Updating and patching

  1. It’s best practice to always get software updates from a trusted source like the manufacturer ?
    True -You should always validate where you are getting patches and updates
  2. List different types of Patch management processes with examples?
    -Notification=> manufacturers email about a fix

    -identification=> analyze the update

    -Deployment=> Acquiring the patch

    -installation => Installing the patch of affected computers

    -Verification => certifying the patch that is installed
  3. =>Identity and access control

    List the types of authentication types and provide an example?
    1- Know (email address)


    2-Have (laptop)

    3-Are(voice)
  4. Authorization
    -permission to access a file or data element ( access control type)



    Permissions and access rights are authorization “what your allowed to do or see”
  5. Layering protection

    1.3)Provide a description of layering security and any potential recommendations ?
    Jill and Roy scenario
    A network switch provides a satisfactory layering of security in the form of a firewall.

    Cloud services- for many of the applications used and critical data is stored on it too

    Windows 10 file server - exposing the business to potentially by-passing the layering and allowing direct access into their work environment
  6. Layering protection


    1.2)provide examples of layers as well as layering types
    -Applications (Quickbooks)

    -operating system (Microsoft windows 10)

    -network(Linksys Ethernet switch)

    -Mobile(iPhone and android smartphones)

    -human (employees)

    -data (personally identifiable tax information)
  7. Layering protection

    1.1) provide examples of benchmarks according to the center for the internet security benchmark website
    -Microsoft office(excel and emails )

    -microsoft windows desktop

    -print devices

    -google chrome
  8. Layering protection pt1

    Humans only interact with the application on the data level true or false ?
    False- humans will interact with all layers weather they realize it or not
  9. Provide examples of layers with corresponding potential protection methods
    -database - access control


    -data -encryption


    -operating system - credentials


    ==Each layer has some kind of protection to keep the whole system safe

    ==both IT and security professionals use the CIS benchmarks as standards for applications ,operating systems and technologies
  10. Introduction to threats ,attacks and exploits


    Att & ck and mitre
    Allows you to explore threat information found on the mitre and att & ck website.
  11. Once choosing an attack or threat on the mitre /att & ck website either by selecting examples under the drive by compromise heading or not list some of the details found after selecting a cve (critical vulnerability exploit)
    -attack name: drive by compromise

    -ID : T1189

    -Platform : windows ,linux , macOS ,saas

    -permissions required :user

    -brief description of the attack: application access tokens like oautho,to gain access to protected applications and information.These malicious apps have been delivered through pop ups on legitimate websites
  12. Identifying software vulnerabilities:

    Threats,attacks and exploits…
    Name the type of action according to the scenario given
    Consider a scenario where a malicious attacker may try to crack a password database and then use the results to gain unauthorized access into computer systems ?


    Exploitation=> this is an attack or exploit in action
  13. Which of the following can be considered cybersecurity threat
    -disgruntled employer

    -hackers

    -user error
  14. A fictitious company recently got breached and upon investigation they found that an employee clicked an advertisement link sent to his working email.This email was sent by a group of hackers to steal account ID and passwords ?
    Which statements are true regarding threat vectors and threat sources…
    -The method of using fake emails to steal passwords and Id’s is a threat source.

    ———-the fake advertisement link is a threat source ———-


    -the hacker is a threat vector


    The link is the source of the client information breach
  15. Vulnerability management


    Analysis
    The phase of the vulnerability management process,we decide what to do about a vulnerability (a course of action to take)…
  16. Cve entries contain all of the following except ?
    Severity rating…



    Cve entries contain(cve-Id ; description ; references ; data entry created )
  17. Which of the following is true about the cve list
    -one identifier for one vulnerability or exposure

    -one standardized description for each vulnerability or exposure

    -allows tools to speak the same language


    - free for public download and use


    ===Cve is a great resource for investigation vulnerabilities on most types of software ..


    Note that a database rather than a dictionary is not a part of the true regarding the cve list
  18. Steps in vulnerability management used in the following scenario


    Jane performs the monthly vulnerability assessment for her organization.Matching her actions to the steps in vulnerability management
    Identification - Jane found that several employees stored their account passwords in .txt and saved them on the desktop


    Take action - Jane asked these employees to delete the .txt files that contain their passwords


    Analysis - Jane got access to the .txt files with the passwords and assessed how important those accounts are and how sensitive the information is.
  19. Performing threat intelligence
    Network ownership-each IP address and domain on the internet has an owner.This is the organization or person who register it.

    Whois- part of the domain tools which show information related to registered domains and ip addresses
  20. Hacking lifecycle

    Reconnaissance
    To understand the networks ,devices and systems and applications under review
  21. Device reconnaissance

    List the hardware manufacturer make and model
    Apple -MacBook Pro 13inch mid 2010

    • List the operating system(include the edition version and OS if available )
    • -Macintosh operating system mid2010
    • -macOS high sierra version 13.6.2

    List two or three applications used on your device.For each include the version information if available.

    • Brave browser v1 .47 .171 (Jan 12,2023)
    • System information version 10.13(915)
  22. Hacking lifecycle
    You’ve taken the first step in the hacking lifecycle by capturing device,operating system and application information.Your answers may vary based on the device you use and applications selected …
  23. Break it (“we learn how things can break by understanding or weaknesses “)
    Which stage of the hacking lifecycle tries to understand system or application vulnerabilities
  24. When ethical hackers see a problem,they keep it secret to protect the owner getting exploited
    False -the ethical disclosure -when you see something ,say something
  25. You should always have explicit or written permission before you test ,attack or try to break anything that doesn’t belong to you as a part of the hacking process
    True …you need a “get jail free” card from the arrest owner to stay out of trouble if something should go wrong when your testing
  26. Which controls fit into the basic controls (implementational group)?
    -Hardware and software inventory

    - vulnerability management

    -controlling the use of administrator accounts
  27. Which controls fit into the basic controls (implementation group)
    • -Hardware and software inventory
    • -vulnerability management
    • -controlling the use of administrator accounts
  28. Which controls fit into the foundational controls (implementation group)
    -malware defenses and data protection
  29. Which controls fit into the organizational controls (implementation group)
    Security and awareness training
Author
bvxlsvhdals
ID
360806
Card Set
Updating and patching
Description
Updated