Here's a detailed study guide based on your exam review topics:
CIA Triad
Confidentiality – Protecting information from unauthorized access. Example: Encryption.
Integrity – Ensuring data has not been altered. Example: Checksums, Hashing.
Availability – Ensuring authorized users have access when needed. Example: Redundant servers, DDoS mitigation.
Threat vs. Vulnerability vs. Asset
Threat – A potential danger that could exploit a vulnerability. Example: A hacker attempting SQL injection.
Vulnerability – A weakness in a system that could be exploited. Example: Outdated software with known exploits.
Asset – Anything of value that needs protection. Example: Customer data.
Type of Virtual Machine Used in Class
Likely a Linux-based VM, possibly Kali Linux for security exercises.
Symmetric vs. Asymmetric Encryption
Symmetric – Same key for encryption/decryption (e.g., AES).
Asymmetric – Public and private keys (e.g., RSA, ECC).
Basic Encryption/Decryption Process
Encrypt: Convert plaintext → ciphertext using an algorithm and key.
Decrypt: Convert ciphertext → plaintext using the same (symmetric) or private key (asymmetric).
Role of Salt in Encryption
A salt is random data added to passwords before hashing to prevent rainbow table attacks.
It is stored along with the hash but does not need to be secret.
Encoding vs. Encryption
Encoding is for data representation (Base64, ASCII). It is not secure.
Encryption protects data using keys and algorithms.
Encryption Algorithms
Should Use: AES, RSA, ECC, PBKDF2
Should NOT Use: DES (weak key length), ECB mode (predictable patterns).
PBKDF2 vs. AES
PBKDF2: Used for password hashing with key stretching.
AES: Used for encrypting data at rest/in transit.
Hashing and Attacks
Hashing creates a fixed-size output from input (SHA-256, MD5).
Attacks: Rainbow tables, collision attacks.
Digital Signature
Used to verify integrity and authenticity.
Created by signing a hash with a private key.
Certificate Authority (CA) and Root CA
CA: Issues digital certificates to verify identity.
Root CA: Top-level trusted authority.
TLS Certificates and Let’s Encrypt
TLS: Secures data in transit with encryption.
Let's Encrypt: Free, automated, open CA for HTTPS.
TLS Encryption and Handshake
Uses asymmetric encryption for key exchange, then switches to symmetric encryption (AES).
Steps: Client Hello → Server Hello → Key Exchange → Encrypted Communication.
Protocol Attacks
TCP SYN Flood: Exploits handshake by sending many SYN requests without completing them.
TCP vs. IP Responsibilities
TCP: Manages data transmission, error checking.
IP: Routes packets to destinations.
IP and Port Together
IP identifies devices; ports specify services (e.g., HTTP = port 80).
Network Zones and Firewalls
Network zones separate internal/external traffic.
Firewalls (Packet Filter vs. Stateful):
Packet Filter: Simple, checks headers.
Stateful: Monitors connection state.
Network Scanning
whois: Identifies domain ownership.
nmap: Scans open ports/services.
DNS Service and Attacks
Resolves domain names to IPs.
DNS Attacks: Cache poisoning, DDoS.
Principle of Least Privilege
Limit user permissions to minimize risk.
System Hardening
Regular updates, disable unnecessary services, log monitoring.
Securing Apache & SSH
Disable root login, use key-based authentication, limit access by IP.
Virus vs. Trojan
Virus: Attaches to files, spreads.
Trojan: Disguised as legitimate software.
Spyware vs. Malware
Spyware: Secretly collects data.
Malware: Broad term for harmful software.
Phishing
Social engineering attack to steal credentials.