2024-05-23T11:13:07+03:00[Europe/Moscow] en true <p>SOC 2</p>, <p>Type 1 Audits</p>, <p>Type 2 Audit</p>, <p>GDPR (General Data Protection Regulation)</p>, <p>PCI-DSS (Payment Card Indusry Data Security Standard)</p>, <p>FERPA (Family Educational Rights and Privacy Act)</p>, <p>HIPPA (Health Insuarance Portability and Accountability Actt)</p>, <p>GLBA (Gramm-Leach-Biley Act)</p>, <p>SOX (Sarbanes-Oxey ACT)</p>, <p>CASB (Cloud Access Security Broker)</p>, <p><strong>WEP (Wired Equivalent Privacy)</strong></p>, <p><strong>WPA (Wi-Fi Protected Access</strong></p>, <p><strong>WPA2 (Wi-Fi Protected Access II</strong></p>, <p><strong>WPA3 (Wi-Fi Protected Access III)</strong></p>, <p>SAE </p>, <p><strong>MSCHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2)</strong></p>, <p>Extensible Authentication Protocol (EAP)</p>, <p>PEAP (Protected Extensible Authentication Protocol)</p>, <p>EAP-TLS (a stronger form of EAP)</p>, <p><strong>EAP- TTLS</strong></p>, <p><strong>tcpdump</strong></p>, <p><strong>cipher</strong></p>, <p><strong>tcpreplay</strong></p>, <p><strong>curl</strong></p>, <p><strong>Memdump</strong></p>, <p><strong>FTK Imager</strong></p>, <p><strong>ifconfig</strong></p>, <p><strong>John the Ripper</strong></p>, <p><strong>Nessus</strong></p>, <p><strong>Measured Boot</strong></p>, <p><strong>Trusted Boot</strong></p>, <p><strong>Secure Boot</strong></p>, <p><strong>POST (Power-On Self-Test)</strong></p>, <p>Salting</p>, <p>DAC (Discretionary Access Control)</p>, <p>WAF</p>, <p><strong>service set identifier</strong></p>, <p>Reconstitution,.</p>, <p>tabletop</p>, <p>honeynet</p>, <p>CSA CCM (Cloud Security Alliance Cloud Controls Matrix)</p>, <p>backdoor</p>, <p>SSL certificate</p> flashcards
Terms to Know 2

Terms to Know 2

  • SOC 2

    this AUDIT focus on firewalls, intrusion detection, multi- factor authentication

  • Type 1 Audits

    Test controls in place at particular point in time (narrower)

  • Type 2 Audit

    Test controls OVER a period of atleast 6 consective months (Wider), usually for LARGER Organizations

  • GDPR (General Data Protection Regulation)

    European Union Regulation

    Set of rules and regulations that allow someone in the EU to control what happens to their private infomation

    Data Protection and privacy for indidvuals in the EU

  • PCI-DSS (Payment Card Indusry Data Security Standard)

    provide protection for credit card transactions

  • FERPA (Family Educational Rights and Privacy Act)

    protects the privacy of students educational records

  • HIPPA (Health Insuarance Portability and Accountability Actt)

    rules and regular protecting healthcare in the US

    protect the privacy of patient medical information

  • GLBA (Gramm-Leach-Biley Act)

    protects privacy of an individual’s financial information held by financial institutions and others such as tax preparation companies)

  • SOX (Sarbanes-Oxey ACT)

    dictates the requirments for storing and retaining documents relating to an organizations financial and business operations for any publically traded company alteast 75 millions/

  • CASB (Cloud Access Security Broker)

    Two common functions are visibility into application use and data security policy use. Other common functions are the verification of compliance with formal standards and the monitoring and identification of threats

  • WEP (Wired Equivalent Privacy)

    An older security protocol that provides data encryption for wireless networks, but it is considered insecure due to vulnerabilities that allow it to be easily cracked.

  • WPA (Wi-Fi Protected Access

    includes stronger encryption methods and improved authentication mechanisms. It uses TKIP (Temporal Key Integrity Protocol) to provide per-packet key mixing and message integrity.

  • WPA2 (Wi-Fi Protected Access II

    uses AES (Advanced Encryption Standard) for encryption, which provides stronger security

  • WPA3 (Wi-Fi Protected Access III)

    Uses SAE (Simultaneous Authentication of Equals) for stronger protection against brute-force attacks.

  • SAE

    used in WPA3-Personal to provide a more secure key exchange process.

  • MSCHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2)

    This is a password-based authentication protocol widely used within EAP frameworks. It offers better security than a simple username and password combination because it includes features like mutual authentication (both the client and server authenticate to each other).

  • Extensible Authentication Protocol (EAP)

    used in with 802.1x/an authentication framework

  • PEAP (Protected Extensible Authentication Protocol)

    created by Cisco, Microsoft and RSA Security

    Authentication server uses a Digital certificate insteal of the PAC

    Client doesnt use a certificate

    ALSO uses TLS Tunnel

  • EAP-TLS (a stronger form of EAP)

    Strong security, wide adoption

    support form most of industry

    requires digital certificate on ALL devices

    uses TLS tunnel after mutual authentication

    need a Public Key Infrastructure (PKI)

    not all deivces can support use of digital certificates

  • EAP- TTLS

    the one that supports MULTIPLE authentication methods within a encrypted tunnels

  • tcpdump

    A command-line tool that captures and analyzes network traffic by displaying packets.

  • cipher

    A Windows command used to encrypt or decrypt data, and wipe free space on a disk.

  • tcpreplay

    A tool to edit and replay captured network traffic.

  • curl

    command-line tool used for transferring data using various network protocols.

    command will retrieve a web page and display it as HTML at the command line.

  • Memdump

    Used to collect the content within RAM on a given host.

  • FTK Imager

    A proprietary tool used to create forensic images of computer data without altering the original evidence.

  • ifconfig

    Displays information about network interfaces and configures network interfaces on UNIX/Linux and macOS systems.

  • John the Ripper

    Password cracking software tool.

  • Nessus

    vulnerability scanner used to identify and fix security issues in a network.

  • Measured Boot

    works in conjunction with the Trusted Platform Module (TPM) to record the measurements (hashes) of all boot components, from the firmware to the bootloader and the operating system. These measurements are stored in the TPM to provide a detailed log of the boot process, which can be used to verify the integrity of the system.

  • Trusted Boot

    part of the Windows boot process that occurs after Secure Boot. It verifies the digital signature of the operating system kernel before loading it

  • Secure Boot

    UEFI BIOS feature that ensures only software with valid digital signatures can execute during the boot process. It checks the digital signature of the bootloader to prevent unauthorized or malicious code from running.

    To prevent rootkits and bootkits by ensuring that the bootloader and subsequent components have not been tampered with and are from a trusted source.

  • POST (Power-On Self-Test)

    diagnostic testing sequence run by a computer's BIOS or UEFI firmware when the computer is powered on. It checks the hardware components such as the CPU, memory, disk drives, and other peripherals to ensure they are working correctly.

  • Salting

    Adding random data, or salt, to a password when performing the hashing process will create a unique hash, even if other users have chosen the same password.

  • DAC (Discretionary Access Control)

    used in many operating systems, and this model allows the owner of the resource to control who has access.

  • WAF

    is commonly used to monitor the input to web-based applications.

  • service set identifier

    If you open the list of Wi-Fi networks on your laptop or phone, you'll see a list of SSIDs. A wireless router or access points broadcast SSIDs so nearby devices can find and display any available networks.Apr 24, 2024

  • Reconstitution,.

    The recovery after a breach can be a phased approach that may take months to complete.

  • tabletop

    exercise allows a disaster recovery team to evaluate and plan disaster recovery processes without performing a full-scale drill.

  • honeynet

    non-production network that has been specifically created to attract attackers. A honeynet is not commonly used to identify infected devices

  • CSA CCM (Cloud Security Alliance Cloud Controls Matrix)

    provides documents for implementing and managing cloud-specific security controls.

  • backdoor

    would allow an attacker to access a system at any time without any user intervention. If there are inbound traffic flows that cannot be identified, it may be necessary to isolate that computer and examine it for signs of a compromised system.

  • SSL certificate

    on an email server could potentially be used to encrypt server-to-server communication, but the security administrator is looking for an encryption method between email clients.