Comptia Exam Objectives Security+
759 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Phishing
fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.
Smishing
When someone tries to trick you into giving them your private information via a text or SMS message.
Vishing
Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward
Spam
irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware
SPIM
Spam delivered through instant messaging (IM) instead of through e-mail messaging
Spear Phishing
the act of sending emails to specific and well-researched targets while pretending to be a trusted sender
Dumpster Diving
exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault.
Shoulder Surfing
When someone watches over your shoulder to nab valuable information as you key it into an electronic device.
Pharming
cyberattack intended to redirect a website's traffic to another, fake site.
Tailgating
Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.
Eliciting Information
Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform
Whaling
Spear phishing that focuses on one specific high level executive or influencer
Prepending
Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object.
Identity Fraud
identity fraud is the use of stolen information such as making fake ID's and fake bank accounts
Invoice Scams
using fraudulent invoices to steal from a company
Credential Harvesting
the use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse.
Reconnaissance
- Information gathering about a target network
Hoax
Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money.
Impersonation
typically involves an email that seems to come from a trusted source.
Watering hole attack
security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment.
Typo squatting
type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system
Pretexting
the practice of presenting oneself as someone else in order to obtain private information.
Influence campaigns
actors designed to sow discord, manipulate public discourse, discredit the electoral system, bias the development of policy, or disrupt markets for the purpose of undermining interests
Hybrid warfare
- Combining conventional warfare with cyberwarfare
Social Media Campaign
Planned, coordinated marketing efforts using one or more social media platforms.
Principles:
Authority: an attacker may try to appear to have a certain level authority. Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes. Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same. Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline. Familiarity: they make you familiar with them on the phone and make you want to do things for them. Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted. Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags.
Malware
a program or file designed to be disruptive, invasive and harmful to your computer.
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
Worms
Independent computer programs that copy themselves from one computer to other computers over a network
potentially unwanted program (PUP)
program that installs itself on a computer, typically without the user's informed consent
Fileless virus
Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.
command and control
A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network
Bots
self-propagating malware that infects its host and connects back to a central server(s).
Cryptomalware
Malware to remain in place for as long as possible, quietly mining in the background.
logic bomb
A computer program or part of a program that lies dormant until it is triggered by a specific logical event.
Spyware
Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.
Keyloggers
software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.
Remote Access Trojan
type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine.
Rootkit
software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine
Backdoor
refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.
Password Attack
Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.
Spraying password attack
an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords.
Dictionary password attack
An attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry as a password.
brute force password attack (offline and online)
an attempt to guess a password by attempting every possible combination of characters and numbers in it
Rainbow Tables
an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password
Plaintext/unencrypted password attack
the attacker has access to pairs of known plaintexts and their corresponding ciphertexts. The goal is to guess the secret key (or a number of secret keys) or to develop an algorithm which would allow him to decrypt any further messages.
Malicious universal serial bus (USB) cable
usb which performs an unexpected, and unwanted function.
Malicious flash drive
USB sticks are leveraged where an attacker needs physical access to a computer. The first notorious incident was observed back in 2010 when the notorious Stuxnet worm was distributed via USB sticks to launch attacks on the networks of an Iranian facility
Card cloning
the practice of making an unauthorized copy of a credit card. ... It requires copying information at a credit card terminal using an electronic device or software, then transferring the information from the stolen card to a new card or rewriting an existing card with the information.
Skimming
Illegal practice used by identity thieves to capture credit card information from a cardholder surreptitiously.
Adversarial artificial intelligence (AI)
1. Tainted training for machine learning (ML) 2. Security of machine learning algorithms
Supply-chain attacks
when hackers manipulate the code in third-party software components in order to compromise the 'downstream' applications that use them.
Cloud-based vs. on-premises attacks
Data center employees are there solely to protect your data. Keep data secure with high efficiency from the start
Cryptographic attacks
1. Birthday: 2. Collision: 3. Downgrade:
Privilege escalation
type of network attack used to obtain unauthorized access to systems within the security perimeter, or sensitive systems, of an organization.
Cross-Site Scripting (XSS)
A web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. It allows an attacker to circumvent the same origin policy, which is designed to segregate different websites from each other.
Injections
the exploitation of a computer bug that is caused by processing invalid data into a vulnerable computer program and change the course of execution.
Structured query language (SQL)
A relational data language that provides a consistent, English keyword-oriented set of facilities for query, data definition, data manipulation and data control. It is a programmed interface to relational database management systems
Dynamic link library
collection of small programs that can be loaded when needed by larger programs and used at the same time. The small program lets the larger program communicate with a specific device, such as a printer or scanner.
Lightweight directory access protocol (LDAP)
an open and cross platform protocol used for directory services authentication
Extensible markup language (XML)
Used to describe data. The standard is a flexible way to create information formats and electronically share structured data via the public Internet, as well as via corporate networks
Pointer/object dereference
Occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit
Directory traversal
HTTP attack which allows attackers to access restricted directories and execute commands outside of the web server's root directory
Buffer overflows
Insertion of malicious code into memory by overrunning buffers outside of their assigned memory space.
Race conditions(Time of check/time of use)
when a software program depends on the timing of one or more processes to function correctly
Error handling
Refers to the routines in a program that respond to abnormal input or conditions
Improper input handling
The term used to describe functions such as validation, sanitization, filt ering, or encoding and/or decoding of input data.
Replay attack (session replays)
When a cybercriminal eavesdrops on a secure network communication, intercepts it, and then fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants.
Integer overflow
the condition that occurs when the result of an arithmetic operation, such as multiplication or addition, exceeds the maximum size of the integer type used to store it. If a programmer stores the value 127 in such a variable and adds 1 to it, the result should be 128
Request forgeries
1. Server-side 2. Cross-site
Application programming interface (API) attacks
Hostile usage, or attempted hostile usage, of an API
Resource exhaustion
The depletion effect which is manifested in the higher marginal recovery costs encountered as the resource stock is depleted.
Memory leak
When an application requests memory but never releases it
Secure sockets layer (SSL) stripping
A technique that downgrades your connection from secure HTTPS to insecure HTTP and exposes you to eavesdropping and data manipulation.
Driver manipulation
attackers into device drivers so that they undermine security on your computer.
Shimming
Additional code that can be run instead of the original driver
Refactoring
Improving the internal structure of an existing program's source code, while preserving its external behavior.
Pass the hash
A hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. It replaces the need for stealing the plaintext password with merely stealing the hash and using that to authenticate with.
Wireless Evil Twin
Attack involves an attacker setting up a fraudulent wireless access point
Rogue access point
Wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.
Bluesnarfing
Theft of user Bluetooth-enabled devices data.
Bluejacking
Some users with Bluetooth-enabled mobiles use this technology to send anonymous text messages to strangers.
Disassociation
A type of DoS attack in which the attacker breaks the wireless connection between the victim device and the access point.
Jamming
The transmission of radio signals that disrupt communications by decreasing the Signal-to-Inference-plus-Noise ratio
Radio frequency identifier (RFID)
A wireless system comprised of two components: tags and readers .Tags, which use radio waves to communicate their identity and other information to nearby readers, can be passive or active.
Near Field Communication (NFC)
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.
Initialization Vector (IV)
A 24-bit value used in WEP that changes each time a packet is encrypted.
On-path attack(Man-in-the-middle)
Attackers place themselves between two devices (often a web browser and a web server) and intercept or modify communications between the two.
Layer 2 attacks
-Spanning Tree Protocol (STP) Attacks. -Address Resolution Protocol (ARP) Attacks. -Media Access Control (MAC) Spoofing. -Content Addressable Memory (CAM) Table Overflows. -Cisco Discovery Protocol (CDP)/Link Layer Discovery Protocol (LLDP) Reconnaissance. -Virtual LAN (VLAN) Hopping.
Address resolution protocol poisoning
Type of cyber attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table.
Media access control flooding
Setting the MAC address of your PC or any other MAC address as your device WAN port
MAC Cloning
A hierarchical system for naming resources on the Internet.
Domain Name System (DNS)
An attack where an organization's web address is stolen by another party. The other party changes the enrollment of another's domain name without the consent of its legitimate owner.
Domain jacking
Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.
DNS poisoning
A webserver function that sends a user from one URL to another.
Universal resource locator redirection
The overall "health" of your branded domain as interpreted by mailbox providers
Domain reputation
An attack that uses many computers to perform a DoS attack.
Distributed Denial of Service (DDoS)
layer 3 attack is to slow down or crash a program, service, computer, or network, or to fill up capacity so that no one else can receive service.
DDOS network
Target the application layer of the Internet in order to disrupt the normal flow of traffic to a website or service.
DDOS application
Disrupting the normal traffic from to a specific device in operation
DDOS operational technology
Any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
Malicious code or script execution
An automated task framework from Microsoft, with a command line shell and a scripting language integrated into the .NET framework, which can be embedded within other applications.
Powershell
An interpreted, object-oriented, high-level programming language with dynamic semantics.
Python
A Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement
Bash
A single instruction that expands automatically into a set of instructions to perform a particular task.
Macros
programming language you can use to create macros
Visual Basic for Applications (VBA)
a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments
Advanced Persistent Threat (APT)
Current or former employee, contractor or other partner that has or had authorized access and intentionally misused that access
Insider threats
A person who is acting on behalf of a governmental body, and is therefore subject to limitations imposed on government by the United States Constitution
State actors
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.
Hacktivists
Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so.
Script kiddies
Significant area of organized crime and consist of the supply of illegal goods and services; smuggling, bootlegging, gambling, prostitution and foreign exchange violations are examples of such crimes.
Criminal syndicates
Strives to operate in the public's best interest rather than to create turmoil.
Authorized Hackers
Intentionally gain unauthorized access to networks and systems with malicious intent.
Unauthorized hackers
computer security expert who may sometimes violate laws or typical ethical standards,
Semi-authorized hackers
Projects that are managed outside of, and without the knowledge of, the IT department
Shadow IT
An organization or country engaged in commercial or economic competition with others.
Competitors
-threats originate from sources outside of the organization and its network of partners -encompasses company full-time employees, independent contractors, interns, and other staff.
Internal/external actors
Varying degrees of expertise, so the sophistication level of the attacker, if known, can describe the attacker's skill and knowledge. Disco Team is labeled as expert due to advanced attack methods and proficiency with tools or malicious code.
Level of sophistication/capability in actors
APTs, and nation states have a penchant for long-term attacks, which requires this which only major organizations or government can manage over time.
Resources/funding (attributes of actors)
This can be simple or multifold in nature. A script kiddie is just trying to make a technique work. A more skilled threat actor is usually pursuing a specific objective, such as trying to make a point as a hacktivist. At the top of the intent pyramid is the APT threat actor, whose intent or motivation is at least threefold.
Intent/motivation (attributes of actors)
physical access vector;keylogger
Vectors direct access
vector that uses evil twin, rogue WAP
Wireless Vectors
vector that uses phishing , social engineering, malware
Vector Email
represents a unique combination of theory and front-line practice that creates clear links between supply chain tactics and financial performance.
Vector Supply Chain
vector that uses information from social media
Vector Social Media
vector that interacts with usb
Vector Removable Media
attack vector is a path or means by which a hacker can gain access to a computer or network server in order to deliver malicious outcome. Attack vectors include viruses, e-mail attachments, Web pages, pop-up windows, instant messages, chat rooms, and deception.
Vector Cloud
Is evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets.
Threat intelligence sources
Information from media (newspapers, television), public government reports, professional and academic publications, and other openly available.
Open-Source Intelligence (OSINT)
Are typically commercial solutions which incur a cost to use. Intelligence generated by these services can remain closed source, but some can trickle into the open source domain over time.
Closed/proprietary threat intelligence source
A platform aimed at collecting, maintaining, and disseminating information about discovered computer security vulnerabilities.
Vulnerability databases
An industry-specific organization that gathers and shares information on cyber threats to critical infrastructure. ISACs also facilitate the sharing of data between public and private sector groups.
Public/private information-sharing centers
The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
Dark Web
- unusual outbound traffic - anomalies in privileged account - geographic irregularities - login failures - swells in database read volume - large html responses - many requests for one file - mismatched port-applications - suspicious registry changes - spikes in dns requests from one host
Indicators of compromise
system that enables the sharing of attack indicators between the US government and the private sector as soon as the treat is verified
Automated Indicator Sharing (AIS)
An XML structured language for expressing and sharing threat intelligence
Structured Threat Information eXpression (STIX)
Effort aims to enable robust, secure, and high-volume exchanges of significantly more expressive sets of cyber threat information.
Trusted Automated eXchange of Indicator Information (TAXII)
the use of data warehouses and complex algorithms to forecast future events, based on historical trends and calculated probabilities
Predictive analysis
A visual representation of the source and destination locations around the world for the traffic
Threat maps
A central file storage location
File/code repositories
Are platforms that allow businesses to connect and collaborate with their third-party suppliers on the internet.
Vendor websites
A feed that provides the product/platform applicability statement to CPE URI matching based on the CPEs in the official CPE dictionary.
Vulnerability feeds
A formal meeting for discussion.
Conferences
A periodical publication in which scholarship relating to a particular academic discipline is published.
Academic journals
A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
Request for Comments (RFC)
A way of grouping individual companies or stocks based on common business lines
Local industry groups
The process of analyzing social media data to conduct quantitative (and at times qualitative) research in order to understand how audiences relate to topics, by using tools and data extraction techniques.
Social media research source
An ongoing stream of data related to potential or current threats to an organization's security
Threat feed research source
Describes an approach of analyzing an APT's operation or can be used as means of profiling a certain threat actor.
Adversary tactics, techniques, and procedures (TTP)
Cloud security is also typically cheaper because you don't have to spend money on dedicated hardware, plus you don't have to constantly monitor security. On-premises security, on the other hand, is exactly what it sounds like—security measures physically on the premises of a business. On-premises security refers to both the rules and tools in place to protect the security and accessibility of computer networks, including both hardware and software.
Cloud-based vs. on-premises vulnerabilities
A cyber attack that occurs on the same day a weakness is discovered in software.
Zero-day
low bit amount, no salt
Weak encryption
All permissions allowed
Open permissions
easy password, no password default password for admin account
Unsecure root accounts
lack of knowledge of the system or a lack of attention to detail, the result might be an open vulnerability that leaves the system or network exposed to security threats and potential damage
Errors in weak configurations
use of WEP or low bit encryptions in configurations
Weak encryption in weak configurations
protocols with no encryption
Unsecure protocols in weak configurations
credentials unchanged
Default setting in weak configurations
unclosed ports in weak configurations that use unsecure protocols
Open ports and services in weak configurations
potential risk that. arises from financial institutions relying on outside parties to perform services or activities on their behalf.
Third-party risks
1. System integration 2. Lack of vendor support
Vendor management
potential threat presented to organizations' employee and customer data, financial information and operations from the organization's supply-chain and other outside parties that provide products and/or services and have access to privileged systems.
Third-part risks in supply chain
-Financial/reputational: Risk that a third party could damage your revenue or reputation. ... -Legal and regulatory: Risk that a third party will impact your compliance with legislation or regulation. ... -Operational: Risk that a third party could disrupt your operations.
Third-party risks in outsourced code development
risk of data not being physically accessible
Third-party risks in data storage
Firmware: Operating system: Applications:
Improper or weak patch management
is an operating system (OS) no longer in widespread use, or that has been supplanted by an updated version of earlier technology.
Legacy platforms
data is accidentally deleted or something causes data to become corrupted;Losing files and documents often has a lasting impact on your company's financial health.
Impacts of data loss
can come in the form of damage to the target company's reputation due to a perceived 'betrayal of trust. ' Victims and their customers may also suffer financial losses should related records be part of the information stolen.
Impacts of data breaches
potentially sensitive information becomes available to external parties who may misuse or abuse it
Impacts of data exfiltration
impact your ability to get credit, but it can also hurt your job prospects and increase your auto and homeowners insurance premiums.
Impacts of identity theft
devastating, with an individual's emotional wellbeing a primary casualty, and mental health also vulnerable victims perceive a sense of judgement from society about their losses, further exacerbating emotive and social impacts.
Impacts of financial
are common when large financial losses are announced
Impacts of reputation
If your site is not available then obviously this has a negative impact on your business. Customers and potential customers can not see your website so you may lose business.
Impacts of availability loss
proactive security search through networks, endpoints, and datasets to hunt malicious, suspicious, or risky activities that have evaded detection by existing tools.
Threat hunting
a collaborative effort of two or more agencies that provide resources, expertise and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.
Intelligence fusion
are an actionable threat data associated with indicators or artifacts gathered from third-party vendors to learn from the access and visibility of other organizations to improve your own cybersecurity threat awareness and response.
Threat feeds
notify customers about one or more vulnerabilities. Customers are responsible for assessing the impact of any actual or potential security vulnerability in the context of their environment.
Advisories and bulletins
the application of force to capture, disrupt, deny, degrade, destroy or manipulate computing and information resources in order to achieve a position of advantage in respect to competitors.
Maneuver
an inspection of the potential points of exploit on a computer or network to identify security holes.
Vulnerability scans
a test result which incorrectly indicates that a particular condition or attribute is present.
False positives
a test result which incorrectly indicates that a particular condition or attribute is absent.
False negatives
interpreting and understand computer-generated records called logs
Log reviews
- make use of the admin account, do a more thorough check by looking for problems that cannot be seen from the network. -provide a quick view of vulnerabilities by only looking at network services exposed by the host.
credentialed vs. non-credentialed (vulnerability scanning)
-attempt to exploit a vulnerability when it is found. -identify a vulnerability and report on it so you can fix it
Intrusive vs. non-intrusive (scans)
Technology used to scan applications for potential vulnerabilities and weaknesses.
Application vulnerability scanner
automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as Cross-site scripting, SQL Injection, Command Injection, Path Traversal and insecure server configuration.
Web application vulnerability scan
The application of vulnerability scanning to network devices to search for vulnerabilities at the network level.
Network vulnerability scanner
a list of publicly disclosed computer security flaws.
Common Vulnerabilities and Exposures (CVE)
provides a numerical (0-10) representation of the severity of an information security vulnerability.
Common Vulnerability Scoring System (CVSS)
an independent review of hardware and software for the purpose of assessing compliance with established performance requirements, commercial and appropriate military standards, and functional, allocated, and product baselines.
Configuration review
works by combining two technologies: a) Security information management (SIM), which collects data from log files for analysis and reports on security threats and events, and b) security event management (SEM), which conducts real-time system monitoring, notifies network admins about important issues and establishes correlations between security events.
Syslog/security information and event management (SIEM)
provides an independent and in-depth assessment of the ability of an organisation to protect its information assets from the impact of cyber threats.
Review reports
a computer networking term for intercepting a data packet that is crossing or moving over a specific computer network.
Packet capture
Whenever you enter data into your computer
Data inputs
apps launched, network activity, and, most critically files accessed (when the file or email was touched, who touched it, what was done with it and how frequently).
User behavior analysis
process of computationally identifying and categorizing opinions expressed in a piece of text, especially in order to determine whether the writer's attitude towards a particular topic, product, etc. is positive, negative, or neutral.
Sentiment analysis
the automated process of collecting and analysing indicators of potential security threats, then triaging these threats with appropriate action.
Security monitoring
software function that consolidates log data from throughout the IT infrastructure into a single centralized platform where it can be reviewed and analyzed.
Log aggregation
store some logging informations, generally in order to send them to a remote location
Log Collectors
refers to technologies that enable organizations to collect inputs monitored by the security operations team.
Security orchestration, automation, and response (SOAR)
network that is known in the test enviroment
Known environment
network that is unknown in the test environment
Unknown Environment
network has some elements shown in the test enviroment
Partially known environment
inform participants of test parameters
rules of engagement
technique used by cybercriminals to systematically move through a network in search of data or assets to exfiltrate.
Lateral movement
network attack used to obtain unauthorized access to systems within the security perimeter, or sensitive systems, of an organization.
Persistence (Penetration testing)
Remove all executable, scripts and temporary file from a compromised system.
Cleanup (Penetration testing)
a reward offered to a person who identifies an error or vulnerability in a computer program or system.
Bug bounty (Penetration testing)
able to use the compromised host as a bridge to pivot to another network or system that is not directly accessible from the attacking system.
Pivoting(Penetration Testing)
An attempt to gain information about targeted computers and networks without actively engaging with the systems. The attacker engages with the target system, typically conducting a port scan to determine find any open ports.
Passive and active reconnaissance
preliminary survey to gain information
Drones (reconnaissance)
an activity consisting of using an airplane and a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect Wi-Fi wireless networks.
War flying
the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone.
War driving
the technique used for gathering information about computer systems and the entities they belong to.
Footprinting
open source intelligence, is the practice of collecting information from published or otherwise publicly available sources.
OSINT
Red-Team: Blue-Team: White-Team: Purple-Team:
Exercise types
The management and control of configurations for an information system with the goal of enabling security and managing risk
Configuration management
Network or physical diagrams
Diagrams for Configuration management
Standard or normal configuration
Baseline configuration
consistent use of a pattern that is easily understoof
Standard naming conventions
chart lists what type of device it is, and it gives a range of numbers for the last octet of the IP address of each device
Internet protocol (IP) schema
residency ensures that the data stays in the specified geographical location, makes sure that the information is subject to the legal punishments and protections of the country where it is physically stored.
Data sovereignty
the process of safeguarding important information from corruption, compromise or loss
Data protection
a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
Data loss prevention (DLP)
data ofuscation
Masking
method where information is encoded and can only be accessed or decrypted by a user with the correct encryption key
Encryption in data protection
aims to secure inactive data stored on any device or network.
Data protection: at rest
is data actively moving from one location to another such as across the internet or through a private network.
Data protection: In transit/motion
as any operation or set of operations performed upon personal data, whether or not by automatic means, such as collection, recording, organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making
Data protection: In processing
the process of turning a meaningful piece of data, such as an account number, into a random string of characters called a token that has no meaningful value if breached.
Data protection: Tokenization
a way to protect copyrights for digital media. This approach includes the use of technologies that limit the copying and use of copyrighted works and proprietary software.
Data protection: Rights management
the study of the natural features of the earth's surface, including topography, climate, soil, vegetation, etc., and man's response to them.
Geographical considerations
focuses on returning things to normal following a chemical or biological incident. This involves the development of plans, , technologies, capabilities, and tools for remediation.
Response and recovery controls
the process of intercepting SSL/TLS encrypted internet communication between the client and server. ... Along with your legitimate information, malicious content could also be hidden in the encrypted traffic.
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection
is an algorithm performed on data such as a file or message to produce a number
Hashing
the protection of network-exposed APIs that your organization both produces and consumes.
API considerations
A configuration that extends the messaging infrastructure to multiple Active Directory sites to provide operational continuity for the messaging system in the event of a failure affecting one of the sites.
Site resiliency
a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster.
Hot site
is essentially office or datacenter space without any server-related equipment installed.
Cold Site
a backup facility that has the network connectivity and the necessary hardware equipment already pre-installed.
Warm site
technology is a cybersecurity defense practice that aims to deceive attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets.
Deception and disruption
a controlled and safe environment for showing how attackers work and examining different types of threats.
Honeypots
bait files intended for hackers to access.
Honeyfiles
a decoy network that contains one or more honeypots
Honeynets
fake automated communication processes from multiple data sources.
Fake telemetry
provider that supplies systems looking for DNS information with false results, allowing an attacker to redirect a system to a potentially malicious destination.
DNS Sinkhole
deployment models: public, private, community, and hybrid.
Cloud models
a cloud computing service where enterprises rent or lease servers for compute and storage in the cloud. Users can run any operating system or applications on the rented servers without the maintenance and operating costs of those servers.
Infrastructure as a Service (IaaS)
a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications.
Platform as a Service (PaaS)
is a way of delivering applications over the Internet—as a service. ... SaaS applications are sometimes called Web-based software, on-demand software, or hosted software.
Software as a Service (SaaS)
describes a general category of services related to cloud computing and remote access. It recognizes the vast number of products, tools, and technologies that are now delivered to users as a service over the internet
Anything as a Service (XaaS)
a platform that uses the standard cloud computing model to make resources -- such as virtual machines, applications or storage -- available to users remotely. Public cloud services may be free or offered through a variety of subscription or on-demand pricing schemes, including a pay-per-usage model.
Public cloud model
a cloud service model that provides a cloud computing solution to a limited number of individuals or organizations that is governed, managed and secured commonly by all the participating organizations or a third party managed service provider.
Community Cloud Model
a computing model that offers a proprietary environment dedicated to a single business entity. As with other types of cloud computing environments, private cloud provides extended, virtualized computing resources via physical components stored on-premises or at a vendor's datacenter.
Private cloud model
a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service. A hybrid cloud strategy provides businesses with greater flexibility by moving workloads between cloud solutions as needs and costs fluctuate.
Hybrid Cloud model
a third-party company offering a cloud-based platform, infrastructure, application or storage services. Much like a homeowner would pay for a utility such as electricity or gas, companies typically have to pay only for the amount of cloud services they use, as business demands require.
Cloud service providers
delivers services, such as network, application, infrastructure and security, via ongoing and regular support and active administration on customers' premises, in their MSP's data center (hosting), or in a third-party data center.
Managed service provider (MSP)
provides outsourced monitoring and management of security devices and systems. Common services include managed firewall, intrusion detection, virtual private network, vulnerability scanning and anti-viral services.
Managed security service provider (MSSP)
a solution hosted in-house and usually supported by a third-party. a solution hosted by a third-party and usually supported by a different third-party.
On-premises vs. off-premises
describes a decentralized computing structure located between the cloud and devices that produce data.
Fog Computing
a distributed, open IT architecture that features decentralised processing power, enabling mobile computing and Internet of Things (IoT) technologies.
Edge Computing
a computer that runs from resources stored on a central server instead of a localized hard drive.
Thin Client
sit on top of a physical server and its host OS typically Linux or Windows. shares the host OS kernel and, usually, the binaries and libraries, too.
Containers
a small, single service offered by a company. It derives from the distributed computing architecture that connects many small services, rather than having one large service.
Microservices/API
the process of managing and provisioning computer data centers through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools.
Infrastructure as code
using a central control program separate from network devices to manage the flow of data on a network
Software Defined Networking (SDN)
extends the capability of a visibility infrastructure platform so it can tie security tools they can operate collaboratively in an automated way
Software-defined visibility
a way to build and run applications and services without having to manage infrastructure. Your application still runs on servers, but all the server management is done by AWS.
Serverless architecture
specialized application with a defined interface and structure that acts as a container for a web services solution.
Services integration
a system rule that specifies resources and actions for a particular access feature. A resource is either a server or file that can be accessed through the system, and an action is to "allow" or "deny" a resource or to perform or not perform a function.
Resource policies
a network transit hub that you can use to interconnect your virtual private clouds (VPCs) and on-premises networks.
Transit gateway
technology that lets you create useful IT services using resources that are traditionally bound to hardware. It allows you to use a physical machine's full capacity by distributing its capabilities among many users or environments.
Virtualization
happens when an administrator can no longer effectively control and manage all the virtual machines on a network.
Virtual machine (VM) sprawl avoidance
a security exploit that enables a hacker/cracker to gain access to the primary hypervisor and its created virtual machines.
VM Escape Protection
a collection of procedures and tools for developing, testing and debugging an application or program.
Environment development
any space in which software undergoes a series of experimental uses.
Environment Test
a nearly exact replica of a production environment for software testing.
Environment Staging
the setting where the latest working version of a computer program is installed and made available to end-users.
Environment production
a way of preventing mistakes and defects in manufactured products and avoiding problems when delivering products or services to customers; which ISO 9000 defines as "part of quality management focused on providing confidence that quality requirements will be fulfilled".
Environment Quality assurance (QA)
Commission/Decommission of assets from the time it is installed, until the time it is decommissioned and disposed.
Provisioning and Deprovisioning
being composed of two separable attributes that reflect the intended, desired emergent properties of a system and the minimisation of unintended, undesired emergent properties.
Integrity measurement
Techniques used while coding to provide as much security as possible.
Secure Coding Techniques
the process of reorganizing data in a database so that it meets two basic requirements: There is no redundancy of data, all data is stored in only one place.
Normalization
a set of Structured Query Language (SQL) statements with an assigned name, which are stored in a relational database management system (RDBMS) as a group, so it can be reused and shared by multiple programs.
Stored procedures
the deliberate act of creating source or machine code that is difficult for humans to understand. Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statements.
Obfuscation/camouflage
reusing code that already exists either within your organization or externally when developing new software. The existing code may be reused to perform the same or very similar function.
Code reuse/dead code
validation is mainly used to validate and display form level errors validation is used for field level errors depends on javascript and may be turned off in some browser, which can lead to invalid data saved, while server side validation is very secure
Server-Side vs. Client-Side Execution and Validation
function keeps track of the status of each memory location, either allocated or free.
Memory management
commonly defined as a set of tools that can be used to create and develop applications.
Use of third-party libraries and software development kits (SDKS)
An open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.
Open Web Application Security Project (OWASP)
a research field about the comprehension and engineering of diversity in the context of software.
Software diversity
is a computer program that translates computer code written in one programming language (the source language) into another language (the target language).
Compiler
a numeric system that only uses two digits — 0 and 1
Binary
the process of using automation software to leverage existing scripts to deliver automation in a managed framework without having to do custom script development and maintenance going forward.
Automation/Scripting
Using technology to automate IT processes.
Automated Courses of Action
used to detect compliance and risk issues associated with an organization's financial and operational environment.
Continuous monitoring
Knowing the state of the system (its current configuration) and ensuring alignment with specifications and user requirements (at all times)
Continuous validation
the practice of automating the integration of code changes from multiple contributors into a single software project. It's a primary DevOps best practice, allowing developers to frequently merge code changes into a central repository where builds and tests then run.
Continuous integration
a software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time and, when releasing the software, without doing so manually.
Continuous delivery
a strategy in software development where code changes to an application are released automatically into the production environment.
Continuous deployment
is the ability of an IT infrastructure to quickly expand or cut back capacity and services without hindering or jeopardizing the infrastructure's stability, performance, security, governance or compliance protocols.
Elasticity
the measure of a system's ability to increase or decrease in performance and cost in response to changes in application and system processing demands.
Scalability
is a category of processes and tools designed to keep track of multiple different versions of software, content, documents, websites and other information in development.
Version Control
the process of recognizing a user's identity. It is the mechanism of associating an incoming request with a set of identifying credentials. ... Identification phase provides a user identity to the security system. This identity is provided in the form of a user ID.
Authentication methods
a group of computing or network providers agreeing upon standards of operation in a collective fashion. The term may be used when describing the inter-operation of two distinct, formally disconnected, telecommunications networks that may have different internal structures.
Federation
the process of demonstrating that a piece of software has been properly instantiated on the platform.
Attestation
a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
Time-based one-time password (TOTP)
is an event-based OTP where the moving factor in each code is based on a counter. Each time the HOTP is requested and validated, the moving factor is incremented based on a counter.
HMAC-based one-time password (HOTP)
the most basic communications technology for mobile data transfer and is characterized by the exchange of short alphanumeric text messages between digital line and mobile devices. SMS messaging's key influential factor is affordability.
Short message service (SMS)
a small hardware device that the owner carries to authorize access to a network service.
Token key
a method of computer program debugging that is done by examining the code without executing the program.
Static codes
the process of recognizing a user's identity. ... The credentials provided are compared to those on a file in a database of the authorized user's information on a local operating system or within an authentication server.
Authentication applications
an automated message sent by an application to a user when the application is not open.
Push notifications
an instance of speaking to someone on the phone or attempting to contact someone by phone.
Phone call
a means of verifying users into enterprise resources such as workstations and applications using a physical card in tandem with a smart card reader and software on the workstation.
smart card authentication
a way to measure a person's physical characteristics to verify their identity.
Biometrics
the use of technology to identify a person based on some aspect of their biology. Fingerprint recognition is one of the first and original biometric technologies that have been grouped loosely under digital forensics.
Fingerprints Biometrics
a biometric technique that uses the unique patterns on a person's retina for person identification. The retina is the layer of blood vessels situated at the back of an eye.
Retina Biometrics
an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.
Iris Biometrics
a way of identifying or confirming an individual's identity using their face. Facial recognition systems can be used to identify people in photos, videos, or in real-time. Facial recognition is a category of biometric security.
Facial Biometrics
a technology used to verify a person's identity using their unique vocal attributes. Everyone has different physical and behavioral characteristics that influence the sound of their voice and in combination these are—just like a fingerprint—unique to every individual.
Voice Biometrics
a biometric authentication method based on the unique patterns of veins in the palms of people's hands. Palm vein recognition systems, like many other biometric technologies, capture an image of a target, acquire and process image data and compare it to a stored record for that individual.
Vein Biometrics
one kind of biometric technology that can be used to monitor people without their cooperation. Some researchers are working on visually-based systems that use video cameras to analyze the movements of each body part—the knee, the foot, the shoulder, and so on.
Gait analysis Biometrics
based on several criteria including error rate, false acceptance rate (FAR), identification rate, false reject rate (FRR) and additional biometric system standards.
Efficacy rates Biometrics
the percentage of identification instances in which unauthorised persons are incorrectly accepted.
False acceptance Biometrics
the percentage of identification instances in which authorised persons are incorrectly rejected.
False rejection Biometrics
the point where the false reject rate (FRR) and false accept rate (FAR) are equal.
Crossover error rate Biometrics
using two or more different factors to achieve authentication. Factors include: (i) something you know (e.g., password/PIN); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric).
multifactor authentication (MFA) factors and attributes
a system for tracking user activities on an IP-based network and controlling their access to network resources.
Factors: - Something you know - Something you have - Something you are
company keeps all of this IT infrastructure managed by a 3rd party company keeps all of this IT infrastructure onsite
Attributes: - Somewhere you are - Something you can do - Someone you know
is the duplication of critical components or functions of a system with the intention of increasing reliability of the system, usually in the form of a backup or fail-safe, or to improve actual system performance, such as in the case of GNSS receivers, or multi-threaded computer processing.
- Authorization, authorization, and accounting (AAA)
locations or areas that provide greater opportunity for families in terms of education, economic, mobility and transportation, health and environment, and neighborhood quality
Cloud vs. on-premises requirements
RAID 0 - striping RAID 1 - mirroring RAID 5 - striping with parity RAID 6 - striping with double parity RAID 10 - combining mirroring and striping
Redundancy
is a fault-tolerance and performance-enhancement technique that defines more than one physical path between the CPU in a computer system and its mass-storage devices through the buses, controllers, switches, and bridge devices connecting them.
Geographic dispersal
a device that acts as a reverse proxy and distributes network or application traffic across a number of servers.
Disk - Redundant array of inexpensive disks (RAID) levels
the process of combining multiple network cards together for performance, load balancing, and redundancy reasons.
Multipath
provides battery backup power when the flow of electricity drops to an inadequate voltage, or if it stops
Network: Load balancers
appliances that supply electrical power during a power outage and prevent discontinuity of daily activities or disruption of business operations.
Network interface card teaming
ensure stable power supply to a device, but it also helps prevent system damage. It allows for multiple usage of power by increasing power output. In short, it ensures regular direct current power supply.
Power: Uninterruptible power supply (UPS)
is a device fitted with multiple outputs designed to distribute electric power, especially to racks of computers and networking equipment located within a data center.
Power: Generator
duplicate
Power: Dual supply
a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers.
Managed power distribution units (PDUS)
an image file managed by the hypervisor that exhibits the behavior of a separate computer, capable of performing tasks such as running applications and programs like a separate computer.
Replication
full,incremental,snapshot,differential
Storage area network
complete copies of all configured data
VM
save resources and time because they backup only the data that changed since the last backup of any kind.
On-premises vs. cloud
a set of reference markers for data at a particular point in time
Backup types
save resources and time because they backup only the data that changed since the last full backup
Backup types: Full
drive is one of the oldest data storage devices which allows for reading and writing data on a magnetic tape
Backup types: Incremental
data backup and recovery method that backs data up to hard disk storage
Backup types: Snapshot
a backup that copies all selected files but does not mark each file as having been backed up
Backup types: Differential
is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity
Backup types: Tape
a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. Each server can access shared storage as if it were a drive directly attached to the server.
Backup types: Disk
is a service in which the data and applications on a business's servers are backed up and stored on a remote server.
Backup types: Copy
entire operating system, including files, executable programs and OS configurations.
Backup types: Network-attached storage (NAS)
places your files onto the Spare Backup data servers a backup performed while the database is off-line and unavailable to its users
Backup types: Storage area network
good to consider when using an offsite storage solution
Backup types: Cloud
a desktop where nothing gets saved at the end of the user session.
Backup types: Image
undo the change prior to committing to a known solution
Backup types: Online vs. offline
a copy of a system's hardware configuration and driver settings taken from the system's registry when the OS successfully boots.
Backup types: Offsite storage- Distance considerations
a complete bootable computer installation including operating system which runs directly from a CD-ROM or similar storage device into a computer's memory, rather than loading from a hard disk drive.
Non-persistence
he ability of an application or a system to handle a huge volume of workload or expand in response to an increased demand for database access, processing, networking, or system resources.
Revert to known state
maintenance order by which the process of refurbishing damaged equipment or the spare parts of the equipment
Last known-good configuration
interact and build strong relationships with a broader range of customers , good vs 0 day attacks
Live boot media
Promotes innovation through the introduction of new products, services, and solutions. Provides multiple channels from which to procure goods and services. Drives competition (on price and service levels) between the company's existing and potential vendors
High availability (Scalability)
a way of minimising risk and maximising the potential rewards of your portfolio
Restoration order
using from different categories...to achieve the same control objective.
Diversity: Technologies
Special-purpose software designed and included inside physical products
Diversity: Vendors
A low budget, pocket sized computer which is easy to program
Diversity: Crypto
Class of PLDs that contain an array of more complex logic cells that can be very flexibly interconnected to implement high-level logic circuits.
Diversity: Controls
An open source electronics prototyping platform
Embedded systems
used to control geographically dispersed assets, as well as distributed control systems (DCSs) and smaller control systems using programmable logic controllers to control localized processes.
Raspberry Pi
implements SCADA
Field Programmable Gate Array (FPGA)
implements SCADA
Arduino
implements SCADA
Supervisory control and date acquisition (SCADA)/industrial control system (ICS)
implements SCADA
Facilities
the network of products embedded with connectivity-enabled electronics
Industrial
Input devices used to measure physical traits, such as sound, heat, or light.
Manufacturing
An electronic device connected to other devices, usually with wireless technology, to exchange data and information.
Energy
Devices that may be worn on a person's wrist or incorporated into clothing.
Logistics
uses IOT for temperature and air quality
Internet of Things (IoT)
downside of IOT
Sensors
used in heart monitors, have older OS
Smart devices
often seen as the most innovative and technologically advanced of all aircraft a very broad definition, and can apply to any fighter built for a particular purpose.
Wearables
digital monitoring of consumption data and its regular transmission to the energy provider, and typically enables bidirectional communication.
Facility automation
Uses IP technology to transmit telephone calls
Weak defaults
Systems that provide and regulate heating and cooling.
Specialized Medical systems
Robotic aircraft, used extensively by the military.
Specialized Vehicles
An all-in-one output device that usually combines a scanner, a laser or inkjet printer, and a fax modem.
Specialized Aircraft
A program with a specific purpose that must guarantee certain response times for particular computing tasks or else the machine's application is useless. Real-time operating systems are found in many types of robotic equipment.
Specialized smart meters
The ongoing and systematic collection, analysis, and interpretation of health data essential to the planning, implementation, and evaluation of public health practice, closely integrated with the timely dissemination of these data to those who need to know. The final link in the surveillance chain is the application of these data to prevention and control.
Voice over IP (VoIP)
A modern microprocessor that contain the CPU, memory, and peripheral interfaces; a miniature computer; an example is the Raspberry Pi.
Heating, ventilation, air conditioning (HVAC)
high speed connection for mobile and wifi devices also can allow for more reliable low latency connections as well as energy efficiency and node connection
Drones
efers to data communication and telecommunications tools, technologies and services that utilize a narrower set or band of frequencies in the communication channel. These utilize the channel frequency that is considered flat or which will use a lesser number of frequency sets.
Multifunction printer (MFP)
Baseband refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range. When it is transmitted on a radio frequency (RF), it is modulated to a much higher, inaudible, frequency range
Real-time operating system (RTOS)
Removable cards in GSM phones that contain information for identifying subscribers. They can also store other information, such as messages and call history.
Surveillance systems
A short-range low-power network technology used for the Internet of Things.
System on chip (SoC)
not a lot of power can be drawn due to efficiency concern as well as portability
Communication considerations: 5G
high end chips cannot be used without adequate cooling and power draw
Communication considerations: Narrow-band
due to the nature of wifi the connection itself is not very secure and is volatile
Communication considerations: Baseband radio
cannot be changed cannot be patched
Subscriber identity module (SIM) cards
have massive security flaws due to lack of support and no feature implementations
Zigbee
limited options no multifactor
Constraints: Power
range dependent on equipment used for connection 5g is strong but not as far as satellite but satellite has less data transfer and large amount of latency
Constraints: Compute
only serves a single purpose; low cost
Constraints: Network
limited access hard to verify trust.
Constraints: Crypto
used to block paths
Constraints: Inability to patch
secured spaces with two of more sets of doors and an office sign-in area.
Constraints: Authentication
gives access to mantraps
Constraints: Range
doors, windows, fences motion detect
Constraints: Cost
signs collectively, especially commercial or public display signs.
Constraints: Implied trust
device for recording visual images in the form of photographs, film, or video signals.
Bollards/barricades
to recognize the physical movement of an object in a given place or region. By acting segmentation among moving objects and stationary area or region, the moving objects motion could be tracked and thus could be analyzed later
Access control vestibules
Video cameras and receivers used for surveillance in areas that require security monitoring.
Badges
camouflage in plain sight that looks like a normal building
Alarms
Guards: Robot sentries: Reception: Two-person integrity/control
Signage
Biometrics: Electronic: Physical: Cable Locks:
Cameras
device that plugs into the charging port on your phone, acting as a shield between the public charging station's cord and your phone.
Motion recognition and object detection
camras can see better also provides a barrier
closed circuit television (CCTV)
smoke detector, stops fire
Industrial camouflage
identify movement
Personnel
changes in noise
Locks
access doors, door locks
USB data blocker
water leaks
Lighting and fencing
card reader
Fire suppression
temperature change over time
Sensors: Motion detection
quick large area video coverage
Sensors: Noise detection
tracks personel
Sensors: Proximity Reader
blocks electromagnetic fields
Sensors: Moisture detection
no physical connection
Sensors: Cards
a network architecture that uses a single firewall with three network interfaces. Interface 1 is the public interface and connects to the Internet. Interface 2 connects to a DMZ (demilitarized zone) to which hosted public services are attached.
Sensors: Temperature
prevents cable cuts
Visitor logs
physical separation of a network
Faraday cages
reinforced room, expensive
Air gap
similar to vault, smaller
Screened subnet
allows the network operator to establish trust boundaries in accessing the management function to apply it to network resources. It also can be used to ensure management connectivity (including the ability to determine the status of any network component) independent of the status of other in-band network components.
Protected cable distribution
where air is drawn in from a server room
Secure areas
Burning: Shredding: Pulping: Pulverizing: Degaussing: Third-party solutions :
Secure areas: Air Gap
authentication; non-reputable
Secure areas: Vault
important for hashing strength
Secure areas: Safe
increasing key size; hashing
Secure areas: Hot aisle
adding random hash to product hash
Secure areas: Cold aisle
transforming plaintext of any length into a short code called a hash
Secure data destruction
The process of sending and receiving secure cryptographic keys.
Digital signatures:
An algorithm that uses elliptic curves instead of prime numbers to compute keys.
Key length
hash has nothing revealed in transfer
Key stretching
is a field of applied quantum physics closely related to quantum information processing and quantum teleportation. Its most interesting application is protecting information channels against eavesdropping by means of quantum cryptography.
Salting
uses the principles of quantum physics to represent data and perform operations on these data
Key exchange
temporary keys
Elliptic Curve Cryptography (ECC)
Authenticated: Unauthenticated: Counter:
Perfect forward secrecy
Stream: Block:
Quantum communication
Audio: Video: Image:
Quantum computing
Enables processing of encrypted data without the need to decrypt the data. It allows the cloud customer to upload data to a cloud service provider for processing without the requirement to decipher the data first.
Post-quantum
Modern malware tries to hide itself. Encrypted data hides the active malware code. Decryption occurs during execution.
Ephemeral
Password hashing. Protect the original password. Add salts to randomize the stored password hash.
Modes of operation
Confirm the authenticity of data. Digital signature provides both integrity and non-repudiation.
Blockchain and public ledgers
hashing takes a large amount of computing power and can only be done at a certain speed
Cipher Suites
the larger the size the more secure but also much harder and longer to process and store
Symmetric vs. asymmetric
small keys are easily to brute force
Lightweight cryptography
larger keys are very time consuming
Steganography
keys become less secure over time as new technologies emerge
Homomorphic Encryption
the actual hashing process is not random; everything has a pattern
Common use cases
reusing reduced complexity and security of the key
Low power devices
nothing is random
Low latency
takes much longer time and computing power the larger the hash
High resiliency
hard to do must be both effective and not time consuming
Supporting confidentiality
a set of rules or procedures for transmitting data between electronic devices, such as computers
Supporting integrity
uses public key and cryptography
Supporting Obfuscation
uses encryption with terminal remote access
Supporting Authentication
used in mail servers for encryptions of mail
Supporting Non-Repudiation
uses AES encryption
Limitations: Speed
uses SSL for secure use of looking through directories and organized sets
Limitations: Size
A secure version of the File Transfer Protocol optimized for file transfers. It uses SSL or TLS for security and uses port 990 or 21.
Limitations: Weak keys
One method for sending FTP traffic over a Secure Shell (SSH) session using native SSH commands and methods. Note that this is not the same thing as tunneling regular FTP traffic over SSH (referred to as FTP over SSH, which is called Secure FTP).
Limitations: Time
used in HTTPS connections
Limitations: Longevity
A protocol for transfer of material across the Internet that contains links to additional material that is carried over a secure tunnel via SSL or TLS.
Limitations: Predictability
used in layer 3 authentication and encryption
Limitations: Reuse
integrity in packet creation
Limitations: Entropy
a communications protocol that allows for the movement of data from one network to another
Limitations: Computational overheads
used in mail receiving from a remote server to a local email client.
Limitations: Resource vs. security constraints
the interactions between the "actor" and the system.
Protocols
VOIP,HTTPS
Domain Name System security extension (DNSSEC)
NTP
SSH
POP, IMAP, MIME
Secure/multipurpose Internet Mail Extensions (S/MIME)
HTTPS, FTP
Secure Real-time Protocol (SRTP)
LDAPS
Lightweight Directory Access Protocol over TLS/SSL (LDAPS)
SSH
File Transfer Protocol Secure (FTPS)
DNS
SSH File Transfer Protocol (SFTP)
SSH, SNMPv3,,HTTPS
Simple Network Management Protocol, version 3 (SNMPv3)
DHCP
Hypertext transfer protocol over SSL/TLS (HTTPS)
Antivirus/Anti malware
IPSec
antivirus software (looks more holistically at everything that is necessary to protect)
Authentication header (AH)/Encapsulating Security Payloads (ESP)
software that is specifically designed to detect viruses and protect a computer and files from harm
Tunnel/transport
software that prevents attacks by a wide range of destructive, malicious, or intrusive programs
Secure Post Office Protocol (POP)/ Internet Message Protocol (IMAP)
a system to gather and analyze security threat-related information from computer workstations and other endpoints, with the goal of finding security breaches as they happen and facilitating a quick response to discovered or potential threats.
Use cases
email, cloud storage
Voice and video
allow/deny app features, prevents url access
Time synchronization
block known attacks, secure OS
Email and web
A system that looks for computer intrusions by monitoring activity on one or more individual PCs or servers.
File transfer
A firewall that only protects the computer on which it's installed.
Directory services
chapter provides an introduction to the concept of roots of trust in a trusted computing platform, the measured boot process, and the attestation that are critical steps
Remote access
specification that defines a software interface between an operating system and platform firmware can support remote diagnostics and repair of computers, even with no operating system installed.
Domain Name resolution
A UEFI firmware feature that logs the startup process. Antimalware software can analyze this to log to determine if malware is on the computer or or if the boot components were tampered with.
Routing and switching
software integrity measurements are immediately committed to during boot, thus relaxing the traditional requirement for secure storage and reporting.
Network address allocation
the process of turning a meaningful piece of data, such as an account number, into a random string of characters called a token that has no meaningful value if breached.
Subscription services
A cryptographic salt is made up of random bits added to each password instance before its hashing. Salts create unique passwords even in the instance of two users choosing the same passwords.
Endpoint protection
a technique to directly search the location of desired data on the disk without using index structure. Used to index and retrieve items in a database as it is faster to search that specific item using the shorter hashed key instead of using its original value.
Antivirus
the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.
Anti-malware
the process of testing input received by the application for compliance against a standard defined within the application. It can be as simple as strictly typing a parameter and as complex as using regular expressions or business logic to validate input.
Endpoint detection and response (EDR)
attribute is sent to the server only with an encrypted request over the HTTPS protocol, never with unsecured HTTP (except on localhost), and therefore can't easily be accessed by a man-in-the-middle attacker.
DLP
let the client and the server pass additional information with an HTTP request or response
Next-generation firewall (NGFW)
confirms who the author of the software is and proves that the code has not been altered or tampered with after it was signed.
Host-based intrusion prevention system (HIPS)
entries allowed through a firewall
Host-based intrusion detection system (HIDS)
entries not allowed through a firewall
Host-based firewall
helps to mitigate the vulnerabilities and risks associated with the software product development process.
Boot integrity
Manuel code review: a method of debugging by examining source code before a program is run. It's done by analyzing a set of code against a set (or multiple sets) of coding rules.
Boot security/ Unified Extensible Firmware Interface(UEFI)
the method of debugging by examining an application during or after a program is run.
Measured boot
an automated software testing technique that attempts to find hackable software bugs by randomly feeding invalid and unexpected inputs and data into a computer program in order to find coding errors and security loopholes.
Boot attestation
is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle a single-function system is more secure than a multipurpose one.
Database Tokenization
is used to mean a TCP or UDP port number that is configured to accept packets. web pages or FTP, require their respective ports to be "open" on the server in order to be publicly reachable.
Database salting
a database of settings used by Microsoft Windows. It stores configurations for hardware devices, installed applications, and the Windows operating system.
Database hashing
Best protection against data compromise in the event of physical theft of the device.
Application security
software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
Input validations
Third-party updates: Auto-update:
Secure cookies
Opal: a set of specifications for features of data storage devices (such as disk drives) that enhance their security.
Hypertext transfer Protocol (HTTP) headers
the foundation on which all secure operations of a computing system depend.
Code signing
everybody's certificate is issued by a third party called Certificate Authority (CA) these CAs may issue certificates themselves, or they may issue certificates that are used to issue certificates down some chain. The whole structure is like a trust tree.
Allow list
A form of software virtualization that lets programs and processes run in their own isolated virtual environment
Block list/ deny list
as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. Each sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.
Secure coding practices
cluster is typically made up of at least two nodes, both actively running the same kind of service simultaneously to achieve load balancing .
Static code analysis
not all nodes are going to be active the first node is already active, the second node must be passive or on standby.
Dynamic code analysis
nodes that take turns load balancing
Fuzzing
farm cluster address is required to load balance clients requests and to reroute clients in case of failover.
Hardening
a process in which a load balancer creates an affinity between a client and a specific network server for the duration of a session
Open ports and services
is an architectural approach that divides a network into multiple segments or subnets, each acting as its own small network. This allows network administrators to control the flow of traffic between subnets based on granular policies.
Registry
allows different computers and devices to be connected virtually to each other as if they were in a LAN sharing a single broadcast domain ; helpful for organizational use mainly because it can be used to segment a larger network into smaller segments.
Disk encryption
also known as DMZ; commonly uses two firewalls; one between public network and DMZ; other resides between the DMZ and the private network
OS
denotes a direction of traffic flow within a data center
Patch management
an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.
Self-encrypting drive (SED)/ full disk encryption (FDE)
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
Hardware root of trust
a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
Trusted Platform Module (TPM)
a solution that allows a client to automatically establish a VPN connection without any user interaction.
Sandboxing
sending part of your traffic through a VPN and part of it through the open network. using your VPN for all your traffic,
Load balancing:
Individual users are connected to the private network and It allows the technique to access the services and resources of that private network remotely IPsec security method is used to create an encrypted tunnel from one customer network to remote site of the customer
Load balancing: Active/active
a group of protocols that are used together to set up encrypted connections between devices. It helps keep data sent over public networks secure.
Load balancing: Active/passive
enables individual users to access an organization's network, client-server applications, and internal network utilities and directories without the need for specialized software.
Load balancing: Scheduling
Portal allows you to provide this without needing to expose the server directly to the Internet or allowing traditional VPN connections. Essentially the UTM proxies your shell session
Load balancing: Virtual IP
a standard protocol for tunneling L2 traffic over an IP network. Its ability to carry almost any L2 data format over IP or other L3 networks makes it particularly useful.
Load balancing: Persistence
the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com.
Network segmentation
a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.
Virtual local area network (VLAN)
persistent agent lives on the end station, where it performs authentication and compliance checking before allowing network access. not installed on the clients and are often used to inspect employee-owned mobile devices. ... However, management wants to ensure that mobile devices meet minimum standards for security before they can access any network resources.
East-west traffic
is part of a broader definition concerning maritime security. It refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain.
Extranet
a feature of many managed switches in which the switch intentionally ceases to forward all broadcast traffic if the bandwidth consumed by incoming broadcast frames exceeds a designated threshold.
Intranet
message transmitted across a local area network to detect loops in network topologies guard functionality prevents malicious attacks on edge ports.
Zero Trust
A method of preventing switching loop or bridge loop problems. Both STP and RSTP prevent switching loops.
VPN: Always-on
feature provides network protection from rogue DHCP servers. It creates a logical firewall between untrusted hosts and DHCP servers. In addition, the switch uses this table to identify and filter untrusted messages from the network.
VPN: Spilt tunnel vs.full tunnel
The method to secure a network by limiting which devices are allowed to connect to a network based on a list of MAC addresses kept by the wireless access points.
VPN: Remote access vs. site-to-site
computing appliance that aids in the flow of information to other network-connected computing devices. Services that may be provided include firewall functions, caching, authentication, network address translation and IP address management.
VPN: IPSec
used to access and manage devices in a separate security zone; hardened and monitored device that spans two dissimilar security zones and provides a controlled means of access between them.
VPN: SSL/TLS
server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources. Forward: provides proxy services to a client or a group of clients. Reverse: routes traffic on behalf of multiple servers verse proxy effectively serves as a gateway between clients, users, and application servers.
VPN: HTML5
NIDS: detects malicious traffic on a network. NIDS usually require promiscuous network access in order to analyze all traffic, including all unicast traffic. NIPS: are the network security appliances or applications that monitor the network traffic comprising network segments or devices, and analyze the network and the protocol activities for any suspicious activities.
VPN: Layer 2 tunneling protocol (L2TP)
involves your antivirus having a predefined repository of static signatures (fingerprints) that represent known network threats.
DNS
determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods commonly uses A.I
Network access control (NAC)
inline sensor is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor. A passive sensor monitors a copy of network traffic; the actual traffic does not pass through the device
NAC: Agent and agentless
s a physical device that provides extra security for sensitive data. This type of device is used to provision cryptographic keys for critical functions such as encryption, decryption and authentication for the use of applications, identities and databases.
Out-of-band management
Syslogs,IPS,firewalls
Port security
gathers together materials from a variety of sources
Broadcast storm prevention
hardware, software, or both designed to prevent unauthorized persons from accessing electronic information
Bridge Protocol Data Unit (BPDU) guard
A firewall that operates at the application level, specifically designed to protect web applications by examining requests at the application stack level.
Loop prevention
delivers comprehensive, unified policy management of firewall functions, application control, threat prevention, and advanced malware protection from the network to the endpoint.
Dynamic Host configuration Protocol (DHCP) snooping
is a network-based firewall that individually tracks sessions of network connections traversing it also referred to as dynamic packet filtering, is a security feature often used in non-commercial and business networks
Media access control (MAC) filtering
designed to protect networks based on static information such as source and destination.
Network appliances
a simple code that can be attached to any URL to generate Google Analytics data for digital campaigns.
Network appliances: Jump servers
NAT gateway gives cloud resources without public IP addresses access to the internet without exposing those resources to incoming internet connections
Network appliances: Proxy servers
limits access by comparing web traffic against a database to prevent employees from accessing harmful sites such as phishing pages.
Network-based intrusion detection system (NIDS)/network-based intrusion prevention system (NIPS)
open-source has large amount of functionality for the money proprietary have higher control and higher speeds
Signature-based
hardware is purpose built so is very good as specific function software is much more flexible and has many features but not as detailed
Heuristic/behavior
application firewall is a type of firewall that governs traffic to, from, or by an application or service use a series of configured policies to determine whether to block or allow communications to or from an app. firewall software that runs on an individual computer or device connected to a network. virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Like a traditional network firewall, a virtual firewall inspects packets and uses security policy rules to block unapproved communication between VMs.
Anomaly
a collection of permit and deny conditions, called rules, that provide security by blocking unauthorized users and allowing authorized users to access specific resources.
Inline vs. passive
Securing routing operation from attacks in a network by deploying appropriate defense
HSM
a set of technologies that work on a network to guarantee its ability to dependably run high-priority applications and traffic under limited network capacity.
Collectors
reduces the size of routing tables and makes routing more efficient and hierarchical; contains no IP-level checksum, so the checksum does not need to be recalculated at every router hop
Aggregators
the network switch ability to send a copy of network data packets being transmitted over a switch port to a network monitoring or inspection device that is itself connected to the port mirror Port taps:two most common ways of accessing monitoring data are through either a switched port analyzer (SPAN) port or a test access port (Tap). A tap is a purpose-built device that passively makes a copy of network data but does not alter the data. Once you install it, you are done. No programming is required.
Firewalls
Reviewing the services the client receives, the conditions that may have changed since planning, and progress toward the goals and objectives of the plan offers security checks and fast response times
Web application firewall (WAF)
performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
NGFW
Protocols meant to ensure security via encryption and cryptography.
Stateful
-improved version of WPA -supports robust encryption (government grade security) -can be enabled with password authentication or server authentication
Stateless
-improved version of WPA2 -provides improvements to the general Wi-Fi encryption, Simultaneous Authentication of Equals (SAE) replaces the Pre-Shared Key (PSK) -more individualized. Users on the Personal network can't snoop on another's Personal traffic -Wi-Fi Easy Connect replacing WPS
Unified threat management (UTM)
Uses AES w/128 bit keys uses CCM that combines CTR mode for data confidentiality and CBC-MAC for authentication and integrity replaces TKIP
Network address translation (NAT) gateway
an password based authentication and key establishment protocol initially introduced in IEEE 802.11s for mesh networks.
Firewalls: Content/URL filter
EAP, PEAP, EAP-FAST, EAP-TLS, EAP-TTLS,IEEE 802.1X, Radius
Firewalls: Open-source vs. proprietary
is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet. ... It provides the framework within which the various authentication methods work.
Firewalls: Hardware vs. software
is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
Firewalls: Appliance vs. host-based vs. virtual
uses a two-phase tunneled authentication process. In the first phase of authentication, employs the TLS handshake to provide an authenticated key exchange and to establish a protected tunnel between the client and the authentication server.
Access control list (ACL)
Uses PKI, requiring both server-side and client-side certificates.
Route security
Simplifies EAP-TLS by dropping the client-side certificate requirement.
Quality of service (QoS)
Supplicant (e.g., client software); Authenticator (e.g., access point); Authentication server (e.g., a RADIUS/AAA server)
Implications of IPv6
is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
Port spanning/port mirroring
pre-shared key vs enterprise vs open, WPS, Captive portals
Monitoring services
a client authentication method that uses a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters, to generate unique encryption keys for each wireless client. VS WPA2 Enterprise uses IEEE 802.1X VS WiFi that is not password protected Sometimes the WiFi turns out to be a captive portal
File integrity monitors
An automated setup feature supported by most current 802.11 wireless access points.
Cryptographic protocols
refers to a specific technique of using an HTTP client to handle authentication on a wireless network. Frequently employed in public hot spots, this opens a web browser to an authentication page. This occurs before the user is granted admission to the network. The access point uses this simple mechanism by intercepting all packets and returning the web page for login. The actual web server that serves up the authentication page that can be in a walled-off section of the network, blocking access to the Internet until the user successfully authenticates.
Wifi Protected Access 2 (WPA2)
Site Surveys, Heat Maps, Wifi Analyzers, Channel Overlay, WAP, Controller and access point security
Wifi Protected Access 3 (WPA3)
survey of wireless landscape often uses heat maps
Counter-mode/CBC-MAC protocol (CCMP)
identifies wifi signal strength
Simultaneous Authentication of Equals (SAE)
useful software application that can tell you many things about your wireless network and the networks around you, helping you optimize your WiFi for best performance.
Authentication protocols
can cause frequency conflicts, are used (2-5, 7-10 in 2.4GHz), any stations (STAs) on those channels will transmit independent of what is happening on the other channels, causing a degradation of performance.
Extensible Authentication Protocol (EAP)
important for wifi connection efficiency, test signal strength, and avoid overlapping
Protected Extensible Application Protocol (PEAP)
connects multiple wireless devices together in a single wireless network. Access point supports both type of standards; Ethernet and Wi-Fi. To extend the coverage area, multiple access points are used together under a Wireless LAN Controller.
EAP-FAST
cellular, wifi, bluetooth , nfc , infrared, USB, point-to-point, point-to-multipoint, GPS, RFID
EAP-TLS
Uses antenna for connection, has security problems
EAP-TTLS
connection uses a WAP, sec problems
IEEE 802.1X
connection is highspeed and uses PAN
Remote Authentication Dial-in User Service (RADIUS) Federation
connection uses 2 way WIFI, known to jam, short length, PAN
Methods
connection uses wifi to specific locations
Pre-shared key (PSK) vs. Enterprise vs. Open
connection uses wifi to multiple locations
Wifi Protected Setup (WPS)
connection uses satellites, inaccurate, sec issues
Captive portals (methods)
connection is a wireless non-contact use of radio frequency waves to transfer data no battery until signal is sent
Installation considerations:
remotely controls smartphones and tablets, ensuring data security
Site surveys
refers to the suite of Intune management features that lets you publish, push, configure, secure, monitor, and update mobile apps for your users
Heat maps
a part of most mobile device management (MDM) solutions that provides secure access to corporate resources such as documents and media files on any mobile device such as smartphones, tablets and laptops.
Wifi analyzers
useful security feature of mobile device management. It totally erases the device's memory, in case the device gets lost or stolen
Channel overlaps
the use of GPS or RFID technology to create a virtual geographic boundary, enabling software to trigger a response when a mobile device enters or leaves a particular area.
Wireless access point (WAP) placement
the process or technique of identifying the geographical location of a person or device by means of digital information processed via the internet.
Controller and access point security
graphical user interface displayed by a device (such as a computer or smartphone) that prevents access to most functions of the device until a certain action (such as swiping one's finger across the screen or entering a predetermined code) is performed
Connection methods and receivers:
automated message sent by an application to a user when the application is not open.
Connection methods and receivers: Cellular
an arbitrary string of characters including letters, digits, or other symbols. If the permissible characters are constrained to be numeric, the corresponding secret is sometimes called a personal identification number
Connection methods and receivers: Wifi
refers to security processes that verify a user's identity through unique biological traits such as retinas, irises, voices, facial characteristics, and fingerprints
Connection methods and receivers: Bluetooth
the use of situational information (such as identity, geolocation, time of day or type of endpoint device) to improve information security decisions.
Connection methods and receivers: NFC
defined as a form of operating system virtualization, through which applications are run in isolated user spaces called containers, all using the same shared operating system
Connection methods and receivers: Point-to-point
method used to isolate data on mobile devices. It allows personal data to be stored in one location and encrypted corporate data to be stored elsewhere.
Connection methods and receivers: Point-to-multipoint
the process of encoding all user data on an Android device using an encrypted key
Connection methods and receivers: GPS
is a hardware security module coming in the form of a microSD card. It provides security services driven by hardware-based crypto engines, including encryption, key generation and key life cycle management, digital signature, authentication and other cryptographic functions.
Connection methods and receivers: RFID
manage devices across a variety of platforms, theoretically, at least, making it easier to lockdown hardware and protect critical data
Mobile device management (MDM)
refers to the management of the complete lifecycle of every app used in an enterprise. ... It also includes defining app policies that includes restrictions pertaining to the apps and data stored on the apps.
MDM: Application management
Security Enhancements for Android, a security solution for Android that identifies and addresses critical gaps.
MDM: Content management
stores have some sort of regulation for the apps but the user still does not know what is being done or what can be done with the software
MDM: Remote wipe
the process of removing the limitations put in place by a device's manufacturer.
MDM: Geofencing
a good method to add more features to iphones and android but tools are not regulated like in the app store so caution is advised , data breachs/ leaks
MDM: Geolocation
aftermarket firmware, is an unofficial new or modified version of firmware created by third parties on devices such as video game consoles and various embedded device types to provide new features or to unlock hidden functionality.
MDM: Screen locks
lets you switch carriers without buying a new device. All carriers are required to let you do this, as long as you've paid off the phone. Many smartphones can work with any U.S. carrier. You can check your phone's compatibility online.
Connection methods and receivers: Push notifications
is the wireless delivery of new software, firmware, or other data to mobile devices. Wireless carriers and original equipment manufacturers (OEMs) typically use over-the-air updates to deploy firmware and configure phones for use on their networks over Wi-Fi or mobile broadband poor security
Connection methods and receivers: Passwords and PINs
meant to keep you and other property safe, not to stalk you. Cameras are there not to invade a person's privacy but to protect the public by deterring criminal activity and by providing material evidence when a crime has been caught on film.
Connection methods and receivers: Biometrics
mms built using the same technology as SMS to allow SMS users to send multimedia content. It's most popularly used to send pictures, but can also be used to send audio, phone contacts, and video files careful of files downloaded by friends, no security measures to check for the attachment RCS is a communication protocol between mobile telephone carriers and between phone and carrier, aiming at replacing SMS messages with a text-message system that is richer, provides phonebook polling (for service discovery), and can transmit in-call multimedia no security measures to check for the attachment
Connection methods and receivers: Context-aware authentication
non-fixed-disk based storage media, including tape, optical disk, and CD. ... External Storage Media means disks, tapes, and optical disks, careful of different medium put in disable auto run
Connection methods and receivers: Containerization
allows the connection of input devices, data storage, and A/V devices. OTG can allow you to connect up your USB mic to your Android phone. You could even use it to edit with your mouse, or to type an article with your phone. careful with input of different things such as rogue USB drives
Connection methods and receivers: Storage segmentation
disable and geofence it
Connection methods and receivers: Full device encryption
can use in different areas, causes concern with locations
Mobiles devices: MicroSD HSM
wireless network structure where devices can communicate directly with each other, don't use in public
Mobiles devices: MDM/Unified Endpoint Management (UEM)
sharing of a mobile device's Internet connection with other connected computers dont use in large public space don't know who is connected
Mobiles devices: Mobile application management (MAM)
a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local-area network (WLAN) using a router connected to an Internet service provider.
Mobiles devices: SEAndroid
Cash. Checks. Debit cards. Credit cards. Mobile payments. Electronic bank transfers. dont store it anywhere
Enforcement and monitoring of: Third-party application stores
good for users and cost but policies must be reinforced to make sure security measures are maintained.
Enforcement and monitoring of: Rooting/jailbreaking
IT business strategy through which an organization buys and provides computing resources and devices to be used and managed by employees
Enforcement and monitoring of: Sideloading
the corporation would provide the end user with a number of different options for a mobile device. And then the end user can decide what type of device they would like the corporation to buy for them.
Enforcement and monitoring of: Custom firmware
organization or the corporation purchases the mobile device, and then it's used both as a corporate device and as a personal device for the end user.
Enforcement and monitoring of: Carrier unlocking
he hosting of desktop environments on a central server. It is a form of desktop virtualization, as the specific desktop images run within virtual machines (VMs) and are delivered to end clients over a network.
Enforcement and monitoring of: Firmware over-the-air (OTA) updates
a set of security controls that protects cloud environments against vulnerabilities and reduces the effects of malicious attacks.
Enforcement and monitoring of: Camera use
tools and technologies used to manage digital authentication credentials.
Enforcement and monitoring of: SMS-Multimedia Messaging Service (MMS)/Rich communication services (RCS)
considers the relationship between information technology, financial and operational controls in establishing an effective and efficient internal control environment.
Enforcement and monitoring of: External media
Can access the device storage at any time. This means it can upload personal files or even delete sensitive information from the device.
Enforcement and monitoring of: USB On-The-Go (USB OTG)
The use of encryption to protect stored or backed-up data both in transit and in the storage medium to provide an additional layer of security.
Enforcement and monitoring of: Recording microphone
a managed service in which stored or archived data is duplicated in real time over a storage area network (SAN)
Enforcement and monitoring of: GPS tagging
a storage system that is continuously operational or provides at least 99% uptime.Redundancy is a key feature of HA storage, as it allows data to be kept in more than one place and eliminates a single points of failure (SPOF).
Enforcement and monitoring of: Wifi direct/ad hoc
a network where all devices, servers, virtual machines, and data centers that are connected are done so through software and wireless technology.
Enforcement and monitoring of: Tethering
A public subnet is a subnet that's associated with a route table that has a route to an internet gateway. A private subnet with a size /24 IPv4 CIDR block (example: 10.0. 1.0/24). ... This connects the VPC to the internet and to other AWS services. Instances with private IPv4 addresses in the subnet range (examples: 10.0.
Enforcement and monitoring of: Hotspot
helps you to protect your business against insider attacks as well as attacks by outsiders. Reducing Damage from Successful Attacks.
Enforcement and monitoring of: Payment methods
refers to this seamless connectivity that allows organizations to automate business processes, and enhance the sharing and embedding of data between various applications and systems.
Deployment models: Bring your own device (BYOD)
used to collect user accounts, computer accounts, and other groups into manageable units. In the Windows Server operating system, there are several built-in accounts and security groups that are preconfigured with the appropriate rights and permissions to perform specific tasks.
Deployment models: Corporate-owned personally enabled (COPE)
a virtual table used to determine availability of resources for allocation. The table consists of resources provided by all PM's by means of its Virtual Machines
Deployment models: Choose your own device (CYOD)
refers to the idea that computers can both sense, and react based on their environment. Devices may have information about the circumstances under which they are able to operate and based on rules, or an intelligent stimulus, react accordingly.
Deployment models: Corporate-owned
are horizontally scaled, redundant, and highly available VPC components. They allow communication between instances in your VPC and services without imposing availability risks.
Deployment models: Virtual desktop infrastructure (VDI)
the process of implementing security tools and policies to assure that all in your container is running as intended, including protection of infrastructure, software supply chain, runtime, and everything between.
Cloud security controls
is cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers. The ability of a CASB to address gaps in security extends across software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS) environments.
Secrets management
describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked.
Integration and auditing
protects users from web-based threats in addition to applying and enforcing corporate acceptable use policies. ... Block access to inappropriate websites or content based on acceptable use policies. Enforce their security policies to make internet access safer.
storage:permissions
Cost: Need for segmentation: Open systems Interconnection (OSI) Layers
Storage: Encryption
platform and infrastructure security, as well as continuous application security. The security must be built into the assets you're working to secure. This applies to multiple layers, from OS to container to application VS company offering a cloud-based platform, infrastructure, application or storage services. Much like a homeowner would pay for a utility such as electricity or gas, companies typically have to pay only for the amount of cloud services they use, as business demands require.
Storage: Replication
a service that stores and manages digital identities. Companies use these services to allow their employees or users to connect with the resources they need.
Storage: High availability
personal identifiers that are commonly used to distinguish one person from others. Examples include, but are not limited to, name, date of birth, social security number (SSN), and address.
Network: Virtual networks
may be used only for authentication or may be used for both authentication and digital signatures.
Network: Public and private subnets
a security Token that contains Claims about the Authentication of an End-User by an Authorization Server when using a OAuth Client, and potentially other requested Claims.
Network: API inspection and integration
a physical electronic authorization device, used to control access to a resource.
Compute: Security groups
an identity created for a person in a computer or computing system
Compute: Dynamic resource allocation
any non-person account that may allow multiple users to use a single account to authenticate to the network, application or other university resources.
Compute: Instance awareness
a user account that is created to isolate a service or application.
Compute: Virtual private cloud (VPC) endpoint
consist of at least seven characters, including three of the following four character types: uppercase letters, lowercase letters, numeric digits, and non-alphanumeric characters such as & $ * and !.
Compute: Container security
Number of unique passwords that must be used before an user can re-use his old password.
Solutions: CASB
a problem where people try to remember multiple passwords for everything they interact with on a regular basis, but instead use the same password on multiple systems, tiers of applications, or even social sites.
Solutions: Application security
a profile that includes a collection of network and sharing settings that get applied to the network you are connected to. Based on the network location assigned to your active network connection, features such as file and printer sharing, network discovery and others might be enabled or disabled.
Solutions: Next-generation Secure Web Gateway (SWG)
specifying this boundary in an app or web portal, and by providing the software access to your smartphone's location data.
Firewall considerations in a cloud environment
the process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes or RSS feeds and is a form of geospatial metadata.
Cloud native controls vs. third-party solutions
refers to the use of location technologies such as GPS or IP addresses to identify and track the whereabouts of connected electronic devices. Because these devices are often carried on an individual's person, geolocation is often used to track the movements and location of people and surveillance.
Identity: Identity provider (IDP)
a standard procedure to grant access to an area by detecting a person at an entrance an opening the barrier at a certain time.
Identity: Attributes
a list of user groups and the resources with which users in the group are to be provisioned or deprovisioned.
Identity: Certificates
verifies that user accounts are used appropriately and consistently with organizational policies.
Identity: Tokens
a calculation made by comparing a user's last known location to their current location, then assessing whether the trip is likely or even possible in the time that elapsed between the two measurements.
Identity: SSH keys
"locks" the user's account after a defined number of failed password attempts.
Identity: Smart cards
technical issues that can cause temporary deactivation.
Account types: User account
a user created secret phrase that is used to verify identity or generate cryptographic keys
Account types: Shared and generic accounts/credentials
a program that stores usernames and passwords for multiple applications in a secure location and in an encrypted format.
Account types: Guest accounts
a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop). These artifacts can include passwords, certificates, or encryption keys.
Account types: Service accounts
a dedicated cryptographic processor designed to protect highly critical and sensitive keys and assets. HSMs act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world.
Account policies: Password complexity
a method of authentication which seeks to prove the identity of someone accessing a service such as a financial institution or website.
Account policies: Password history
confirms that users are who they say they are. gives those users permission to access a resource.
Account policies: Password reuse
a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet. ... It provides the framework within which the various authentication methods work.
Account policies: Network location
an identity checking protocol that periodically re-authenticates the user during an online session
Account policies: Geofencing
The oldest and most basic form of authentication and also the least safe because it sends all passwords in cleartext.
Account policies: Geotagging
a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network.
Account policies: Geolocation
open standard client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
Account policies: Time-based logins
Using one authentication credential to access multiple accounts or applications.
Account policies: Access policies
a standardized way to tell external applications and services that a user is who they say they are makes single sign-on technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications.
Account policies: Account audits
is Cisco proprietary protocol which is used for the communication of the Cisco client and Cisco ACS server. It uses TCP port number 49 which makes it reliable.
Account policies: Impossible travel time/risky login
allows third-party services to exchange your information without you having to give away your password.
Account policies: Lockout
A decentralized open source federated identity management system that does not require specific software to be installed on the desktop.
Account policies: Disablement
a computer network security protocol that authenticates service requests between two or more trusted hosts across an untrusted network, like the internet. It uses secret-key cryptography and a trusted third party for authenticating client-server applications and verifying users' identities
Authentication management: Password keys
regulates who or what can view or use resources in a computing environment
Authentication management: Password vaults
This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together.
Authentication management: TPM
Select below the access control model that uses access based on a user's job function within an organization:
Authentication management: HSM
An access control model that based on a list of predefined rules that determine what accesses should be granted
Authentication management: Knowledge-based authentication
A means of restricting access to data based on varying degrees of security requirements for information contained in the objects and the corresponding security clearance of users or programs acting on their behalf.
Authentication/authorization
A means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
EAP
is the protection of content by requiring certain criteria to be met before granting access to the content. The term is commonly used in relation to digital television systems and to software.
Challenge Handshake Authentication Protocol (CHAP)
refers to systems that securely manage the accounts of users who have elevated permissions to critical, corporate resources.
Password Authentication Protocol (PAP)
control what user is permitted to perform which actions on a file
802.1X
a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption.
RADIUS
The method whereby two nodes using key encryption agree on common parameters for the keys they will use to encrypt data.
Single sign-on (SSO)
A trusted third-party agency that is responsible for issuing digital certificates.
Security Assertions Markup Language (SAML)
Subordinate organizations or entities to which CAs delegate the day-to-day issuance of certificates on behalf of the CA.
Terminal Access Controller Access Control System Plus (TACACS+)
A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users.
OAuth
A repository that lists revoked digital certificates.
OpenID
a term that describes the identifying information in a certificate and is part of the certificate itself.
Kerberos
A protocol that performs a real-time lookup of a certificate's status.
Access control schemes
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.
Attribute-based access control (ABAC)
known as the Fully Qualified Domain Name (FQDN), is the characteristic value within a Distinguished Name (DN)
Role-based access control
an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate.
Rule-based access control
dates are an important way of providing assurance to the security of SSL
Mandatory Access Control (MAC)
Wildcard, SAN, Code Signing, Self-Signed, Machine/Computer, Email, User, Root, Domain Validation, Extended Validation
Discretionary access control (DAC)
A special character that represents other characters in a search.
Conditional access
an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate.
Privilege access management
the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed.
Filesystem permissions
A signed digital certificate that does not depend upon any higher level authority for authentication.
Public Key Infrastructure (PKI)
A signed digital certificate that is created locally aside from higher level authority for authentication.
Key management
is meant to provide a legal equivalent of the traditional registered mail: by paying a small fee, users are able to legally prove that a given email has been sent and received.
Certificate authority (CA)
EUC, is a document used in international transfers, including sales and arms provided as aid, of weapons and ammunition to certify that the buyer is the final recipient of the materials, and is not planning on transferring the materials to another party.Jun 2, 2020
Intermediate CA
he cornerstone of authentication and security in software and on the Internet. They're issued by a certified authority (CA) and, essentially, verify that the software/website owner is who they say they are
Registration authority (RA)
the right to administratively manage the domain name in question
Certificate revocation list (CRL)
a digital identity authentication solution used by HTTPS websites to provide the highest level of security by verifying the identity of a website owner or operator.
Certificate attributes
There are different formats of X. 509 certificates such as PEM, DER, PKCS#7 and PKCS#12. PEM and PKCS#7 formats use Base64 ASCII encoding while DER and PKCS#12 use binary encoding. The certificate files have different extensions based on the format and encoding they use.
Online Certificate Status Protocol (OCSP)
Privacy enhanced mail (PEM)
Certificate signing request (CSR)
Fully encrypted files that require a password to open. May contain single certificates, certificate chains, or private keys, although in most cases it is used to store public/private key pairs. A binary file that is heavily used by Microsoft products. Also known as PKCS#12. Uses the extension .pfx or .p12.
CN
used to store X. 509 certificate. Normally used for SSL certification to verify and identify web servers security.
Subject alternative name
restricts which certificates are considered valid for a particular website, limiting risk. Instead of allowing any trusted certificate to be used, operators "pin" the certificate authority (CA) issuer(s), public keys or even end-entity certificates of their choice.
Expiration
PKCS#7. A common format for PKI certificates. They are DER-based (ASCII) and commonly used to share public keys.
Types of certificates
Online vs. offline CA:
Wildcard
a time-stamped OCSP response signed by the CA to the initial TLS handshake
Self-signed
the process of storing a copy of an encryption key in a secure location
Machine/computer
Linking several certificates together to establish trust between all the certificates involved.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials