Security Plus SY0-701: Section 4

0.0(0)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/96

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

97 Terms

1
New cards

Secure Baselines

Establishing, deploying, and maintaining hardened targets to ensure a secure starting point for systems

2
New cards

Establish Baselines

Creating a reference set of data against which operational data is compared.

3
New cards

Deploy Baselines

• We now have established detailed security baselines

- How do we put those baselines into action?

• Deploy the baselines

- Usually managed through a centrally

administered console

• May require multiple deployment mechanisms

- Active Directory group policy, MDM, etc.

• Automation is the key

- Deploy to hundreds or thousands of devices

4
New cards

EDR

Endpoint detection and response, A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

5
New cards

Embedded Systems

Special-purpose software designed and included inside physical products

6
New cards

Site Survey

In the context of wireless networking, an assessment of client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.

7
New cards

MDM

Mobile Device Management, A group of applications and/or technologies used to manage mobile devices. MDM tools can monitor mobile devices and ensure they are compliance with security policies.

8
New cards

COPE

Corporate-owned, personally enabled. A mobile device deployment model. The organization purchases and issues devices to employees. Compare with BYOD and CYOD.

9
New cards

PSK

Pre-Shared Key

10
New cards

GCMP

Galois/Counter Mode Protocol. Used in WPA3. Confidentiality with AES. Integrity thru MIC with Galois Message Authentication Code (GMAC)

11
New cards

SAE

(Simultaneous Authentication of Equals) Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

12
New cards

802.1X

A port-based authentication protocol. Wireless can use 802.1X. For example, WPA2-Enterprise mode uses an 802.1X server (implemented as a RADIUS server) to add authentication.

13
New cards

RADIUS server

A server that offers centralized authentication services to a network's access server, VPN server, or wireless access point via the RADIUS protocol.

14
New cards

AAA Framework

Authentication, Authorization, and Accounting

15
New cards

EAP

Extensible Authentication Protocol that is a framework and 802.1X uses EAP to provide authentication

16
New cards

SAST

Static Application Security Testing for code vulnerabilities by using a static analyzer

17
New cards

Sandboxing

An isolated test environment that simulates the production environment but will not affect

production components/data

18
New cards

Acquisition

The purchasing process for obtaining goods and services

19
New cards

Assignment/accounting

In asset management, processes that ensure each physical and data asset have an identified owner, and are appropriately tagged and classified within an inventory.

20
New cards

Monitoring/asset tracking

Inventory every asset, associate a support ticket with a device make and model and enumeration: list all parts of an asset. Add asset Tag

21
New cards

Media Sanitization

System disposal or decommissioning

-Completely remove data

Different use cases

-Clean a hard drive for future use

-Permanently delete a single file

A one-way trip

-once it's gone it's really gone

-No recovery with forensics tools

Reuse the storage media

-Ensure nothing is left behind

22
New cards

Physical destruction

Shredder or pulverizer

Drill or hammer

Degaussing (using electromagnet)

Incineration

23
New cards

Vulnerability Scanning

A technique that identifies threats on the network without exploiting them. Looking for open ports or services

24
New cards

OSINT

Open Source Intelligence; gathered from publicly available sources

25
New cards

CTA

Cyber Threat Alliance, members upload information about threat intelligence and other members validate the data

26
New cards

Bug bounty

A monetary reward given for uncovering a software vulnerability.

27
New cards

CVSS

Common Vulnerability Scoring System; Open protocol for scoring new vulnerabilities

28
New cards

CVE

Common Vulnerabilities and Exposures (CVE). A dictionary of publicly known security vulnerabilities and exposures.

29
New cards

SIEM

Security Information and Event Management. A security system that attempts to look at security events throughout the organization.

30
New cards

SCAP

Security Content Automation Protocol. A method with automated vulnerability management, measurement, and policy compliance evaluation tools

31
New cards

Software Agent

receives keystrokes, file contents, and network packets as sensory inputs and acts on the environment by displaying on the screen, writing files, and sending network packets to monitor a device

32
New cards

DLP

Data loss prevention. A network-based DLP system can examine and analyze network traffic. It can detect if confidential company data or any PII data is included in email and reduce the risk of internal users emailing sensitive data outside the organization. End-point DLP systems can prevent users from copying or printing sensitive data.

33
New cards

SNMP

Simple Network Management Protocol. Used to collect system information from a remote computer

34
New cards

MIB

Management Information Base

A data set that defines the criteria that can be retrieved and set on a device using SNMP

35
New cards

SNMP Trap

Sets a threshold for alerts on the monitored system back to the monitoring station using UDP 162

36
New cards

NetFlow

Gather traffic statistics from all traffic flows

- Shared communication between devices

• NetFlow

- Standard collection method

- Many products and options

• Probe and collector

- Probe watches network communication

- Summary records are sent to the collector

• Usually a separate reporting app

- Closely tied to the collector

37
New cards

SPAN

Switched Port Analyzer (Mirror Port) - access traffic moving through a SPAN-supporting network switch. Configuration is done by mirroring traffic from selected ports or VLANs to the SPAN port. Analyzes how much data is going through a switch

38
New cards

Vulnerability scanner

Generic term for a range of products that look for vulnerabilities in networks or systems. Usually minimally invasive like port scans or identifying systems

39
New cards

Network-Based Firewalls

• Filters traffic by port number

• Can encrypt and proxy traffic across the network

• Most firewalls can be layer 3 devices (routers) and often site on the ingress/egress of the network, manage Network address Translation, and dynamic routing

40
New cards

NGFW

Next generation firewall, Advances in firewall technology, from app awareness, user-based filtering, and intrusion prevention to cloud inspection. Also known as layer 7 firewall.

41
New cards

Firewall Rules

• A logical path

- Usually top-to-bottom

• Can be very general or very specific

- Specific rules are usually at the top

• Implicit deny

- Most firewalls include a deny at the bottom

- Even if you didn't put one

• Access control lists (ACLs)

- Allow or disallow traffic

- Groupings of categories of firewalls - Source IP, Destination IP, port number, time of day, application, protocol, etc.

42
New cards

Screened Subnet

A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports. Keeps public data public while private data remains inaccessible

43
New cards

IPS Rules

Intrusion prevention system which is usually integrated into a NGFW. Different ways to look at malicious traffic as it passes by: Signature-based (look for a perfect match) and Anomaly-based (build a baseline of "normal" activity), determines what happens when unwanted traffic appears. Had thousands of rules or more which can be customized by a group

44
New cards

Content Filtering

Control traffic based on data within the content: URL filtering, website category filtering

45
New cards

URL Scanning

Uniform Resource Locator. Allow list / Block list, can be managed by category, can have limited control, often integrated into NGFW

46
New cards

Agent Based Firewall

• Install client software on the user's device

- Usually managed from a central console

• Users can be located anywhere

- The local agent makes the filtering decisions

- Always-on, always filtering

• Updates must be distributed to all agents

- Cloud-based updates

- Update status shown at the console

Uses software installed on clients which authenticates the client to the NAC before scanning and allowing network access

47
New cards

Proxies

Sits between the users and the external network. Receives the user requests and sends the request on their behalf (the proxy). Proxy then analyzes what was received from the website and can allow or disallow content.

Useful for caching info, access control, URL filtering, and content scanning

48
New cards

Explicit Proxy

requires the client software to be configured to use the proxy server.

49
New cards

Transparent Proxy

A proxy that does not require any configuration on the user's computer.

50
New cards

Forward Proxy

A computer or an application program that intercepts user requests from the internal secure network and then processes those requests on behalf of the users to the internet

51
New cards

Reputation

Filter URLs based on perceived risk. Credit score for a website. Sites are scanned and automatically assigned a reputation or can be manually assigned

52
New cards

DNS Filtering

Technique used to block access to certain websites by preventing the translation of specific domain names to their corresponding IP addresses. Therefore harmful sites are not resolved

53
New cards

Active Directory

The Windows directory service that enables administrators to create and manage users and groups, set network-wide user and computer policies, manage security, and organize network resources.. Managed authentication using centralized access control.

54
New cards

Group Policy

A centralized configuration management

feature available for Active Directory on

Windows Server systems.

55
New cards

SELinux

Security-Enhanced Linux. A trusted operating system platform that prevents malicious or suspicious code from executing on both Linux and UNIX systems. It is one of the few operating systems that use the MAC model.

56
New cards

MAC

Mandatory Access Control. Access control model that uses sensitivity labels assigned to objects (files and folders) and users. SELinux (deployed in both Linux and UNIX platforms) is a trusted operating system platform using the MAC model

57
New cards

DAC

Discretionary Access Control. An access control model where all objects have owners and owners can modify permissions for the objects (files and folders). Microsoft's NTFS uses the DAC model

58
New cards

Unencrypted Network Data Protocols

FTP, SMTP, IMAP, Telnet

59
New cards

Mail Gateway

A system that monitors emails for unwanted content and prevents these messages from being delivered.

60
New cards

SPF

Sender Policy Framework, An email authentication method designed to detect forging sender addresses during the delivery of the email. Sender configures a list of all servers authorized to send emails for a specific domain. receiving mail server perform a check to see if incoming mail really did come from an authorized host

61
New cards

SPF protocol

Sender configures a list of all servers authorized to send emails for a specific domain

62
New cards

DKIM

Domain keys identified mail, digitally sign your outgoing mail

validated by the mail server, not usually seen by the end user

put your public key in the DKIM TXT record. Not a digital signature of the message but a digital signature for the transport process of an email

63
New cards

DMARC

Domain Message Authentication Reporting and Conformance, An extension of SPF and DKIM. The domain owner decides what receiving email servers should do with emails not validating using SPF and DKIM. Policy is written into a DNS TXT record. Can accept all, reject all, or send to spam.

64
New cards

FIM

File Integrity Monitoring, Some files change all the time while other files never change. Monitor important operating system and application files. Identify when changes occur. Windows uses SFC (system file checker) and Linux uses Tripwire. Many host-based IPS

65
New cards

Host-Based IPS

A software package installed on a host or server. Monitors activity on the server and reports intrusions to the IPS management console.

66
New cards

DLP

Data loss prevention. A group of technologies used to prevent data loss. They can block the use of USB devices, monitor outgoing email to detect and block unauthorized data transfers, and monitor data stored in the cloud. Prevents data "leakage"

67
New cards

Cloud-based DLP

• Located between users and the Internet

• Watch every byte of network traffic

• No hardware, no software

• Block custom defined data strings

• Unique data for your organization

• Manage access to URLs - Prevent file transfers to cloud storage

• Block viruses and malware - Anything traversing the network

68
New cards

Edge of the Network

Where internal network meets the WAN. Managed primarily through firewall rules.

69
New cards

Access Control

Regulating who can view or use resources. Affects users inside and out, and access can be revoked or changed

70
New cards

Posture Assessment

A thorough examination of each aspect of the network to determine how it might be compromised

71
New cards

Persistent Agents

Permanently installed onto a system • Periodic updates may be required

72
New cards

Dissolvable Agents

No installation is required • Runs during the posture assessment • Terminates when no longer required

73
New cards

Agentless NAC

Integrated with Active Directory.

Checks are made during login and logoff.

Can't be scheduled

74
New cards

EDR

(endpoint detection and response) A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats. Uses signatures, machine learning, and process monitoring to determine threat. Can automatically respond to the threat

75
New cards

XDR

Extended Detection Response - system that delivers intelligent, automated, and integrated security across an org's domain

Prevents, detects, and responds to threats across identities, endpoints, applications, email, IoT, infrastructure, and cloud platforms

Can be run on more than just one system across endpoint, network, and cloud data to improve detection and simplify security events (unlike EDR and much more inclusive than IDS)

76
New cards

IAM

Identity and Access Management, granting and revoking access. manages authentication and authorization along with access control. The biggest part of this is provisioning and de-provisioning access

77
New cards

SSO

Single sign-on. Authentication method where users can access multiple resources on a network using a single account. SSO can provide central authentication against a federated database for different operating systems.

78
New cards

LDAP

Lightweight Directory Access Protocol. A protocol used to communicate with directories over an IP network. It's a networks phone book. Uses X.500

79
New cards

X.500 Distinguished Names

• attribute=value pairs

• Most specific attribute is listed first

• This may be similar to the way you already think

Hierarchical structure is a tree and the leaves are the services of an organization

80
New cards

SAML

Security Assertions Markup Language. An XML-based standard used to exchange authentication and authorization information between different parties. SAML provides SSO for web-based applications. (does not work with mobile devices)

81
New cards

OAuth

Open authorization, An open source standard used for authorization with Internet-based single sign-on solutions and is supported by mobile devices. Provides authentication between applications (using Facebook to log into Instagram)

82
New cards

Federation

Allows network access without a centralized database. Not just to employees but also to partners, suppliers, and more. Provides SSO and more.

Think about using Google to sign into GeeksForGeeks. Authenticate and Authorize between two organizations

83
New cards

Interoperability

the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. Many different ways to communicate with an authentication server.

84
New cards

DAC

Discretionary Access Control. An access control model where all objects have owners and owners can modify permissions for the objects (files and folders). Used in most operating systems. Flexible access control as responsibility falls on each user

85
New cards

RBAC

Role-based access control. An access control model that uses roles to define access and it is often implemented with groups. A user account is placed into a role, inheriting the rights and permissions of the role

86
New cards

ABAC

Attribute-based access control. An access control model that grants access to resources based on attributes assigned to subjects and objects. Could be resources info, IP address, time of day, desired action, etc. Complicated access control method

87
New cards

Time-of-day Restrictions

Limitations imposed as to when a user can log on to a system.

88
New cards

Authentication Factors

Something you know -> Password or PIN

Something you have -> Smart Card or ID

Something you are -> Biometric Authentication

Somewhere you are -> Factor based on location or IP address

89
New cards

Just-in-time Permissions

Access control permissions that are immediately elevated to higher-level permissions to perform a specific function before dropping back to normal levels.

90
New cards

NIST SP800-61

National Institute of Standards and Technology

- NIST Special Publication 800-61

- Computer Security Incident Handling Guide

The incident response lifecycle:

- Preparation

- Detection and Analysis

- Containment, Eradication, and Recovery

- Post-incident Activity

91
New cards

Incident Response Lifecycle

Pizza Delivery Apps Create Easy Routes Logistically

Preparation Detection Analysis Containment Eradication and Recovery Post-Incident activity

92
New cards

Tabletop Exercise

A discussion-based exercise where participants talk through an event while sitting at a table or in a conference room. It is often used to test business continuity plans.

93
New cards

threat hunting

Cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring.

94
New cards

Digital Forensics

the discovery, collection, and analysis of evidence found on computers and networks

95
New cards

ESI

Electronically Stored Information

96
New cards

Legal Hold

A process designed to preserve all relevant information when litigation is reasonably expected to occur.

97
New cards

Endpoint

Any physical device that connects to a network and exchanges data with it