Intro to Cybersecurity

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Cryptography key concepts

- confidentiality - integrity - authentication - non-repudiation - cryptoanalysis - cipher - plaintext - ciphertext - encryption - decryption

antivirus/antimalware

- specialized software that can detect, prevent & even destroy a computer virus or malware - uses malware definitions - scans the system & search for matches against the malware definitions - these definitions get constantly updated by vendors

collisions

2 different plaintexts having the same hash

OWASP (Open Web Application Security Project)

An organization that maintains a list of the top 10 errors found in web applications.

XOR

Exclusive Or, is the "secret sauce" behind modern encryption

Technical implementations for availability

RAIDS, Clusters, ISP Redundancy, & Back-Ups

Who created the 1st national policy on cybersecurity?

Ronald Reagan

known ciphertext attack

Statistical tools can be used to attempt to discover a pattern in the ciphertexts, which can then be used to reveal the plaintext or key

Decryption

The process of converting a ciphertext into plaintext.

Cryptoanalysis

The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption.

threat

an event, natural or man-made, able to cause negative impact to an organization.

Stream Cipher

encrypt or decrypt bit per bit

Authentication concept: identity proof -

on most systems, it will ask you to provide identity & authentication

Payment Card Industry Data Security Standard (PCI DSS)

payment card industry data security standard - credit card, prevent identity theft

Authentication concept: kerberos -

protocol used for implementing co sign on

proxy firewall

- acts as intermediary server - proxies terminate connections & initiate new ones, like a MITM - there are 2 3-way handshakes between 2 devices

Incident Response Process: Phase 1 - prepare

- conduct a criticality assessment - carry out a cyber security threat analysis, supported by realistic scenarios and rehearsals - consider the implementations of people, process, technology & information - create an appropriate control framework - review your state of readiness in cyber security IR

stateful firewall

- have state tables that allow the firewall to compare current packets w/ prev packets - could be slower than packet filters but far more secure - application firewalls can make decisions based on layer 7 info

Incident Response Process: Phase 2 - respond

- identify cyber security incident - define objectives & investigate situation - take appropriate action - recover systems, data, & connectivity

Incident Response Process: Phase 3 - Follow up

- investigate incident more thoroughly - report incident to relevant stakeholders - carry out a post incident review - communicate & build on lessons learned - update key info, controls, & processes - perform trend analysis

stateless firewall

- no concept of "state" - also called packet filter - filter packets based on layer 3 & 4 info (IP & port) - less secure

normative & compliance

- rules to follow for a specific industry - enforcement for the gov., industry or clients - event if the company or org don't want to implement those controls, for compliance

packet-filtering firewall

A firewall that examines each packet and determines whether to let the packet pass. To make this decision, it examines the source address, the destination addresses, and other data.

Substitution Cipher

A method of encryption and decryption in which each letter in the alphabet is replaced by another.

CIA Triad

Confidentiality, Integrity, Availability

Asymmetric Cryptography

In this Cryptography a Key Pair - Private and Public Key is used. Private Key(encryption) is kept secret and the Public Key(decryption) is widely distributed; slower than symmetric encryption

What is the 1st national policy on cybersecurity?

National Policy of Telecommunications and Automated Information Systems Security

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

SOX (Sarbanes-Oxley Act)

Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports.

data integrity (X.800 Style)

The assurance that data received are exactly as sent by an authorized entity

Known Plaintext Attack (KPA)

The attacker has access to a plaintext message and its corresponding ciphertext and tries to derive the correlation between two to determine the encryption key

BCP & Disaster Recovery

Understand the company in order to prepare the BCP. A BIA it's also good to have a clear understanding of the critical business areas. Also indicates if a security incident will trigger the _______ or _____________________

Symmetric Cryptography

Uses the same secret key to encode and to decode a message

Frameworks/ baselines / best pracices

a basic structure of objectives and goals required to meet the criteria of an individual course

exploit

a defined way to breach the security of an IT system through a vulnerability

vulnerability

a flaw, loophole, oversight, or error that can be exploited to violate a system security policy.

pentesting/ethical hacking

a method of evaluating computer & network security by simulating an attack on a computer system or network from external & internal threats

Application gateway firewalls

a network device or computer that serves as a firewall and an intermediary between internal computers and computers on the internet

Virus

a piece of malicious code that spreads from one computer to another by attaching itself to other files using self replication.

Business Continuity Plan (BCP)

a plan that specifies how to resume not only IT operations but all business processes in the event of a major calamity

Worms

a self-replicating program able to propagate itself across a network, typically having a detrimental effect, such as turning the computer into a zombie.

Governance: Policies

a set of baseline rules

risk

a situation involving exposure to danger; the probability of a vulnerability being exploited.

incident management component: response team -

a team that receives reports of security breaches, conducts analyses of the reports and responds to the senders

Authentication concept: Mutual authentication -

a type of authentication process used to communicate to systems. ex: MS-CHAP v2

Cryptographic attack: Brute force

an attack based on trial & error, & effectively would work through submission of many passwords or fast traces to hope that eventually it will guess correctly.

incident management component: events -

an observed change to the normal behaviour of a system, environment, process, workflow or person.

Malware (Malicious Software)

any undesired or unauthorized piece of software running on a host either to disrupt operations or to use the host resources for its benefit.

two types of firewalls

application-level & packet-filtering

Authentication (X.800 Style)

assurance that communicating entity is the one claimed; have both peer-entity & data origin ________________

SYN flooding attack

attacker establishes many bogus TCP connections, no resources left for "real" connections

encryption, authentication, access controls, & physical security

can force confidentiality

e-discovery

data inventory, helps to understand the current tech status, data classification, data management, we could use automated systems. Understand how you control data retention & backup.

tradeoff

degree of communication w/ outside world, level of security

Technical implementations of non-repudiations

digital signatures & logs

Governance: Procedures

each policy may have a _____ associated w/ details regarding the operative process

Block Cipher

encrypts or decrypts in blocks or several sizes, depending on the algorithm

XML Gateway

examines the payload of the ___ message. - uses port 80 on a firewall.

hash cryptography

function provides encryption using an algorithm and no key; provides integrity verification

Access criteria for authorization by:

groups time frame & specific dates physical location transaction type

What are the 2 main types of security threats?

human threats & natural threats

integrity

implemented to verify & validate if the information that we sent or received hasn't been modified by an unauthorized person of the system

The OCTAVE Method

is an InfoSec risk evaluation methodology that allows organizations to balance the protection of critical information assets against the costs of providing protective and detection controls

incident management component: incident -

is an event that negatively effects the confidentiality, integrity, &/or availability at an organization in a way that impacts the business

Firewalls

isolates organization's internal net from larger internet, allowing some packets to pass, blocking others

availability

makes sure that information & data is always available when needed

1st point to consider during vulnerability assessments:

many systems are shipped with known & unknown security holes and bugs, & insecure default settings

2nd point to consider during vulnerability assessments:

many vulnerabilities occur as a result of misconfigurations by a system admin

SHA-2

newer & recommended hash algorithm

Plaintext

normal text that has not been encrypted

SHA-1 & MD5

older hash algorithms prone to collision

Ciphertext

plaintext that was transformed into unreadable gibberish using encryption

Governance: strategic & tactic plans

plans based on the goals & objectives for the organization

access control (X.800 Style)

prevention of the unauthorized use of a resource

non-repudiation (X.800 Style)

protection against denial by one of the parties in a communication

Data Confidentiality (X.800 Style)

protection of data from unauthorized disclosure

Graham-Leach-Bliley Act (GLBA) (Financial Services Modernization Act of 1999)

repealed a 1933 law that barred the consolidation of financial institutions and insurance companies. Included within ____ are multiple sections relating to the privacy of financial information. Companies must provide written notice to consumers of their privacy rights and explain the company's procedures for safeguarding data.

Availability (X.800 Style)

resource accessible/usable

post incident

root-cause analysis, understand the difference between error, problem and isolated incident. Lessons learned & reports are key

IP spoofing attack

router can't know if data " really" comes from claimed source

Cryptography

secret writing; secure communication that may be understood by the intended recipient only

Authentication concept: SID's vs DACL's -

security ID(active directory): unique ID's givien to objects and subjects discretionary access control list: a type of access control that allows the user to give access to their own data to whomever they want

incident management component: investigation -

seeks to determine the circumstances of the incident; collect evidence; chain of custody

Demilitarized Zone (DMZ)

sometimes referred to as a perimeter network or screened subnet, is a physical or logical subnetwork that contains & exposes an organization's external facing services to an untrusted, usually larger, network such as the internet

there are 3 primary types of cryptography:

symmetric, asymmetric, & hash

hashes or algorithms

technical controls that can be implemented to show integrity

Security Policies

technical policies that are derived from logical business policies

Social Engineering

techniques that trick a person into disclosing confidential information

Confidentiality

the act of holding information in confidence, not to be released to unauthorized individuals

security mechanisms

the combination of hardware, software, and processes that enhance IP security

cipher

the generic term for a technique (or algorithm) that performs encryption

Incident Response

the monitoring & detection of security events on a computer or a computer network & the execution of proper resources to those events

Authorization

the process of allowing somebody to access a specific object.

Governance

the processes that ensure the effective & efficient use of IT in enabling an org to achieve its goals

Public Key Infrastructure (PKI)

the system for issuing pairs of public and private keys and corresponding digital certificates

Information Security Analyst

this position conducts information security assessments for organizations & analyzes the events, alerts, alarms, and any info that could be useful to identify any threats that could compromise the organization.

Information Security Auditor

this position is in charge of testing the effectiveness of computer information systems, including the security of the systems & reports their findings

Rainbow tables (cryptographic attacks)

use a limited amount of info or entity, or files, & they actually contain 3 hash passwords that we can check against hash customers, that makes the attacks a lot faster

automated systems

using SIEM, SOA, UBA, big data analysis, honeypots/honeytokens, AI or other technologies we could enhance the mechanism to detect & control incidents that could compromise the tech environment

Non-repudiation

valid proof of the identity of the data sender or receiver


Set pelajaran terkait

Épocas y Movimientos Literarios

View Set

Romeo and Juliet Characters Act 1-2

View Set

Additive Inverse and Identity, Multiplicative Inverse, Identity, and property of zero Commutative Associative Distributive Properties

View Set

Nutrition Ch. 6: Protein and Amino Acids

View Set

ARRT Prep questions: Extremities

View Set

Chapter 25 - Fluid and Electrolytes

View Set

Trying to prepare for Robert Hall Tech test: Node.js

View Set