sset set11

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/137

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

138 Terms

1
New cards

The three main goals of information security are…

Confidentiality, Integrity, Availability

2
New cards

Seek to prevent fraudulent activity by uncovering malfeasance

Mandatory vacations/job rotation

3
New cards

Law regulating educational records

FERPA

4
New cards

Law regulating Financial services

GLBA

5
New cards

Law regulating Information held by federal agencies

Privacy Act of 1974

6
New cards

Law regulating EU PII

GDPR

7
New cards

Law regulating Canadian PII

PIPEDA

8
New cards

Law regulating Asian PII

APEC CPEA

9
New cards

The four canons of the (ISC)2 code of ethics

Protect society, Act honorably, Provide diligent service, Advance and protect the profession

10
New cards

Control to seek to dissuade an attacker from attempting to violate a security policy in the first place

Deterrent Controls

11
New cards

Control to Seek to block an attempt to violate a security policy from succeeding

Preventative Controls

12
New cards

Seek to address a gap created by the absence of another required control. Should go above and beyond other control requirements

Compensating Controls

13
New cards

Seek to restore normal service after a disruption. Examples include backups and redundant sites

Corrective Controls

14
New cards

Seek to identify attack attempts that do occur. Examples include burglar alarms, intrusion detection systems, and file integrity monitoring systems.

Detective Controls

15
New cards

track hardware, software, and data assets throughout their lifecycle

Asset management

16
New cards

Security Frameworks

COBIT, ISO 2700, NIST, CSF

17
New cards

Due care

taking reasonable steps to protect the interest of the organization

18
New cards

Due diligence

ensures protective steps are carried out

19
New cards

We evaluate the effectiveness of an authentication technology using the

crossover error rate (cer)

20
New cards

allows browser-based single sign on across a variety of systems.

Security Assertion Markup Language (SAML)

21
New cards

The SAML’s end user

principal

22
New cards

standard that allows users to log into applications using signatures provided by other identity providers

OAuth

23
New cards

implementation of OAuth used by Google and other cloud service providers

OpenID Connect

24
New cards

Access control delegated to the owners of objects

DAC (Discretionary)

25
New cards

Access control determined by labels on subjects

MAC (Mandatory)

26
New cards

Network shared with trusted partners, such as vendors, contractors, and consultants

Extranet networks

27
New cards

___ a risk through insurance or contract

Transfer

28
New cards

___ a risk by implementing controls

Mitigate

29
New cards

document used to track information about risks facing an organization

Risk register

30
New cards

identifies and prioritizes threats through a structured approach

Threat modeling

31
New cards

Report that provides a description of the controls in place and if they are sufficient

Type 1 Report

32
New cards

Auditor tests controls and provides an opinion on their effectiveness

Type 2 report

33
New cards

commonly used standards for cybersecurity audits

COBIT, ISO 27001,2

34
New cards

software testing technique that ensures it meets business requirements

Validation

35
New cards

software testing technique that ensures it functions correctly

Verification

36
New cards

software testing technique that tests system capacity

stress test

37
New cards

software testing technique that test if it works for users

UAT

38
New cards

software testing technique that checks for side effects

regression testing

39
New cards

software testing technique that tests other inputs for bugs

fuzz testing

40
New cards

software testing technique that evaluates from an attackers perspective

misuse testing

41
New cards

provides a standard framework for vulnerability assessment

Security Content Automation Protocol (SCAP)

42
New cards

Network scanning technique that sends a single packet with the SYN flag set

TCP SYN

43
New cards

Network scanning technique that attempts to complete the three way handshake

TCP Connect

44
New cards

Network scanning technique that attempts to to impersonate an established connection

TCP ACK

45
New cards

scans set the FIN, PSH, and URG flags

Xmas

46
New cards

The vulnerability management lifecycle includes three basic steps

detection, remediation, validation

47
New cards

provides a centralized point for event aggregation, correlation, and analysis

SIEMs

48
New cards

when using a document as evidence, the original document must be used unless there are exceptional circumstances

best evidence rule

49
New cards

Fact that a written agreement is assumed to be the complete agreement

parol evidence rule

50
New cards

System that serves as a decoy to attract attackers.

Honeypot

51
New cards

Unused network designed to capture probing traffic

Honeynet

52
New cards

Copies all files on a system that have changed since the most recent full backup

Differential Backup

53
New cards

Copies all files on a system that have changed since the most recent full or incremental backup

Incremental Backup

54
New cards

Site that has only support systems

cold site

55
New cards

Site that has support systems and configured servers

warm site

56
New cards

Site that has support systems, configured servers and real time data

hot site

57
New cards

Type of disaster recovery where they review the plan and their specific roles

Read-through/tabletop

58
New cards

Type of disaster recovery where they activate alternate processing capabilities without taking down the primary site

Parallel

59
New cards

updated service that uses public key to exchange secret key used to secure web traffic

TLS

60
New cards

secure core of a system that has a secure perimeter with access enforced by a reference monitor

Trusted Computing Base (TCB)

61
New cards

CA verifies that the certificate subject controls the domain name. Weakest form of validation

Domain validation (DV)

62
New cards

CA verifies the name of the business purchasing the certificate in addition to domain ownership

Organization validation (OV)

63
New cards

CA performs additional checks to verify the physical presence of the organization at a registered address

Extended validation (EV)

64
New cards

Collecting only data that is necessary for legitimate business purposes

data minimization

65
New cards

OSI Model in reverse order (top to bottom)

Application, Presentation, Session, Transport, Network, Data Link, Physical

66
New cards

connection-oriented transport protocol

TCP

67
New cards

connectionless transport protocol that does not guarantee delivery

UDP

68
New cards

converts between IP addresses and domain names

DNS

69
New cards

OSI Layer that Serves as the point of integration for user applications with the network

Application

70
New cards

OSI Layer that Transforms user-friendly data into machine-friendly data; encryption

Presentation

71
New cards

OSI Layer that Establishes, maintains, and terminates sessions

Session

72
New cards

OSI Layer that Manages connection integrity

Transport

73
New cards

OSI Layer that manages Routing packets over the network

Network

74
New cards

OSI Layer that Formats packets for transmission

Data Link

75
New cards

OSI Layer that Encodes data into bits for transmission over wire, fiber, or radio

Physical

76
New cards

converts between MAC addresses and IP addresses

ARP

77
New cards

converts between public and private IP addresses

NAT

78
New cards

Used by enterprise wireless networks to implement authentication for wireless clients

EAP

79
New cards

distribute connection requests among many identical servers

Load balancers

80
New cards

20, 21

FTP Port #

81
New cards

22

SSH Port #

82
New cards

23

Telnet Port #

83
New cards

SMTP Port #s (Plain & TLS encrypted)

25 & 465

84
New cards

53

DNS Port #

85
New cards

80

HTTP Port #

86
New cards

110

POP3 Port #

87
New cards

123

NTP Port #

88
New cards

135, 137-139, 445

Windows File Sharing Port #

89
New cards

143

IMAP Port #

90
New cards

161/162

SNMP Port #

91
New cards

443

HTTPS Port #

92
New cards

1433/1434

SQL Server Port #

93
New cards

1521

Oracle Port #

94
New cards

1720

H.323 Port #

95
New cards

1723

PPTP Port #

96
New cards

3389

RDP Port #

97
New cards

9100

HP JetDirect Printing Port #

98
New cards

separates the network control plane from the data plane, allowing networks to be dynamically reprogrammed

Software-defined networking (SDN)

99
New cards

only send traffic destined for the corporate network through the VPN

Split tunnel VPNs

100
New cards

Makes requests to other servers on behalf of an end user, providing anonymization and performance enhancement

Proxy Server