SOC 2
this AUDIT focus on firewalls, intrusion detection, multi- factor authentication
Type 1 Audits
Test controls in place at particular point in time (narrower)
Type 2 Audit
Test controls OVER a period of atleast 6 consective months (Wider), usually for LARGER Organizations
GDPR (General Data Protection Regulation)
European Union Regulation
Set of rules and regulations that allow someone in the EU to control what happens to their private infomation
Data Protection and privacy for indidvuals in the EU
PCI-DSS (Payment Card Indusry Data Security Standard)
provide protection for credit card transactions
FERPA (Family Educational Rights and Privacy Act)
protects the privacy of students educational records
HIPPA (Health Insuarance Portability and Accountability Actt)
rules and regular protecting healthcare in the US
protect the privacy of patient medical information
GLBA (Gramm-Leach-Biley Act)
protects privacy of an individual’s financial information held by financial institutions and others such as tax preparation companies)
SOX (Sarbanes-Oxey ACT)
dictates the requirments for storing and retaining documents relating to an organizations financial and business operations for any publically traded company alteast 75 millions/
CASB (Cloud Access Security Broker)
Two common functions are visibility into application use and data security policy use. Other common functions are the verification of compliance with formal standards and the monitoring and identification of threats
WEP (Wired Equivalent Privacy)
An older security protocol that provides data encryption for wireless networks, but it is considered insecure due to vulnerabilities that allow it to be easily cracked.
WPA (Wi-Fi Protected Access
includes stronger encryption methods and improved authentication mechanisms. It uses TKIP (Temporal Key Integrity Protocol) to provide per-packet key mixing and message integrity.
WPA2 (Wi-Fi Protected Access II
uses AES (Advanced Encryption Standard) for encryption, which provides stronger security
WPA3 (Wi-Fi Protected Access III)
Uses SAE (Simultaneous Authentication of Equals) for stronger protection against brute-force attacks.
SAE
used in WPA3-Personal to provide a more secure key exchange process.
MSCHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2)
This is a password-based authentication protocol widely used within EAP frameworks. It offers better security than a simple username and password combination because it includes features like mutual authentication (both the client and server authenticate to each other).
Extensible Authentication Protocol (EAP)
used in with 802.1x/an authentication framework
PEAP (Protected Extensible Authentication Protocol)
created by Cisco, Microsoft and RSA Security
Authentication server uses a Digital certificate insteal of the PAC
Client doesnt use a certificate
ALSO uses TLS Tunnel
EAP-TLS (a stronger form of EAP)
Strong security, wide adoption
support form most of industry
requires digital certificate on ALL devices
uses TLS tunnel after mutual authentication
need a Public Key Infrastructure (PKI)
not all deivces can support use of digital certificates
EAP- TTLS
the one that supports MULTIPLE authentication methods within a encrypted tunnels
tcpdump
A command-line tool that captures and analyzes network traffic by displaying packets.
cipher
A Windows command used to encrypt or decrypt data, and wipe free space on a disk.
tcpreplay
A tool to edit and replay captured network traffic.
curl
command-line tool used for transferring data using various network protocols.
command will retrieve a web page and display it as HTML at the command line.
Memdump
Used to collect the content within RAM on a given host.
FTK Imager
A proprietary tool used to create forensic images of computer data without altering the original evidence.
ifconfig
Displays information about network interfaces and configures network interfaces on UNIX/Linux and macOS systems.
John the Ripper
Password cracking software tool.
Nessus
vulnerability scanner used to identify and fix security issues in a network.
Measured Boot
works in conjunction with the Trusted Platform Module (TPM) to record the measurements (hashes) of all boot components, from the firmware to the bootloader and the operating system. These measurements are stored in the TPM to provide a detailed log of the boot process, which can be used to verify the integrity of the system.
Trusted Boot
part of the Windows boot process that occurs after Secure Boot. It verifies the digital signature of the operating system kernel before loading it
Secure Boot
UEFI BIOS feature that ensures only software with valid digital signatures can execute during the boot process. It checks the digital signature of the bootloader to prevent unauthorized or malicious code from running.
To prevent rootkits and bootkits by ensuring that the bootloader and subsequent components have not been tampered with and are from a trusted source.
POST (Power-On Self-Test)
diagnostic testing sequence run by a computer's BIOS or UEFI firmware when the computer is powered on. It checks the hardware components such as the CPU, memory, disk drives, and other peripherals to ensure they are working correctly.
Salting
Adding random data, or salt, to a password when performing the hashing process will create a unique hash, even if other users have chosen the same password.
DAC (Discretionary Access Control)
used in many operating systems, and this model allows the owner of the resource to control who has access.
WAF
is commonly used to monitor the input to web-based applications.
service set identifier
If you open the list of Wi-Fi networks on your laptop or phone, you'll see a list of SSIDs. A wireless router or access points broadcast SSIDs so nearby devices can find and display any available networks.Apr 24, 2024
Reconstitution,.
The recovery after a breach can be a phased approach that may take months to complete.
tabletop
exercise allows a disaster recovery team to evaluate and plan disaster recovery processes without performing a full-scale drill.
honeynet
non-production network that has been specifically created to attract attackers. A honeynet is not commonly used to identify infected devices
CSA CCM (Cloud Security Alliance Cloud Controls Matrix)
provides documents for implementing and managing cloud-specific security controls.
backdoor
would allow an attacker to access a system at any time without any user intervention. If there are inbound traffic flows that cannot be identified, it may be necessary to isolate that computer and examine it for signs of a compromised system.
SSL certificate
on an email server could potentially be used to encrypt server-to-server communication, but the security administrator is looking for an encryption method between email clients.