• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/113

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

113 Cards in this Set

  • Front
  • Back

Looking for potential risks

Vulnerability Assessment

Confirms or denies vulnerabilities

Penetration Testing

HTTPS port

443

Someone with knowledge and privilege from within the organization

Insider Threat

Someone trying to access an organization's resources from outside the organization

External Threat

FTP port

21

SSH port

22

TFTP port

69

HTTP port

80

POP3

110

Telnet port

23

SMTP port

25

SNMP port

161

DNS port

53

System placed within a DMZ or private network that is designed to lure malicious users away from production environments

Honeypots

Entire network designed to attract attackers away from production environments

Honeynets

Used to identify potential threats and weaknesses within a network infrastructure

Vulnerability Scanners

Multi-platform scanner

GFI LANguard

Patch, configuration and compliance auditing

Nessus

Identify IT exposures and prioritize remediation

Retina

Locates application-level vulnerabilities

IBM ISS Internet Scanner

Specifically designed to help monitor the behavior and health of the Mac OS-X system

X-Scan

Security Auditors Research Assistant - Carries out multi-vendor system-level tests instead of application-level tests

SARA

Performs assessments using a web-based tool

QualysGuard

Uncovers areas of weakness and recommends fixes

SAINT

Provides a streamlined method to identify missing security updates and common misconfigurations

MBSA

Vulnerability scan that will not directly attack a system

Passive Vulnerability Assessment

Vulnerability scan that can disrupt normal network operations and trigger alerts

Active Vulnerability Assessment

Evaluate security posture using the same techniques employed by cyber criminals

CORE Impact Pro

Hundreds of exploits on automated exploitation system and development framework

CANVAS

Helps verify vulnerabilities and manage security assessments

Metasploit

Ability to know and fully understand how your network should be performing day-to-day

Network Baseline

TCP/IP Model Layer 1

Network Access

TCP/IP Model Layer 2

Internet

TCP/IP Model Layer 3

Transport (TCP/IP)

TCP/IP Model Layer 4

Application (TCP/IP)

OSI Model Layer 1

Physical

OSI Model Layer 2

Data Link

OSI Model Layer 3

Network

OSI Model Layer 4

Transport (OSI)

OSI Model Layer 5

Session

OSI Model Layer 6

Presentation

OSI Model Layer 7

Application (OSI)

Layer 4 Encapsulation Units

Segments

Layer 3 Encapsulation Units

Packets

Layer 2 Encapsulation Units

Frames

Layer 1 Encapsulation Units

Bits

A company wants to know what damage can occur from an attacker who has access to network and application data

White Box Test

A company wants to know what damage can occur when an attacker has gained no prior knowledge of their network

Black Box Test

A company wants to know what damage can occur when an attacker has taken the time to research available information

Gray Box Test

A company wants to find out how attackers can use company information in an attempt to attack the network

Blind Test

A company wants to find out how attackers can use network design vulnerabilities can be exploited if attackers know the network

Targeted Testing

A company runs a test without telling very many people

Double-Blind Test

Organization avoids risk altogether

Risk Avoidance

Placing responsibility of the risk on someone else

Risk Transfer

Organization approaches the vulnerability as a must fix scenario.

Risk Mitigation

Vulnerability has been identified, but due to the nature and the business necessity, is accepted

Risk Acceptance

An organization warns of retaliation if affected

Risk Deterrence

Does not include fault tolerance

RAID 0

Data is mirrored

RAID 1

Disk striping with parity

RAID 5

Involves individuals sitting around a table with a facilitator discussing situations that could arise and how best to respond to them

Tabletop Exercise

This is a monetary measure of how much loss you could expect in a year.

Annual Loss Expectancy (ALE)

Monetary value representing how much you expect to lose at any one time

Single Loss Expectancy (SLE)

The likelihood of an event occurring within a year

Annualized Rate of Occurrence (ARO)

Measure of the anticipated incidence of failure for a system or component

Mean Time Between Failures (MTBF)

The average time to failure for a nonrepairable system

Mean Time to Failure (MTTF)

Measurement of how long it takes to repair a system or component once a failure occurs

Mean Time to Restore

Hosting services and data on the Internet instead of hosting it locally

Cloud Computing

Vendors allow apps to be created and run on their infrasturcture

Platform as a Service (PaaS)

Applications are remotely run over the web.

Software as a Service (SaaS)

Utilizes virtualization and clients pay an outsourcer for resources used

Infrastructure as a Service (IaaS)

This attack occurs when information is captured over a network and used at a later time

Replay Attack

Process of trying to guess passwords with the use of a password cracker

Brute-force Attack

Process of manipulating traffic by sending users who think they are accessing a specific host to a different host

Pharming Attack

Involves using software on the victim's computer to allow the attacker to gain access to the computer without logon credentials

Backdoor Attack

Newer algorithm that is not supported by NTLM. It is one of the more secure encryption algorithms used.

Advanced Encryption Standard (AES)

Hash algorithm used by NTLM

Message Digest Algorithm (MD4)

An older block cipher that uses a 56-bit key

Data Encryption Standard (DES)

Designed to ensure the integrity of a message. It is a one-way hash that provides a 256-bit hash value that can be used with an encryption protocol

Secure Hash Algorithm (SHA-256)

Given as part of a security posture assessment that provides a starting point from which changes will be made

Baseline Configuration

Part of a security posture assessment that places emphasis on ensuring that the current environment is continuously monitored for security

Continuous Security Monitoring

Information that only an individual shoud know, such as a PIN

Something You Know

Uses character-based authentication, which is based on the physical traits of individuals

Something You Are

Is ownership-based, whereby you possess a physical item or device

Something You Have

Authentication factor is based on an individual's actions or behaviors

Something You Do

Based on an individual's geographic location (geolocation) during the authentication process

Somewhere You Are

First step when establishing business impact analysis (BIA)

Identify Critical Functions

Second step when establishing business impact analysis (BIA)

Identify Dependencies

Third step when establishing business impact analysis (BIA)

Determine Maximum Allowable Downtime

Fourth step when establishing business impact analysis (BIA)

Identify Possible Threats

Fifth step when establishing business impact analysis (BIA)

Determine Mitigation Techniques

Designed to avoid discovery by actively seeking out antivirus programs and attempting to disable or infect them

Retrovirus

System Characterization

NIST SP 800-30


Step 1: Define the scope of the system and identify critical data

Threat Identification

NIST SP 800-30


Step 2: Note all human, natural, and environmental hazards to the system

Vulnerability Identification

NIST SP 800-30


Step 3: Assess systems and applications in terms of their ability to withstand hazards

Control Analysis

NIST SP 800-30


Step 4: Assess technical and non-technical measures to strengthen systems against attack

Likelihood Determination

NIST SP 800-30


Step 5: Consider vulnerabilities, threat sources, and existing or planned controls to rate the probability of threat realization

Impact Analysis

NIST SP 800-30


Step 6:

Risk Determination

NIST SP 800-30


Step 7:

Control Recommendations

NIST SP 800-30


Step 8:

Results Documentation

NIST SP 800-30


Step 9:

Requests

Change Control Management


Step 1:

Impact Assessment

Change Control Management


Step 2:

Accept or Reject

Change Control Management


Step 3:

Build and Test

Change Control Management


Step 4:

Notification

Change Control Management


Step 5:

Implementation

Change Control Management


Step 6:

Validation

Change Control Management


Step 7:

Documentation

Change Control Management


Step 8:

A sudden and unexpected event causing a great loss of life, damage, hardship, or business failure.

Disaster

The responsibility between the service provider and the client

Service-level agreements

When an asset has been designed in such a way that when an event causes the computing component to fail, a backup component or procedure immediately takes its place with no loss of service

Fault Tolerance