What is BIOS?
Basic Input Output System
What are BIOS Security Features? Per NIS SP 800-147b.
What is a TPM?
Trusted Platform Module or cryptographic co-processor
- Supports cryptographic functions
- Enables trust in computing systems
- Has a processor, persistent memory and volatile memory
- Used as roots of trust.
- Provides tamper resistance
- TPMs are HW-based.
SW-based TPMs are also available, though not as secure.
What are storage controllers and what do they do?
Storage controllers are hardware used to control storage devices.
They provide:
Examples include iSCSI and FCoE (Fiber Channel over Ethernet).
What is KVM switch?
Keyboard Video Mouse Switch
Allows a single set of human interface peripherals to connect to multiple computers
Saves space.
Users can switch between multiple computers.
What is VXLAN?
What are the steps in DHCP exchange between server and client?
The mnemonic is DORA
Discover - client to server on UDP Port 67
Offer - DHCP responds with IP address on Port 68
Request - Client confirms it will use the IP address
Acknowledge - Server acks its.
DHCP v6 uses IPSec.
What are write-blockers?
Per CSA - what are the two key techniques that underpin cloud computing?
Per CSA - what’s the difference between traditional virtualization and cloud computing?
Traditional virtualization abstracts the resources, but does not orchestrate to pool resources together. This often requires manual processes.
What is utility computing?
Utility computing is the idea that computing resources can be consumed like water or electricity and paying only for what you use (metering).
What capabilities to PaaS offer?
Noteworthy
What information does PCI-DSS prevent you from storing?
CVV - Card Verification Value
CVV can be used in a transaction but cannot be stored.
What are merchant levels in PCI-DSS?
Merchants are classified into levels 1 through 4 based on the number of transactions annually.
Level 1 is the highest (unlike FIPS and CC/EAL) . These levels determine risk and ascertain the appropriate level of security for their businesses
Level 1 - over 6 million transactions annually
Level 4 - Less than 20,000 annually.
How must cardholder data be protected in PCI-DSS?
Using either Tokenization or Encryption.
What is XSS and how do you protect against it?
XSS = Cross Site Scripting
OWASP 2021 - Top 10 List
A01 - Broken Access Control
A02- Cryptographic Failures (weak crypto keys, unprotected passwords/secrets)
A03 - Injection (SQL, XSS)
A04-Insecure design
What is an insecure direct object reference?
What does data/information governance mean?
Use of Data/information complies with the organizational policies, standards and strategy including regulatory, contractual and business requirements and objectives.
How does cloud use affect data/information governance?
NIST Cybersecurity Framework vs Incident Response Comparison
NIST CSF: Identify -> Protect -> Detect -> Respond -> Recover
Incident Response: Prepare -> Detect&Analysis -> Containment/Eradicate/Recover -> Post-Mortem.
In Cloud, what is the equivalent of “Striping” used in traditional RAID storage?
The equivalent of RAID in the cloud is data dispersion.
The terms chunking and sharding is used in the cloud.
Chunking is at a file level - e.g. 100KB file broken into 5 20 KB chunks
Sharding is at a DB level - e.g. phone directory in a DB stored across 5 computers. A-to-E in computer 1 etc..
What is Transparent Database Encryption?
TDE encrypts the entire database file.
This is encryption of data at rest that protects against theft of storage devices.
Does NOT protect data in transit or data in use.
TDE does page level encryption - i.e. before a page is written to disk it is encrypted. It is decrypted before loading into memory.