Chapter 28: Essential Security Practices Flashcards

(70 cards)

1
Q

Host-based security

A

protecting individual devices found within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network-Based Security

A

Protecting all devices connected to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical security

A

Locks on doors, security officers, all about defending the physical machines on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Man-in-the-Middle (on-path) Attack

A

Someone between you the sender and your intended receiver. Emails, wireless etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prevent - Man-in-the-Middle (on-path) Attack

A

Encrypt data being sent outside the network. That way even if the man-in-the-middle captures your sent data it can’t be read due to encyrption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spoofing

A

To take on the look and feel of some other legitimate entity. Fakes emails, websites, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prevent - Spoofing

A

Creating connections that verify that who you are talking to is who they say they are. Certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of Service (DoS)

A

bad person creates bad requests, malformed http requests, that cause ta server to stop and look at their bad request. This causes the server to be unable to take the legitimate request and website will error out. Biggest problem on internet today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distributed Denial of Service (DDoS)

A

Bad person installs some kind of malware on 10, 100, 1,000, or 10,000s computers. These infected PCs are called zombies. Then bad guys server sends command to zombies to send malformed requests to something to take it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zero day

A

When a new type of threat that no one has seen before starts breaking things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Signs you have been hacked

A

Renamed system files, Normal functions such as clicking on desktop doesn’t work, Files randomly disappearing, and file permissions changing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Evil Twin Attack

A

a hacker makes a clone of your WAP using your legitimate information. After they make their own WAP they kick all users off of your WAP. User reconnect to the hackers WAP and they can connect to the internet and everything seems fine, but data is now flowing through the hackers WAP and is being capture by the hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Insider Threat

A

employee, contractor, or other person who has access to company resources starts stealing, modifying, or removing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQL Injection Attacker

A

Attacker inserts malicious SQL statements into a webpages input fields. such as a text box on a form. The goal, to access website database and steal PPI (Protected Personal Information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SQL Injection Attacker - In-Band

A

injecting SQL code right through input box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SQL Injection Attacker - Error based

A

Create intentional errors to learn about the website’s database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SQL Injection Attacker - Blind

A

Using yes/no boolean test to figure out details on website’s database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SQL Injection Attacker - out-of-band

A

force databse to send data out via DNS or HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SQL Injection Attacker - Time-Based Blind

A

Adding SQL that creates a delay to test the servers responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cross-Site Scripting (XXS) attack

A

inserts malicious script into webpages code that changes what users see in the browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

XXS attack - Stored or Persistent

A

Attacker saves malicious script so that anyone who views the page sees an altered version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

XXS attack - Reflected or non-persistent

A

most common. The user unknowingly sends malicious script input. Often through phising email, link, or social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

XXS attack - DoM Based

A

Document Object Module (DoM) - Manipulates users DOM. Attackers code runs in browser and changes a websites functionality directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BEC

A

Business Email Compromise - Phishing email scam. attacker pretends to be someone the victim knows or trusts. Asks for confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Supply Chain Attacker
Attacker might modify software at the manufacturer. Inject malicious code into application updates.
26
How to avoid threats
Reduce systems inherent vulnerabilities through patching, anti-malware, etc.
27
Patching
Very important. Patches fix vulnerability issues, day zero attacks. Patch applications, OS, server, everything.
28
Anti-Malware
Should be running on all systems.
29
Host-Based Firewall
Can prevent you from making mistakes. Click on a bad email firewall might bail you out.
30
IDS
Intrusion Detection System (IDS) - box or application running on a system in your network. Their job is to monitor the network and if it sees something out of place send a notification. Doesn't remove intruder just notifies someone something is amiss.
31
IPS
Intrustiuon Prevention System (IPS) - More common than IDS. Small appliances or boxes that monitor the network. can also install "agents" on individual devices. All these things watch network and report to a central server to make you aware, but also tells firewall to make adjustments to try and remove intruder.
32
Endpoint Management
Central system in internal network watching for intrusions and making sure anti-malware and patches are updated. expensive. However, bad intrusion on enterprise network is also expensive.
33
UTM
Unified threat management (UTM) - Combines firewall, intrusion protection, and anti-malware in one convenient package.
34
Network TAP
Network Test Access Point (Network TAP) - inserted between two network nodes. It captures data and passes it along so it can be analyzed. very little latency added and network flow is uninterrupted.
35
Passive TAP
No moving parts. Doesn't need power. Doesn't interact with other network nodes only listens. uses optical splitter to make copy of network signal. can be used on copper and fiber optic networks.
36
Active TAP
Need electricity. Retransmits signal it receives. Can become a failure point during a power outage.
37
Compliance
Following laws, rules, guidelines, or procedures currently in place. prevents vulnerabilities when best practices are followed.
38
Perimeter security
Prevents people from entering property. Security guards, mantrap, locking doors, fence.
39
Rooms
Locks, badges, biometric locks. protecting rooms within an office area.
40
Individual Devices
Cable locks, server locks, USB lock, Privacy screen. Protect the physical devices.
41
Security Guard
Can verify credentials and physically prevent individuals from entering the building.
42
Mantrap
Access controlled vestibule. two door scenario. someone walks into vestibule. both doors lock until person is verified. Then they are let into the secure space.
43
Badge Reader
RFID card that carries your credentials. Entry control roster, lists who went where when.
44
Smart Card
something swiped or inserted. works like badge.
45
Biometric scanner/lock
iris scanner, fingerprint reader, etc.
46
Cable Locks
Physically holds computer down so that it cannot be taken
47
Server Lock
locks server into a rack cannot be removed without key.
48
USB lock
prevent someone putting something into usb port. Can also send warning when removed. USB hacks are dangerous, easy, and fast.
49
Privacy Screens
Polarized screen on monitor that limits field of view.
50
Keyfobs
Tap to enter, built into doors, garages.
51
Hardware token/HSM
Hardware security module (HSM) - Provides additional info for log-in credentials. such as a OTP (One time password) for entering a website.
52
Bollards
Sturdy metal poles which prevent vehicles from going somewhere.
53
Video Survelliance
Record activity in an area. their presence can also prevent threats.
54
motion detection
triggers a camera to record when something moves past. indoor or outdoor.
55
Fence
Creates barrier visibly and physically.
56
Hash
One way value. Fixed length. Hides password. Password isn't saved. it is converted to a hash and the hash is saved on the PC. When you type in password again PC converts it to hash and compares it to the stored hash. This is what hackers steal in order to crack passwords.
57
Brute Force
After hacker deciphers hash code they can test any hash combo until they get in. Can take a long time. not done often.
58
Dictionary Attack
List of known types of passwords people use. Hacker will compare your hash to the dictionary to see if they can find your Password.
59
Rainbow Tables
Lots of tables of common words or phrases that work together to guess password hash.
60
Password best practices
Set strong passwords, Set expiration dates, require screen savers, require lock screen on smart devices, change BIOS & UEFI passwords, require passwords on all applications and devices, and MFA (Multi-Factor Authentication).
61
Strong Passwords
upper and lowercase letters, numbers, symbols, and longer the password the more secure.
62
Password Expiration
Comptia A+ says every 30-90 days. Remember that range for test. In reality, every 30 days will cause lots of trouble administratively and employees may forget passwords or make weaker passwords if they have to change too often.
63
Data at rest
Data stroed on secondary storage such as SSD/Flashdrive. Databases, backups, cloud storage, etc. Best way to protect data at rest is to encrypt it.
64
Password Considerations
Unique for every application, device, website. Longer than 8 characters, use upper and lower case, numbers, symbols, and avoid common words/phrases.
65
Password Manager
Should be used in every org. personal use is a good idea too. software or application that securely stores your passwords along with its associated url or data storage location. can also generate new passwords and autofill on sites.
66
Authentication
process of verifying identity before granting access. Something you know (Password), have (token), are (fingerprint), can do (signature)
67
Which is not a layer of physical security? perimeter room locks log files individual devices
Log files don't prevent attacks; they help us identify the attack after it occurred.
68
Which is not a core component of computer security? Peripheral-based security Host-based security Network-based security Physical security
There is not a specific category of security protection that focuses on peripherals.
69
Which is not a password cracking technique? Brute force Dictionary attack Reverse hashing rainbow tables
Reverse hashing is not a password hacking method.
70
Which is not a vulnerability-avoidance technique? apply patches download e-mail attachments Run anti-malware software run a host-based firewall
Downloading e-mail attachments does not avoid vulnerabilities (and may expose your system to them).