System Security Final

Ace your homework & exams now with Quizwiz!

RSA

A commonly used encryption and authentication algorithm named for MIT students, An asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after its creators, Rivest, Shamir, and Adleman, and RSA is also the name of the company they founded together. RSA relies on the mathematical properties of prime numbers when creating public and private keys.

Risk Methodology

A description of how you will manage risks. Includes the approach, required information, and the techniques to address each risk.

Switch

A device for transmitting data on a network. A switch makes decisions, based on the media access control (MAC) address of the data, as to where the data is to be sent.

Router

A device that forwards data packets between computer networks

Hub

A device that is the central connecting point of a LAN. A hub is little more than a multi-port repeater taking incoming signals on one port and repeating them to all other ports. Ethernet hubs have been largely replaced by Ethernet switches.

What is a security audit?

A security audit is to make sure your system and security controls work as expected.

Firewall

A software program or hardware device designed to prevent unauthorized access to computers or networks.

Risk Assignment

Allows the organization to transfer the risk to another entity.

What are the activities/responsibilities happening on each layer of the OSI Model?

Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, and Physical Layer.

Confidential

Applies to information that the classifying authority finds would cause damage to national security.

Top Secret

Applies to information that the classifying authority finds would cause grave damage to national security if it were disclosed.

Secret

Applies to information that the classifying authority finds would cause serious damage to national security if it were disclosed.

Authorization

Approving someone to do a specific task or access certain data.

What could be proved by an asymmetric digital signature vs a symmetric digital signature and what is the fancy name for the thing that can be proved?

Asymmetric Digital Signature - Data encrypted with one key can be decrypted only with the other key. Symmetric Digital Signature -uses the same key to encrypt and decrypt.

Quantitative Risk Analysis

Attempts to describe risk in financial terms and put a dollar value on all the elements of a risk.

What are the components of a business continuity plan?

BCP &DRP

What are the components of a business continuity plan?

BCP and DRP

Types of hackers

Black-hat Hackers, Gray-hat Hackers, and White-hat Hackers

Remote Access Domain Vulnerabilty

Brute-force attacks on access and private data, Unauthorized remote access to resources, and Data leakage from remote access or lost storage devices.

BCP

Business continuity plan. A plan that helps an organization predict and plan for potential outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage.

What SSID beaconing and why is it considered a weakness of Wireless LANs?

By default, wireless networks brodcast their presence to the public sending out announcements containing the network's service identifier (SSID).

Penetration Testing

Method of evaluating the security of a computer system or network, by simulating a malicious attack instead of just scanning for vulnerabilities

What are the primary components of Risk Management?

Mitigation, assignment, acceptance and avoidance.

What is an advantage of IPv6 over IPv4

More host addresses

What is a backdoor?

Obtaining admin access to a computer system while attempting to remain undetected

How does Risk Management affect security roles?

Pages 252-253

What is the difference between a broad firewall and a multi-layered firewall and when is i appropriate to use each type?

Pages 330-332

Health Insurance Portability and Accountability Act (HIPPA)

Passed in 1996, requires health care organizations to secure to secure patient information.

Compliance Laws - Gramm-Leach-Bliley Act

Passed in 1999, requires all types of financial institutions to protect customers' private financial information.

Children's Internet Protection Act (CIPA)

Passed in 2000, requires public schools and public libraries to use an Internet safety policy. The policy must address the following: Children's access to inappropriate matter on the Internet, Children's security when using e-mail, chat rooms, and other electronic communications, restricting hacking and other unlawful activities by children online, disclosing and distributing personal information about children without permission, and restricting children's access to harmful materials.

Compliance Laws - Sarbanes Oxley Act

Passed in 2002, it requires publicly traded companies to submit accurate financial reporting. It does not require securing private information, but it does require security controls to protect the confidentiality and integrity of the reporting itself.

What are the types of Access Control?

Physical access controls - Control entry into buildings, parking lots and protected areas. Logical - Control access to a computer system or network.

IT Security Policy Framework

Policy, Standard, Procedures and Guidelines.

What are the four security objectives for internal security and what do they mean?

Privacy, Integrity, Authorization and Access Control

Identify and define router, switch, hub and firewalls? Which one would you not see on a corporate network?

Hub - because it broadcasts to everyone, increasing traffic.

What are controls that monitor activity?

IDS, IPS and Firewalls

What are the controls that monitor activity?

IDS, IPS andFirewalls

How does identification and authorization work together in the access control process?

Identification is the method a subject uses to request access to a system or resource. Authorization is the process of deciding who has access to which computer and network resources.

What is a baseline and how does it pertain to security monitoring?

In order to recognize something as abnormal, you first must know what normal looks like. The baseline is the normal state of the system.

Public Domain Data

Information or data shared with the public such as web site content, white papers, etc.

Confidential Data

Information or data that is owned by the organization. Intellectual property such as customer lists, pricing information, and patents.

IDS

Intrusion detection system. A detective control used to detect attacks after they occur. A signature-based IDS (also called definition-based) uses a database of predefined traffic patterns.

Privacy

Keeps information readable only by authorized people.

Confidentiality

Keeps information secret from all but authorized people.

User Domain Vulnerability

Lack of awareness or concern for security policy, Accidental acceptable use policy violation, Intentional malicious activity, and Social engineering

What are monitoring issues for logging?

Logging produces too much information and takes up disk space.

Data classification standards, know the types of data and how they are classified.

Private data,Confidential, Internal use only, and public domain data.

Identify the different Asymmetric Cryptographic Applications?

RSA, DSA & SHA

Transposition Cipher

Rearranges characters or bits of data.

When developing, implementing and designing and organization you often must comply with the rules on what level?

Regulatory Compliance

Substitution Cipher

Replaces bits, characters, or blocks of information with other bits, characters, or blocks.

Access Control

Restricting information to the right people.

What are the primary components of Risk Management?

Risk Mitigation (reduction), Risk assignment (transference), Risk Acceptance, and Risk Avoidance.

SHA

Secure Hash Algorithm - A one way hash algorithm designed to ensure the integrity of a message.

What is a worm and how does it propagate?

Self-contained programs designed to propagate from one host machine to another, using the host's own network communication protocols.

Operating System Defense

Serves as an interface between application software and hardware resources. Controls to secure the operating system are important. These include: Deploying change-detection and integrity-checking software and maintaining logs, deploying or enabling change-detection and integrity-checking software on all servers, ensuring that all operating systems are consistent and have been patched with the latest updates from vendors, ensuring that only trusted sources are used when installing and upgrading OS code, and disabling any unnecessary OS services and processes that may pose a security vulnerability.

LAN Domain Vulnerability

Unauthorized network access, transmitting private data unencrypted, and spreading malicious software.

System/Application Domain Vulnerability

Unauthorized physical or logical access to resources, Weakness in server operating system or application software, and Data loss from errors, failures or disasters.

Workstation Domain Vulnerability

Unauthorized user access, Malicious software introduced, and weaknesses in installed software.

What are the four types of attacks?

Unstructured, Structured, Direct and Indirect.

Risk Mitigation

Uses various controls to mitigate or reduce identified risks. These controls might be administrative, technical or physical.

Standard

a detailed written definition for hardware and software and how it is to be used. Standards ensure that consistent security controls are used throughout the IT system.

IPS

a device that can take immediate action during an attack to block traffic, blacklist an IP address, or segment an infected host

Gray-hat Hackers

a hacker with average abilities who may one day become a Black-hat or White-hat hacker.

Policy

a short written statement that the people in charge of the organization have set as a course of action or direction. A Policy comes from upper management and applies to the entire organization.

Guidelines

a suggested course of action for using the policy, standards, or procedures. Guidelines can be specific or flexible regarding use.

Vulnerability

a weakness that allows a threat to be realized or to have an effect on an asset.

Threats

any action that could damage an asset. Threats include natural and human-induced threats.

Procedures

are written instructions for how to use polices and standards. The may include a plan of action, installation, testing and auditing of security controls.

Brewer and Nash Integrity Model

based on the mathematical theory published in 1989 to ensure fair competition. It is used to apply dynamically changing access permissions.

Private Data

information which is confidential and only ethically available to selected individual.. The right to keep certain things to yourself; not for public viewing.

Risks

the likelihood that something bad will happen to an asset. The exposure to some event that has an effect on an asset.

Black-hat Hackers

tries to break IT security for the challenge and to prove technical prowess. They tend to poke holes in a system but do not attempt to disclose vulnerabilities they find to the administration.

White-hat Hackers

uses different penetration-test tools to uncover vulnerabilities so that they can be fixed.

What are monitoring issues for logging?

...

What does a bushiness impact analysis determine?

...

Steps of the System Life Cycle

1. Project initiation and planning 2. Functional requirements and definition 3. System-design specification 4. Build (develop) and document 5. Acceptance testing 6. Implementation

In the change management process, what are the configuration control and change control?

Configuration control is the management of the baseline settings for a system device. The baseline settings meet security requirements. They require that you implement them carefully and only with prior approval. Change control is the management of changes to the configuration. Unmanaged changes introduce risk, because they might affect security operations or controls. An improper change could even disable the system or equipment. Change control ensures that any changes to a production system are tested, documented, and approved. The change itself must follow a change control process that ensures you make the changes correctly and report it to management.

Authentication

Confirms the identity of an entity.

Risk Avoidance

Deciding not to take the risk by discontinuing use because the potential loss to the company exceeds the potential value gained.

Network Infrastructure Defense

Deploys controls to protect your network by creating choke points in the network, Using proxy services and bastion hosts to protect critical services, using content filtering at choke poi to screen traffic, disabling any unnecessary network services and processes that may pose a security vulnerability, maintaining up-to-date IDS signature databases, and applying security patches to network devices to ensure protection against new threats and to reduce vulnerabilities.

Qualitative Risk Analysis

Describes a risk scenario and then figures out what impact the event would have on business operations.

What does a business impact analysis determine?

Determines the impact that a particular incident would have on business operations over time and drives the choice of the recovery strategy and the critical business functions.

DSA

Digital Signature Algorithm. A digital signature is an encrypted hash of a message. The sender's private key encrypts the hash of the message to create the digital signature. The recipient decrypts the hash with the sender's public key, and, if successful, it provides authentication, non-repudiation, and integrity. Authentication identifies the sender. Integrity verifies the message has not been modified. Non-repudiation is used with online transactions and prevents the sender from later denying they sent the e-mail.

DRP

Disaster recovery plan. A document designed to help a company respond to disasters, such as hurricanes, floods, and fires. It includes a hierarchical list of critical systems and often prioritizes services to restore after an outage. Testing validates the plan. Recovered systems are tested before returning them to operation, and this can include a comparison to baselines. The final phase of disaster recovery includes a review to identify any lessons learned and may include an update of the plan.

What are the formal models of access control?

Discretionary access control (DAC) - the owner of the resource decides who gets in. The owner can give that job to others. Mandatory access control (MAC) - permission to enter a system is kept by the owner and cannot be given to someone else. Non-discretionary access control - access controls are closely monitored by the security administrator. Rule-based access control - a list of rules, maintained by the data owner, determines which users have access to objects.

Non-replication

Enables you to prevent a party from denying a previous statement or action.

Integrity

Ensures no one, even the sender, changes information after transmitting it.

Integrity

Ensures that no one has changed or deleted data.

LAN-to-WAN Domain Vulnerability

Exposure and unauthorized access of internal resources to the public, Introduction of malicious software, and Loss of productivity due to internet access.

Application Defenses

Software applications provide end users with access to shared data. Some common controls include the following: Implementing regular antivirus screening on all host systems, ensuring that virus definition files are up to date, requiring scanning of all removable media, installing personal firewall and IDS software on hosts as an additional security layer, deploying change detection software and integrity checking software and maintaining logs, implementing e-mail usage controls and ensuring that e-mail attachments are scanned, establishing a clear policy regarding software installations and upgrades, ensuring that only trusted sources are used when obtaining, installing, and upgrading software through digital signatures and other validations.

What is a transposition cipher, a substitution cipher and which one is a Caesar Cipher?

Substitution is a Caesar Cipher.

Security Gap

The difference between the security controls in place and the control you need in order to address all vulnerabilities.

Data Classifications Standards

The goal and objective of data classification standard is to provide a consistent definition for how an organization should handle and secure different types of data. (Private Data, Confidential Data, Internal Use Only and Public Domain Data.

Risk Vulnerability

The likelihood that something bad will happen.

Principles of least privilege

The principles of least privilege, means giving a user account only those privileges which are essential to that user's work.

What is a security audit?

The purpose of a security audit is to make sure your systems and security controls work as expected. Includes Monitor, Audit, Improve & Secure.

Know the government data classification standards.

Top Secret, Secret and Confidential

WAN Domain Vulnerability

Transmitting private data unencrypted, Malicious attacks from anonymous sources, Denial of Service attacks, and Weaknesses in software.


Related study sets

Algebra I - Unit 1: Foundations of Algebra Test

View Set

6a. Basic Concepts of Sensation and Perception

View Set

Microsoft Excel Vocats Test Modules 1-4

View Set

FIN 3110 Chapter 1, FIN 3110 Chapter 2, FIN 3110 Chapter 3, FIN 3110 Chapter 4

View Set

Fichas de Estudio para el Interpretivo 12/11/20

View Set