The flashcards below were created by user
usma1976
on FreezingBlue Flashcards.
-
Due Care
Minimum and customary practic of responsible protection of assets
-
-
The prudent management and execution of due care.
-
3 access control measures
- Preventive
- Detective
- Corrective
-
Describe CIA and DAD?
- Confidentiality, Integrity and Availability
- vs.
- Disclosure, Alteration and Destruction
-
What are the most important port numbers?
- FTP Port 21
- SSH Port 22
- Telnet Port 23
- HTTP Port 80
- HTTPS Prt 443
- SMTP Port 25
-
What are the 8 domains?
- 1. Security & Risk Management
- 2. Asset Security
- 3. Security Engineering
- 4. Communications & Network Security
- 5. Identity and Access Management
- 6. Security Assessment & Testing
- 7. Security Operations
- 8. Software Development Security
-
Which methods will securely erase a Solid State Drive?
- ATA Secure Erase
- Physical destruction
- But not:
- Format drive
- sector by sector overwrite
- Delete all files
- Degaussing
-
Authentication?
Establishes, tests or reconciles a user's identity.
-
Authorization?
Deals with the rights and permissions granted to an individual or process that enable access to a computer
-
Accountability
systems ability to determine the actions of a user. Shows that a particular individual performed an action thur audit trails and logs.
-
Risk
Threat x Vulnerabilty
-
Metasploit
A framework with a command shell and dynamic payloads.
-
ROI
Easier to prove with preventive controls
-
Detective controls
Hard to justify with basic TCO and ROI
-
Interconnection Security Agreement (ISA)
defines the technical security requirements when connecting two organizations together. Supports a Memorandum of Understanding.
-
OCTAVE
Operationally Critical Threat, Asset and Vulnerability Evaluation
-
CVSSv2
Common Vulnerability Scoring System
-
CVSS Metrics (3)
- Base
- Temporal
- Environmental
Base includes: Access Vector, Access Complexity, Authentication, Confidentiality, Integrity and Availability impacts
-
Buffer overflow
Smash the stack
-
Race condition
Exploits the gap between the time a security check is applied and the time the code is executed. Also called Time of check/time of use.
-
Man in the middle
- Masquerading
- Replay attack
- Spoofing
-
Spoofing
Lying about who you are
-
Resource Exhaustion
CAM Flood (content addressable memory table)
-
Virus
requires a carrier to spread
-
Worm
Spreads independently; infects one system, then many
-
Trojan
Appears benign (overtly) but has a covert malicious function
-
Botnet
a collection of compromised hosts controlled by a bot herder
-
Server side attack
Service side attack; initial SYN sent by the attacker
-
Client side attack
Victim initiates the attack by downloading malicious content
-
Emanations
EMI leaving a system; study of these Compromising Emanations is through TEMPEST
-
Criminal law
results in monetary penalties or prison
Beyond a reasonable doubt
-
Civil law
Punitive or compensatory damages but no prison
Tort law
Preponderance of evidence
-
Administrative/Regulatory law
HIPAA etc.
-
Categories of computer crime (10)
- white collar/financial fraud
- corporate espionage
- hacking
- stalking
- child porn
- organized crime
- terroism
- identity theft
- social engineering
- insider theft
-
International Computer Crime
- United Nations
- The G8 nations
- Mutual Legal Assistance Treaties
- European Union Border Controls (Interpol)
-
Patent
20 year property right for the inventor; effective only in the US and territories
right to exclude others from making, using, offering for sale, selling or importing the invention
-
Copyright
Form of expression (rather than the subject)
-
Trademark
mark is also called a servicemark (for services) while a trademark is for goods
good indefinitely
-
Trade secret
IP that is not publicly available
covered by an NDA
must be proven to be protected to have any recourse
-
Crippleware
Software with limited functionality
-
Privacy Act of 1974
requires govt to keep information on individuals private and protected
-
International Privacy
OECD (Organization for Economic Cooperation and Development) PLUS
European Union Data Protection Directive
-
Ethics Bodies
- IAB (Internet Activities Board)
- Computer Ethics Institute
- Association for Computing Machinery (ACM)
- Institute of Electrical and Electronics Engineers (IEEE)
- Information Systems Audit and Control Association (ISACA)
- International Information Systems Security Certification Consortium (ISC)2
-
Polices
Directive controls
High level guidance
mandatory
change infrequently but may be added to
-
Procedures
- speed limit signs
- more detailed than policies
- focused on how to achieve
- should change frequently
security configuration
-
Standard
- mandatory
- specific
- specifies a certain way of doing something
Baseline is a specific implementation of a standard
-
Guidelines
- suggestion
- assists users
- not compulsory
-
Controlling your environment
- Policy - tells a user what to do
- Training - provides the skill set
- Awareness - changes user behavior
|
|