1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Patch Management
This is done in a regular basis order to keep our network secure especially when a vulnerability is discovered
Change Management
A formalized process on how we handle changes to our environments.
Cryptographic method done by switching Letters by a certain number of spots in the alphabet.
Cryptology
The science of securing communications.
Cryptography
Method of creating messages where the meaning is hidden.
Cryptanalysis
The science of breaking encrypted communication.
Plaintext
This is an unencrypted message
Ciphertext
What do we call an encrypted message?
Encryption
A method that converts the plaintext to a ciphertext.
Decryption
Method of turning a ciphertext back into a plaintext.
Asymmetric
This encryption doesn't not need a pre-shared key
Public Key
Key used by others to encrypt messages sent to you.
Private Key
A key used to decrypt messages sent with your public key.
Hybrid Encryption
Uses Asymmetric encryption to share a Symmetric Key
Hash Functions
One-way functions that are used for Integrity
Hash
It is used to prove the Integrity of the data has not changed.
Collision
When 2 hashes of different data provide the same hash
MitM Attack
The attacker secretly relays and may alter communication between two parties, who believe they are directly communicating with each other.
Side Channel Attacks
Attackers use physical data to break a crypto system. This can be CPU cycles, power consumption while encrypting/decrypting,
Data Handling
This is done by having policies on how, where, when, and why the data was handled. Logs should be in place to show these metrics.
Data storage
This is where data is kept in a secure. A climate-controlled facility, preferably geographically distant or at least far enough away that potential incidents will not affect that facility too.
Data Retention
Data should not be kept beyond the period of usefulness or beyond the legal requirements (whichever is greater).
Deleting
A action where file if just removed; everything is still recoverable.
Formatting
Removing of files, but it also puts a new file structure over the old one. Still recoverable in most cases.
Overwriting
Done by writing 0s or random characters over the data.
sanitation
a process of rendering target data on the media infeasible for a given level of recovery effort.
Degaussing
destroys magnetic media by exposing it to a very strong magnetic field. This will also most likely destroy the media integrity
Part of the Information life cycle where the information is either created or copied from another location.
Data Use
Part of the Information life cycle we ensure the data is kept confidential, the integrity is intact, and it is available when needed (The CIA triad).
Data Archival
Part of the Information life cycle where retention required by law, or the data will be used later.
Data Disposal
Part of the Information life cycle we dispose properly of the data once it is no longer useful and required.
AUP (Acceptable Use Policy)
A policy that provides a structure on proper use of the network, data, resource
BYOD (bring your own device)
Policy that allows employees to bring their own devices within certain parameters.
Privacy policy
Policy on how we gather, use, disclose, and manage private data.
Data handling policy
A policy that classify, categorize, label, encrypt, store, backup, disposal/destroy.
Sate where data is stored
Data in Motion
Data state where it is being transferred on a network.
Data in Use
Data state where we are actively using the files/data, it cannot be encrypted
Training
This is done to provide users with a skillset
Awareness
That to encourage users to change their behavior
Social Engineering
Uses people skills to bypass security controls
Authority
Way of social engineering by looking and sounding like an authority figure, be in charge, this can be in a uniform or a suit. Most effective with impersonation, whaling, and vishing attacks.
Intimidation
A social engineering premise rooted on: "If you don't bad thing happens"
Consensus
An act of social engineering where you are following the crowd, everyone else was doing it
Scarcity
A social engineering attack where in if you don't act now, it is too late.
Urgency
Social engineering attack where in action has to happen now or else something bad may happen
Phishing
Social engineering email attack
Spear Phishing
Targeted phishing, not just random spam, but targeted at specific individuals.
Whaling
Spear phishing targeted at senior leadership of an organization.
Vishing
Attacks over automated VOIP (Voice over IP) systems, bulk spam similar to phishing.
acqusition
use
archival
disposal
Steps in data handling