileges
    security user_accounts
  • What is needed for configuration enforcement?

    • Perform a posture assessment
    security configuration
  • What should decommissioning policies include?

    • Don’t throw data into the trash
    security decommissioning
  • What is a method of threat protection?

    • Endpoint detection and response (EDR)
    security edr
  • What does a host-based firewall do?

    • Allow or disallow incoming or outgoing application traffic
    security firewall
  • What does system hardening include?

    • Updates, user accounts, network access
    security hardening
  • What is an example of file system encryption?

    • Windows Encrypting File System (EFS)
    security encryption
  • What type of monitoring aggregates information from devices?

    • Built-in sensors and separate devices
    security monitoring
  • What is the goal of encryption in data protection?

    • Prevent access to application data files
    security encryption
  • What should be included in extensive checks during configuration enforcement?

    • OS patch version, EDR version, firewall status
    security configuration
  • What is a host-based firewall?

    • Software-based firewall
    • Runs on every endpoint
    • Allows or disallows application traffic
    security firewall
  • What does a host-based Intrusion Prevention System (HIPS) do?

    • Recognizes and blocks known attacks
    • Secures OS and application configs
    • Validates incoming service requests
    security hips
  • What should you do with open ports and services?

    • Close everything except required ports
    • Control access with a firewall
    security ports
  • Why should you change default passwords?

    • Every network device has a management interface
    • Many applications have management interfaces
    security passwords
  • What is the risk of unnecessary software?

    • Contains bugs and vulnerabilities
    • Different patching processes
    security software
  • What is a cloud responsibility matrix?

    • Defines who is responsible for security in IaaS, PaaS, SaaS
    • Well documented by cloud providers
    cloud security
  • What are hybrid cloud considerations?

    • More than one public or private cloud
    • Adds complexity to network protection
    cloud hybrid
  • What is infrastructure as code?

    • Describes infrastructure as code
    • Modifies infrastructure like application code
    cloud infrastructure
  • What is serverless architecture?

    • Apps are split into autonomous functions
    • Managed by a third-party
    cloud serverless
  • What are microservices?

    • Applications split into smaller services
    • Each service has distinct functionalities
    cloud microservices
  • What is a monolithic application?

    One big application that does everything, containing user interface, business logic, and data input/output.

    architecture monolithic
  • What are APIs used for in microservices?

    APIs serve as the 'glue' for microservices, allowing them to work together as a single application.

    apis microservices
  • What are the benefits of microservices?

    • Scalable: Scale only the needed microservices
    • Resilient: Outages are contained
    • Security: Built-in containment
    microservices benefits
  • What is physical isolation in network infrastructure?

    Devices are physically separate, requiring direct connections or switches for communication.

    networking physical_isolation
  • What is the purpose of VLANs?

    VLANs provide logical segmentation, separating networks without physical isolation.

    networking vlans
  • What are the three planes of SDN?

    • Data plane: Processes network frames and packets
    • Control plane: Manages data plane actions
    • Management plane: Configures and manages devices
    sdn networking
  • What is a centralized approach in security management?

    Centralizes security management for correlated alerts and consolidated log analysis.

    security centralization
  • What is virtualization?

    Running multiple operating systems on the same hardware, with each application instance having its own OS.

    virtualization technology
  • What are the challenges of a monolithic architecture?

    Large codebase and change control challenges due to everything being in one application.

    architecture challenges
  • What is the responsibility matrix in microservices?

    Defines how different components interact, including clients, APIs, and microservices.

    microservices responsibility
  • What are the security concerns between on-premises and cloud?

    On-premises offers full control but higher costs; cloud is centralized and generally less expensive.

    security cloud on-premises
  • What is virtualization?

    Running many different operating systems on the same hardware.

    virtualization technology
  • What is an application container?

    A standardized unit of software containing everything needed to run an application.

    containerization software
  • What does a container provide?

    Isolated processes in a sandbox; self-contained applications.

    containerization applications
  • What is an IoT sensor used for?

    Heating and cooling, lighting.

    iot sensors
  • What are examples of smart devices?

    Home automation, video doorbells.

    iot smartdevices
  • What is SCADA?

    Supervisory Control and Data Acquisition System for large-scale industrial control.

    scada ics
  • What is a real-time operating system (RTOS)?

    An OS with a deterministic processing schedule, critical for industrial equipment.

    rtos operating_systems
  • What defines embedded systems?

    Hardware and software designed for a specific function or part of a larger system.

    embedded_systems hardware
  • What is high availability (HA)?

    Systems that are always on and available, often requiring redundancy.

    availability ha
  • What is the importance of availability in IT?

    System uptime is crucial for accessing data and completing transactions.

    availability it
  • What does resilience refer to in IT?

    The ability to maintain availability and recover quickly after an incident.

    resilience it
  • What is MTTR?

    Mean Time to Repair, a metric for recovery time.

    mttr resilience
  • What factors contribute to cost in IT infrastructure?

    Initial installation, ongoing maintenance, and repair costs.

    cost infrastructure
  • What is a key factor in ongoing maintenance?

    Annual ongoing cost

    maintenance costs
  • What are replacement or repair costs?

    You might need more than one

    costs repairs
  • What are the tax implications of expenses?

    Operating or capital expense

    taxes expenses
  • What is critical for responsiveness in applications?

    Speed is an important metric

    responsiveness performance
  • What contributes to application responsiveness?

    All parts of the application contribute

    responsiveness performance
  • What does scalability refer to?

    How quickly and easily can we increase or decrease capacity?

    scalability capacity
  • What is essential for ease of deployment?

    Consider orchestration / automation

    deployment automation
  • What method can be used for risk transference?

    Transfer the risk to a third-party

    risk security
  • What is a critical aspect of ease of recovery?

    How easily can you recover?

    recovery business
  • What does patch availability involve?

    Bug fixes, security updates, etc.

    patching updates
  • What happens if patching isn’t an option?

    Embedded systems may need additional security controls

    patching security
  • What is a foundational element of infrastructure?

    Power requirements

    infrastructure power
  • What is the compute engine?

    More than just a single CPU

    compute performance
  • What is the purpose of firewalls in a network?

    Separate trusted from untrusted

    security firewalls
  • What do security zones simplify?

    Security policies

    security zones
  • What is an attack surface?

    How many ways into your home?

    security attack
  • What can be a vulnerability in applications?

    Open ports

    vulnerabilities security
  • What are common vulnerabilities in security?

    • Doors
    • Windows
    • Basements
    • Application code
    • Open ports
    • Human error
    security vulnerabilities
  • How to minimize the attack surface?

    • Audit the code
    • Block ports on the firewall
    • Monitor network traffic in real-time
    security best_practices
  • What contributes to security?

    • Network connection
    • Secure network cabling
    • Application-level encryption
    • Network-level encryption
    security connectivity
  • What is fail-open in security?

    Data continues to flow when a system fails.

    security failure_modes
  • What is fail-closed in security?

    Data does not flow when a system fails.

    security failure_modes
  • What is the difference between active and passive monitoring?

    • Active monitoring: Data can be blocked in real-time.
    • Passive monitoring: Data cannot be blocked; only examined.
    security monitoring
  • What does an Intrusion Prevention System (IPS) do?

    Watches network traffic and stops intrusions before they enter the network.

    security ips
  • What is a jump server?

    A highly-secured device that provides access to protected network zones.

    security network_appliances
  • What is the function of a proxy?

    Sits between users and external networks to handle requests on behalf of users.

    security network_appliances
  • What is a forward proxy?

    An internal proxy used to protect and control user access to the Internet.

    security proxy
  • What is an open proxy?

    A third-party, uncontrolled proxy that can pose significant security concerns.

    security proxy
  • What is a reverse proxy?

    Handles inbound traffic from the Internet to internal services.

    security proxy
  • What is an application proxy?

    A proxy that understands how an application works, often used for HTTP.

    security proxy
  • What is a forward proxy?

    An 'internal proxy' used to protect and control user access to the Internet.

    networking proxy
  • What is a reverse proxy?

    Handles inbound traffic from the Internet to your internal service.

    networking proxy
  • What is an open proxy?

    A third-party, uncontrolled proxy that can pose security risks.

    networking proxy
  • What is port security?

    Authentication methods to control access on networks, used in both wired and wireless networks.

    networking security
  • What does EAP stand for?

    Extensible Authentication Protocol, an authentication framework.

    networking security
  • What is IEEE 802.1X?

    Port-based Network Access Control (NAC) that requires authentication before network access.

    networking security
  • What are the roles in IEEE 802.1X?

    • Supplicant: the client
    • Authenticator: the device providing access
    • Authentication server: validates client credentials
    networking security
  • What is load balancing?

    Distributing load across multiple servers to ensure fault tolerance and performance.

    networking loadbalancing
  • What is active/active load balancing?

    All servers are active and share the load; provides fault tolerance and fast convergence.

    networking loadbalancing
  • What is active/passive load balancing?

    Some servers are active while others are standby; passive servers take over if active ones fail.

    networking loadbalancing
  • What are sensors in networking?

    Devices that aggregate information from network devices, like intrusion prevention systems and logs.

    networking sensors
  • What are collectors in networking?

    Devices that gather data from sensors, such as SIEM consoles and syslog servers.

    networking collectors
  • What is the role of a firewall?

    Controls the flow of network traffic, protecting sensitive materials and controlling content.

    networking firewall
  • What does a firewall control?

    • Outbound and inbound data
    • Sensitive materials
    • Inappropriate content
    networking firewall
  • What are the protections provided by firewalls?

    • Anti-virus
    • Anti-malware
    networking security
  • What is the difference between OSI layer 4 and OSI layer 7?

    • Layer 4: Transport layer
    • Layer 7: Application layer
    networking osi
  • What does NGFW stand for?

    Next-Generation Firewall

    networking firewall
  • What is a VPN?

    Virtual Private Network

    networking vpn
  • What is the purpose of a web application firewall (WAF)?

    • Applies rules to HTTP/HTTPS
    • Allow or deny based on expected input
    networking waf
  • What is the function of SSL/TLS VPN?

    • Uses SSL/TLS protocol
    • Provides remote access communication
    networking vpn
  • What is SD-WAN?

    Software Defined Networking in a Wide Area Network

    networking sd-wan
  • What does SASE stand for?

    Secure Access Service Edge

    networking sase
  • What does a Unified Threat Management (UTM) appliance include?

    • Web security gateway
    • Malware inspection
    • Firewall
    networking utm
  • What is the role of a VPN concentrator?

    Encryption/decryption access device

    networking vpn
  • What is content filtering in firewalls?

    • URL filters
    • Control website traffic by category
    networking firewall
  • What is a VPN used for?

    • User access via SSL/TLS
    • Site-to-site access via IPsec tunnels
    networking security vpn
  • What does SD-WAN manage?

    • Network connectivity to the cloud
    • Does not address security concerns
    networking sd-wan
  • What is SASE?

    • A complete network and security solution
    • Requires planning and implementation
    networking sase
  • What is the role of a VPN concentrator?

    • Creates a secure tunnel for remote users
    • Decrypts and routes traffic into the corporate network
    networking vpn
  • What are the types of data classifications?

    • Proprietary
    • Regulated
    • Trade secret
    • Intellectual property
    • Legal information
    • Financial information
    data classification
  • What is regulated data?

    • Managed by a third-party
    • Governed by laws and statutes
    data regulation
  • What is trade secret?

    • Organization’s secret formulas
    • Unique to the organization
    data trade_secret
  • What defines legal information?

    • Court records and documents
    • PII and sensitive details
    data legal
  • What types of financial information exist?

    • Internal company details
    • Customer financials
    • Payment records
    data finance
  • What is the difference between human-readable and non-human readable data?

    • Human-readable: understandable by humans
    • Non-human readable: encoded data, barcodes, images
    data readability
  • What are examples of hybrid data formats?

    • CSV
    • XML
    • JSON
    data formats
  • What does classifying sensitive data involve?

    • Different levels of categorization
    • Varying security and handling requirements
    data classification
  • What are the data classifications?

    • Proprietary
    • PII
    • PHI
    • Sensitive
    • Confidential
    • Public / Unclassified
    • Private / Classified / Restricted
    • Critical
    data classification
  • What is Proprietary data?

    Data that is the property of an organization, may include trade secrets, often unique to an organization.

    data proprietary
  • What does PII stand for?

    Personally Identifiable Information, data used to identify an individual.

    data pii
  • What is included in PHI?

    Health information associated with an individual, including health status and care records.

    data phi
  • What is data at rest?

    Data stored on a device like hard drives or SSDs, often encrypted.

    data states
  • What is data in transit?

    Data transmitted over a network, also known as data in-motion, requires transport encryption.

    data states
  • What is data in use?

    Data actively processing in memory, usually decrypted, can be vulnerable to attacks.

    data states
  • What is data sovereignty?

    Data residing in a country is subject to that country's laws, including GDPR regulations.

    data sovereignty
  • What is geolocation used for?

    Tracks location details, can manage data access based on user location.

    data geolocation
  • What is geofencing?

    Automatically allows or restricts access based on user location, e.g., office proximity.

    data geofencing
  • What is the purpose of encryption?

    To encode information into unreadable data, converting plaintext to ciphertext.

    data encryption
  • What is hashing?

    Represents data as a short string of text, a one-way trip creating a message digest.

    data hashing
  • What is confusion in encryption?

    The encrypted data is drastically different than the plaintext.

    encryption confusion
  • What does hashing represent?

    Data as a short string of text, a message digest.

    hashing data
  • What is a key feature of hashing?

    It's a one-way trip; impossible to recover the original message from the digest.

    hashing security
  • What is the purpose of hashing?

    Used to store passwords and verify document integrity.

    hashing passwords
  • What is obfuscation?

    Making something understandable very difficult to understand.

    obfuscation security
  • What does obfuscation help prevent?

    The search for security holes.

    obfuscation security
  • What is masking?

    A type of obfuscation that hides some original data.

    masking data
  • What does masking protect?

    Personally Identifiable Information (PII) and other sensitive data.

    masking pii
  • What is tokenization?

    Replacing sensitive data with a non-sensitive placeholder.

    tokenization data
  • How is tokenization used in credit card processing?

    Uses a temporary token during payment to prevent misuse of captured card numbers.

    tokenization creditcards
  • What is the benefit of segmentation?

    Separating data to reduce risk of a single breach affecting all data.

    segmentation security
  • What does high availability (HA) mean?

    Always on, always available system.

    ha availability
  • What is server clustering?

    Combining two or more servers to operate as a single large server.

    clustering servers
  • What is the purpose of load balancing?

    Distributing load across multiple servers to optimize performance.

    loadbalancing performance
  • What is a hot site?

    An exact replica of a primary site, constantly updated.

    resiliency hot_site
  • What is a hot site?

    • An exact replica
    • Duplicate everything
    • Stocked with hardware
    • Constantly updated
    • Automated replication
    disaster_recovery hot_site
  • What is a cold site?

    • No hardware
    • Empty building
    • No data
    • Bring it with you
    • No people
    disaster_recovery cold_site
  • What is a warm site?

    • Between cold and hot
    • Big room with rack space
    • Hardware ready
    • Geographic dispersion
    disaster_recovery warm_site
  • What is platform diversity?

    • Different operating systems
    • Spread the risk
    • Specific vulnerabilities per OS
    security platform_diversity
  • What are multi-cloud systems?

    • Many cloud providers
    • Plan for outages
    • Geographically dispersed data
    cloud_computing multi-cloud
  • What is continuity of operations planning (COOP)?

    • Prepare for disruptions
    • Alternative processes
    • Document and test procedures
    business_continuity coop
  • What is capacity planning?

    • Match supply to demand
    • Avoid slowdowns and outages
    • Balanced approach
    capacity_planning infrastructure
  • What is the role of people in capacity planning?

    • Human intervention needed
    • Recruit or redeploy staff
    capacity_planning human_resources
  • What technology can help in capacity planning?

    • Scalable technology
    • Distribute load
    • Cloud services
    capacity_planning technology
  • What is recovery testing?

    • Test before an event
    • Scheduled updates
    • Evaluate response
    disaster_recovery recovery_testing
  • What are tabletop exercises?

    • Cost-effective disaster drills
    • Analyze logistics
    • Gather key players
    disaster_recovery tabletop_exercises
  • What can be costly and time-consuming in disaster preparedness?

    Disaster drills

    disaster preparation
  • What is a method to assess disaster response without physical drills?

    Tabletop exercises

    disaster exercise
  • What is often inevitable in infrastructure?

    Failures

    infrastructure failures
  • What should be created to ensure operational continuity during failures?

    Redundant infrastructure

    infrastructure redundancy
  • What should be tested with a simulated event?

    Internal security

    security testing
  • What is a method to test user security awareness?

    Phishing email attacks

    security phishing
  • What does parallel processing improve?

    Performance and recovery

    computing performance
  • What is incredibly important for data recovery?

    Backups

    data recovery
  • What are the two types of backups?

    Onsite and offsite backups

    backup types
  • What is a benefit of offsite backups?

    Data is available after a disaster

    backup offsite
  • What should backup data be protected with?

    Encryption

    security encryption
  • What is the foundation of technology that needs proper planning?

    Power

    power technology
  • What device provides short-term backup power?

    Uninterruptible Power Supply (UPS)

    power ups
  • What is needed for long-term power backup?

    Generators

    power generators
  • What is a snapshot in virtual environments?

    An instant backup of an entire system

    backup virtualization
  • What is a snapshot in backup?

    • An instant backup of an entire system
    • Saves current configuration and data
    backup snapshot
  • How often should you take a snapshot?

    • Every day
    • After 24 hours, capture changes only
    backup snapshot
  • What is recovery testing?

    • Ability to restore from backup
    • Simulate disaster situations
    recovery testing
  • What is replication in data backup?

    • Ongoing, almost real-time backup
    • Keeps data synchronized in multiple locations
    backup replication
  • What is journaling in data storage?

    • Make a journal entry before writing data
    • Update the journal after data is stored
    data journaling
  • What are secure baselines?

    • Well-defined security for application environments
    • Must follow strict guidelines
    security baselines
  • How should you deploy baselines?

    • Managed through a centrally administered console
    • May use Active Directory group policy
    security deployment
  • Why is hardening important?

    • No system is secure with default configurations
    • Guidelines help keep systems safe
    security hardening
  • What is critical for mobile devices security?

    • Regular updates for bug fixes and security patches
    • Use of Mobile Device Manager (MDM)
    security mobile
  • What is essential for workstations security?

    • Constant monitoring and updates
    • Automate monthly patches
    security workstations
  • What should be automated monthly in firmware management?

    Patches

    firmware management
  • Which system should be connected for policy management?

    Active Directory group policy

    policy management
  • Why should unnecessary software be removed?

    To limit threats

    security software
  • What are examples of network infrastructure devices?

    • Switches
    • Routers
    network infrastructure
  • What type of devices have embedded OS?

    Purpose-built devices

    devices embedded
  • What should be configured for authentication?

    Custom authentication methods

    authentication security
  • What should be checked with the manufacturer?

    Security updates

    manufacturer updates
  • What should be secured in cloud infrastructure?

    Cloud management workstation

    cloud security
  • What principle should be applied to cloud services?

    Least privilege

    cloud privilege
  • What should be configured for devices accessing the cloud?

    Endpoint Detection and Response (EDR)

    cloud edr
  • What is a recommended backup strategy for cloud data?

    Cloud to Cloud (C2C)

    backup cloud
  • What types of servers are there?

    • Windows
    • Linux
    • iOS
    • Android
    servers operating_systems
  • What must be monitored and secured on servers?

    Anti-virus and anti-malware

    security servers
  • What does SCADA stand for?

    Supervisory Control and Data Acquisition

    scada ics
  • What is essential for SCADA systems?

    Extensive segmentation

    scada segmentation
  • What are embedded systems designed for?

    Specific functions

    embedded systems
  • What is a characteristic of RTOS?

    Deterministic processing schedule

    rtos operating_systems
  • What should IoT devices have instead of weak defaults?

    Changed passwords

    iot security
  • What is a key aspect of Mobile Device Management (MDM)?

    Centralized management

    mdm mobile
  • What does BYOD stand for?

    Bring Your Own Device

    byod mobile
  • What is a challenge of BYOD?

    Difficult to secure

    byod security
  • What does COPE stand for?

    Corporate Owned, Personally Enabled

    security mobile
  • What is CYOD?

    Choose Your Own Device

    security mobile
  • What are common security concerns for cellular networks?

    • Traffic monitoring
    • Location tracking
    • Worldwide access
    security cellular
  • What should be done to secure a wireless network?

    • Authenticate users
    • Encrypt data
    • Verify data integrity
    security wireless
  • What is the WPA2 PSK problem?

    Brute-force attack on the pre-shared key (PSK) using the four-way handshake

    security wpa2
  • What is WPA3?

    Wi-Fi Protected Access 3, introduced in 2018

    security wpa3
  • What does GCMP stand for?

    Galois/Counter Mode Protocol

    security wpa3
  • What is SAE in WPA3?

    Simultaneous Authentication of Equals, a new authentication process

    security wpa3
  • What is a message integrity check (MIC)?

    Verifies that received data matches the original sent data

    security wireless
  • What is a weak PSK vulnerable to?

    Brute-force attacks, especially with improved technology

    security wpa2
  • What is the purpose of WPA3's mutual authentication?

    Creates a shared session key without sending it across the network

    security wpa3
  • What is required for Open System wireless authentication?

    No authentication password is required

    security wireless
  • What is the main feature of WPA3-Personal?

    Uses a pre-shared key (PSK) for authentication

    security wpa3
  • What is an Open System in wireless security?

    No authentication password is required.

    wireless security
  • What does WPA3-Personal use?

    WPA2 or WPA3 with a pre-shared key; everyone uses the same 256-bit key.

    wireless security
  • What does WPA3-Enterprise do?

    Authenticates users individually with an authentication server (i.e., RADIUS).

    wireless security
  • What are the components of the AAA framework?

    • Identification
    • Authentication
    • Authorization
    • Accounting
    security aaa
  • What is RADIUS?

    A common AAA protocol that centralizes authentication for users.

    security radius
  • What does IEEE 802.1X provide?

    Port-based Network Access Control (NAC); access only after authentication.

    networking 802.1x
  • What is EAP?

    Extensible Authentication Protocol; an authentication framework with various methods.

    security eap
  • What is the purpose of input validation?

    To validate actual input against expected input and correct it.

    security coding
  • What are secure cookies?

    Cookies with a Secure attribute; sent only over HTTPS and not for sensitive data.

    security cookies
  • What is Static Application Security Testing (SAST)?

    A method to identify security flaws like buffer overflows and database injections.

    security sast
  • What is code signing?

    Digital signature of an application by the developer to confirm integrity and origin.

    security coding
  • What is sandboxing?

    Isolating applications so they cannot access unrelated resources.

    security sandboxing
  • What is a sandbox used for?

    • Development environment
    • Useful production technique
    • Commonly used in various deployments
    development production
  • Where can sandboxing be applied?

    • Virtual machines
    • Mobile devices
    • Browser iframes
    • Windows UAC
    virtualization mobile
  • What does application security monitoring provide?

    • Real-time information
    • Application usage and access demographics
    security monitoring
  • What can be viewed in application security monitoring?

    • Blocked attacks
    • SQL injection attempts
    • Patched vulnerabilities
    security monitoring
  • What is involved in the acquisition process?

    • Multi-step purchasing
    • User request with budget and approvals
    procurement management
  • What is asset tracking used for?

    • Central asset tracking system
    • Ownership association
    • Classification of assets
    asset tracking
  • What should be included in asset monitoring?

    • Inventory of all assets
    • Associate support tickets with devices
    inventory monitoring
  • What does enumeration of an asset list?

    • CPU
    • Memory
    • Storage drive
    • Keyboard
    • Mouse
    enumeration assets
  • What is the purpose of media sanitization?

    • Remove data completely
    • Ensure no usable information remains
    sanitization data
  • What methods exist for physical destruction of data?

    • Shredder/pulverizer
    • Drill/hammer
    • Electromagnetic (degaussing)
    • Incineration
    destruction data
  • What is a certificate of destruction?

    • Confirmation of data destruction
    • Paper trail of broken data
    certificate destruction
  • What is important about data retention?

    • Backup data
    • Regulatory compliance
    • Operational needs
    data retention
  • What is vulnerability scanning?

    • Minimally invasive testing
    • Identifies open ports and systems
    vulnerability scanning
  • What is static code analysis used for?

    • Identify security flaws
    • Find vulnerabilities like buffer overflows
    security analysis
  • What is dynamic analysis (fuzzing)?

    • Send random input to applications
    • Test robustness and syntax
    dynamic testing
  • What is the issue with verifying findings in security?

    False positives are an issue.

    security verification
  • What is dynamic analysis in security testing?

    Sending random input to an application.

    security testing
  • What are the types of testing involved in dynamic analysis?

    • Fault-injecting
    • Robustness testing
    • Syntax testing
    • Negative testing
    security testing
  • What does dynamic analysis look for?

    • Application crash
    • Server error
    • Exception
    security analysis
  • Who created the Fuzz Generator?

    Professor Barton Miller at the University of Wisconsin.

    history security
  • What is the CERT Basic Fuzzing Framework?

    A framework developed by Carnegie Mellon Computer Emergency Response Team.

    security framework
  • What is the purpose of package monitoring?

    To confirm the package is legitimate and safe before deployment.

    security monitoring
  • What is threat intelligence?

    Research on threats and threat actors.

    security intelligence
  • What is OSINT?

    Open-source intelligence from publicly available sources.

    security intelligence
  • What does proprietary/third-party intelligence provide?

    Compiled threat information that can be purchased.

    security intelligence
  • What is the function of the Cyber Threat Alliance (CTA)?

    Members share and validate threat intelligence submissions.

    security intelligence
  • What is penetration testing (pentest)?

    Simulating an attack to exploit vulnerabilities.

    security testing
  • What is included in the rules of engagement?

    Defines purpose, scope, and test parameters.

    security engagement
  • What can exploiting vulnerabilities lead to?

    • Denial of service
    • Loss of data
    • Privilege escalation
    security vulnerabilities
  • What can buffer overflows cause?

    • Instability
    • Privilege escalation
    security vulnerabilities
  • What are some vulnerability types to test?

    • Password brute-force
    • Social engineering
    • Database injections
    • Buffer overflows
    security vulnerabilities
  • What is a false positive?

    A vulnerability is identified that doesn’t really exist.

    security analysis
  • What is a false negative?

    A vulnerability exists, but you didn’t detect it.

    security analysis
  • What is CVSS?

    Common Vulnerability Scoring System - scoring of a vulnerability from 0 to 10.

    security cvss
  • What is the National Vulnerability Database?

    A synchronized database with the CVE list, providing enhanced search functionality.

    security databases
  • What is the exposure factor?

    Loss of value or business activity if the vulnerability is exploited, expressed as a percentage.

    security analysis
  • What are the steps in penetration testing?

    • Initial exploitation
    • Lateral movement
    • Persistence
    • The pivot
    security penetration
  • What is responsible disclosure?

    A controlled release of information about a vulnerability after a fix is created.

    security disclosure
  • What are bug bounty programs?

    Rewards for discovering vulnerabilities, allowing researchers to earn money for documenting them.

    security rewards
  • What does vulnerability classification involve?

    Scanners look for signatures in application scans, web application scans, and network scans.

    security classification
  • What are the environmental variables in vulnerability analysis?

    • Type of environment (internal server, public cloud, test lab)
    • Prioritization and patching frequency
    • Number and type of users
    • Revenue generating application
    • Potential for exploit
    security vulnerabilities
  • What is the impact of industry/organization on vulnerabilities?

    • Significant consequences from exploits
    • Example: Tallahassee Memorial HealthCare ransomware
    • Example: DDoS attacks on power utilities
    security impact
  • What is risk tolerance in security?

    • Acceptable amount of risk to an organization
    • Timing of security patches
    • Need for proper testing before patching
    security risk
  • What is the most common mitigation technique for vulnerabilities?

    • Patching
    security mitigation
  • What are the types of patches?

    • Scheduled (monthly, quarterly)
    • Unscheduled (zero day, urgent)
    security patching
  • What does cybersecurity insurance cover?

    • Lost revenue
    • Data recovery costs
    • Money lost to phishing
    • Privacy lawsuit costs
    security insurance
  • What is segmentation in security?

    • Limit the scope of an exploit
    • Separate devices into networks/VLANs
    • Use internal NGFWs to block traffic
    security segmentation
  • What is the purpose of logical segmentation with VLANs?

    • Separate networks logically
    • Cannot communicate without a Layer 3 device/router
    security vlans
  • What are compensating controls?

    • Alternative measures when optimal security is unavailable
    • Disable problematic services
    • Limit access or modify internal controls
    security controls
  • Why is security monitoring essential?

    • Attackers operate 24/7/365
    • Monitor all entry points and react to events
    security monitoring
  • What does log aggregation involve?

    • Use of SIEM or SEM to consolidate logs
    security log_aggregation
  • What are the types of users for remote access systems?

    • Employees
    • Vendors
    • Guests
    security remote_access
  • What do firewall and IPS reports indicate?

    • Increase in attacks
    • Type of attack
    security firewall
  • What is the function of a SIEM?

    • Consolidate logs to a central database
    • Centralized reporting
    security siem
  • What does log aggregation enable?

    • Correlation between diverse systems
    • View authentication and access
    security log_aggregation
  • What is crucial in a constantly changing threat landscape?

    • New vulnerabilities discovered daily
    • Systems and people are always moving
    security threats
  • What should be actively checked in systems?

    • OS types and versions
    • Device driver versions
    • Installed applications
    security scanning
  • What is the average time to identify and contain a breach?

    About 9 months (IBM security report, 2022)

    security breach
  • What is an exception in vulnerability management?

    • Not everything can be patched
    • Formal approval process usually required
    security vulnerability_management
  • What is required after a vulnerability is patched?

    • Rescanning to ensure effectiveness
    • Audit to check deployment
    security remediation
  • What is essential for ongoing vulnerability management?

    • Continuous reporting on vulnerabilities
    • Automation for efficiency
    security monitoring
  • What are the methods for notification in security alerting?

    • SMS/Text
    • Email
    • Security console/SOC
    security alerting
  • What is the purpose of alert tuning?

    • Prevent false positives and negatives
    • Improve accuracy over time
    security alerting
  • What is SCAP used for?

    • Identify and act on security criteria
    • Validate configuration and patch installs
    security scap
  • How can SCAP content be utilized?

    • Shared between tools
    • Detect applications with known vulnerabilities
    security scap
  • What does SCAP stand for?

    Security Content Automation Protocol

    security scap
  • What can SCAP content be shared between?

    Tools

    security scap
  • What does SCAP focus on?

    Configuration compliance

    security compliance
  • What is a key benefit of SCAP in large environments?

    Detect applications with known vulnerabilities

    security vulnerabilities
  • What are some types of automation in SCAP?

    • Ongoing monitoring
    • Notification and alerting
    • Remediation of noncompliant systems
    security automation
  • What should benchmarks apply to?

    • Operating systems
    • Cloud providers
    • Mobile devices
    security benchmarks
  • What is an example of a mobile device security setting?

    Disable screenshots

    security mobile
  • What is the role of agents in compliance checks?

    Install software agent onto the device

    security agents
  • What is an advantage of agentless checks?

    Runs without a formal install

    security agentless
  • What does SIEM stand for?

    Security Information and Event Management

    security siem
  • What does anti-malware software stop?

    Spyware, ransomware, fileless malware

    security malware
  • What does DLP stand for?

    Data Loss Prevention

    security dlp
  • What does SNMP stand for?

    Simple Network Management Protocol

    networking snmp
  • What is the purpose of SNMP traps?

    Communicate alerts without constant polling

    networking snmp
  • What does NetFlow gather?

    Traffic statistics from all traffic flows

    networking netflow
  • What is a vulnerability scanner used for?

    Identify systems and security devices

    security scanners
  • What is the purpose of firewalls?

    • Filter traffic
    • Protect network security
    networking security
  • What are the two types of firewalls?

    • Traditional firewalls
    • Next-generation firewalls (NGFW)
    networking firewalls
  • What does NGFW stand for?

    Next-generation firewall

    networking firewalls
  • What layer does an NGFW operate at?

    OSI Application Layer (Layer 7)

    networking firewalls
  • What is Network Address Translation (NAT)?

    Converts private IP addresses to public IP addresses

    networking nat
  • What is the function of Access Control Lists (ACLs)?

    Allow or disallow traffic based on criteria

    networking security
  • What is the purpose of a screened subnet?

    Provides an additional layer of security between the network and the Internet

    networking security
  • What are the two methods for finding malicious traffic in IPS?

    • Signature-based
    • Anomaly-based
    security ips
  • What does implicit deny mean in firewall rules?

    Traffic not explicitly allowed is denied

    networking firewalls
  • What is the role of VPN in firewalls?

    Encrypts traffic between sites

    networking vpn
  • What is deep packet inspection?

    Analyzes every packet for security decisions

    networking security
  • What protocols are commonly used in firewalls for forwarding decisions?

    • TCP
    • UDP
    networking protocols
  • What port does a web server typically use?

    tcp/80, tcp/443

    networking ports
  • What port does SSH use?

    tcp/22

    networking ports
  • What port does Microsoft RDP use?

    tcp/3389

    networking ports
  • What port does a DNS query use?

    udp/53

    networking ports
  • What port does NTP use?

    udp/123

    networking ports