Term
|
Definition
an entire set of software, hardware, data, people, procedures, and networks necessary to use information as a resource in the organization |
|
|
Term
| Critical Characteristics of Information |
|
Definition
| Confidentiality, Integrity, Availability, Authenticity, Accuracy, Utility, Possession |
|
|
Term
|
Definition
| bitwise identical to the original |
|
|
Term
|
Definition
| Free from mistakes and errors |
|
|
Term
| Necessary Tools for InfoSec |
|
Definition
| policy, awareness, training, education, technology |
|
|
Term
| Balancing Info Sec and Access |
|
Definition
- Impossible to obtain perfect security - It is a process not an absolute
- Considered a balance between protection and availabilty
- To achieve balance, level of security must allow reasonable access, yet protect against threats |
|
|
Term
|
Definition
- Began immediately after first mainframes were developed
- Groups developing code-breaking computations during WWII created the first modern computers |
|
|
Term
|
Definition
| byte stream number of first byte in segment's data |
|
|
Term
|
Definition
| Sequence number of next byte expected from other side |
|
|
Term
|
Definition
User Datagram Protocol
- best effort service - connectionless - small segment header |
|
|
Term
|
Definition
| DNS uses UDP for name lookups because it is faster than forming a TCP connection. Loss is not significant in this case because the entity performing the query can simply send the request again |
|
|
Term
|
Definition
| SNMP uses UDP as its transport protocol because it has no need for the overhead of TCP. Reliability is not required because each request generates a response. If the SNMP application does not receive a response, it simply reissues the request. Sequencing is not needed because each request and each response travels as a single datagram. |
|
|
Term
|
Definition
Internet Control Message Protocol
- communicate network-level information - runs over IP - Message Format: - type, code, first 8 byted of IP datagram causing the error |
|
|
Term
|
Definition
Autonomous System
Types - stub: small corporation - multihomed: large corporation - transit: network provider
Routing - IGP - BGP |
|
|
Term
|
Definition
| Weakness or fault that can lead to an exposure |
|
|
Term
|
Definition
| Generic term for objects, people who pose a potential danger to and asset |
|
|
Term
|
Definition
Specific object, person who poses such a danger by carrying out the attack
DDOS attacks are a threat, if a hacker carries out a DDOS attack he's a threat agent |
|
|
Term
|
Definition
| P(event occurs) X Exp(Damage) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| How the attack was carried out |
|
|
Term
|
Definition
|
|
Term
|
Definition
Types: - responsible, full, partial, none, delayed |
|
|
Term
|
Definition
| determining the identity of a person, computer, or service on a computer |
|
|
Term
|
Definition
| determining whether an entity has access to an object |
|
|
Term
|
Definition
Varying Definitions - any attack, all attacks using vulnerability X, etc
- Anything resulting in service degradation other than problem management, service request fulfillment |
|
|
Term
|
Definition
- Acts of human error or failure - Accidents - Employee Mistakes - Deliberate software attacks - Viruses - Worms - Macros - DOS |
|
|
Term
| Acts of Human Error or Failure |
|
Definition
Includes acts performed without malicious intent
Causes - inexperience - improper training - incorrect assumptions
Among the greatest threats to an organization's data |
|
|
Term
| Results of Human Error or Failure |
|
Definition
- Revelation of classified data - entry of erroneous data - accidental data deletion or modification - data storage in unprotected areas - failure to protect information |
|
|
Term
| Attack Replication Vectors |
|
Definition
- IP scan and attack - Web browsing - Virus - Unprotected shares - Mass mail - SNMP |
|
|
Term
|
Definition
Autonomous
1) scan 2) probe 3) transfer copy |
|
|
Term
|
Definition
Inject malicious code into a process's virtual memory space
Modify RET to redirect execution flow to malicious code |
|
|
Term
|
Definition
fixed morals or customs of a group of people
form basis of ethics |
|
|
Term
|
Definition
| Rules that define socially acceptable behavior, not necessarily criminal, not enforced |
|
|
Term
|
Definition
| Rules that mandate or prohibit behavior, enforced by governing authority |
|
|
Term
|
Definition
Organizational Laws - body of expectations that defines acceptable workplace behavior - general and broad - must be distributed, readily available, easily understood and acknowledged by employees in order to be enforceable |
|
|
Term
| Standards, Guidelines, Best Practices |
|
Definition
| define what must be done to comply with policy |
|
|
Term
|
Definition
| a court's right to hear a case if a wrong was committed in its territory or against its citizens |
|
|
Term
|
Definition
| court's ability to reach far and apply law (ie another state, country) |
|
|
Term
|
Definition
| documentation about application of law in various cases |
|
|
Term
|
Definition
| Legal obligation beyond what's required by law, increased if you fail to take due care |
|
|
Term
|
Definition
| taken when employees know what is/isn't acceptable, what the consequences are |
|
|
Term
|
Definition
| sustained efforts to protect others |
|
|
Term
| Ethical Differences Across Cultures |
|
Definition
- create difficulty in determining what is and is not ethical
- Example: many ways in which Asian cultures use computer technology is software piracy |
|
|
Term
|
Definition
| What happens to victim as the result of a successful attack |
|
|
Term
|
Definition
| what attacker gains from successful attack |
|
|
Term
|
Definition
| what attacker spends to launch attack |
|
|
Term
|
Definition
| process of identifying and controlling risks facing and organization |
|
|
Term
|
Definition
| process of examining an organization's current information technology security situation |
|
|
Term
|
Definition
| applying controls to reduce risks to an organization's data and information systems |
|
|
Term
|
Definition
| targets of various threats and threat agents |
|
|
Term
|
Definition
- Avoidance - Transference - Mitigation - Acceptance |
|
|
Term
|
Definition
| remaining risk after identification and control |
|
|
Term
|
Definition
| - Control approach that attempts to shift risk to other assets, processes, or organizations |
|
|
Term
|
Definition
- Attempts to reduce the impact of vulnerability through planning and preparation
Three Types of Plans - Incident Response Plan (IRP) - Disaster Recovery Plan (DRP) - Business Continuity Plan (BCP) |
|
|
Term
| Firewall Processing Modes |
|
Definition
- Packet Filtering - Application Gateways - Circuit Gateways - MAC layer firewalls - hybrid |
|
|
Term
|
Definition
- Processing Mode - Development Era - Intended Deployment Structure - Architectural Implementation |
|
|
Term
|
Definition
Examine header information and apply policies
- Relevant fields: - src/dest IP - protocol - direction |
|
|
Term
|
Definition
- Static Filtering - uses rules/policies already in place - Dynamic filtering - allows firewall to react to emergent event and update or create rules to deal with event
- Stateful Inspection - firewalls that keep track of each network connection using a state table |
|
|
Term
| Screened Subnet Firewalls |
|
Definition
- Two or more internal bastion hosts behind PF router with each host protecting trusted network
Connection comes from outside, routed int and out of routing firewall to DMZ.
Only connections from DMZ allowed into internal trusted network |
|
|
Term
|
Definition
Virtual Private Network
- Private and secure network connection between systems
- Securely extends organization's internal network connections to remote locations beyond trusted network |
|
|
Term
|
Definition
- encapsulation of incoming and outgoing data - encryption of incoming and outgoing data - authentication of remote computer and remote user |
|
|
Term
|
Definition
Detection methods: - signature-based - statistical anomaly-based
Operate as: - network-based - host-based - application-based |
|
|
Term
|
Definition
- examine traffic in search of patterns that match known signatures
- many attacks have clear and distinct signatures
- DB of signatures must be continually updated |
|
|
Term
| Statistical Anomaly-Based IDS |
|
Definition
- Samples network activity to compare to traffic that is known to be normal - triggers alert when measured activity is outside baseline parameters - can detect new types of attacks - much more overhead and processing capacity than sig-based - may generate many false positives |
|
|
Term
|
Definition
Network-Based IDS
- Resides on a computer or appliance connected to segment of an organization's network
- looks for attack patterns in packets
- installed at a specific place in the network where it can watch traffic going into and out of a particular network segment |
|
|
Term
|
Definition
- enable organization to use a few devices to monitor large network - passive and can be deployed to network with little disruption - not usually susceptible to direct attack, may not be detectable |
|
|
Term
|
Definition
- can become overwhelmed by network volume and fail to recognize attacks - require access to all traffic being monitored - cannot analyze encrypted packets - cannot reliably ascertain if attack was successful or not - some form of attacks are not easily discerned |
|
|
Term
|
Definition
- monitor single computer/server - benchmark and monitor the status of key system files and detect when intruder creates, modifies, or deletes files - Most HIDS work on the principle of config or change management - access encrypted information |
|
|
Term
|
Definition
- detect local events that may elude NIDS - functions on host system where encrypted traffic will have been decrypted - not affected by use of switched network protocols - detect inconsistencies in how apps and programs were used by checking audit logs |
|
|
Term
|
Definition
- Pose more management Issues - Vulnerable to both direct attacks and attacks against host OS - Doesn't detect multi-host scanning, or scanning of non-host network devices - susceptible to DOS - can use large amounts of disk space - inflict performance overhead on host system |
|
|
Term
|
Definition
- Centralized - all IDS control functions are implemented and managed in a centralized location
- Fully Distributed - All control functions are applied at the physical location of each IDS component
- Partially Distributed: - Combination of the two |
|
|
Term
| Honeypots, Honeynets, and Padded Cell Systems |
|
Definition
- decoy systems designed to lure potential attackers away from critical systems and encourage attacks against themselves - Padded Cell: - honey pot that has been protected so it cannot be compromised |
|
|
Term
|
Definition
- Trap with honeypot - Legal Drawbacks - Enticement - Legal - Entrapment - Illegal |
|
|
Term
|
Definition
- collect copies of packets from network and analyzes them - provide network admin with valuable info for diagnosing and resolving network issues - can be used to sniff traffic in wrong hands |
|
|
Term
|
Definition
- Ingress Filtering - Traceback - Mitigation during attack |
|
|
Term
|
Definition
- Allows victim to identify attackers origin - Approaches - ICMP - Probabilistic Packet Marking (PPM) |
|
|
Term
|
Definition
- Probabilistically inscribe local path info - Use constant space in the packet header - Reconstruct attack path with high probability |
|
|
Term
|
Definition
| - the practice/study of rendering information unintelligible to everyone except the intended recipient |
|
|
Term
|
Definition
| - study of obtaining plaintext without knowing key and/or algorithm |
|
|
Term
|
Definition
| - study of science of encryption |
|
|
Term
|
Definition
| - process of hiding messages in images, text, etc |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| encryption method, consisting of algorithm, key, and encryption/decryption procedures |
|
|
Term
|
Definition
| secret info used with algorithm to form cipher |
|
|
Term
|
Definition
| a cryptosystem should be secure if everything but the key is publicly known |
|
|
Term
|
Definition
| # of values that can be used in a key |
|
|
Term
|
Definition
| # of different actual values something can have |
|
|
Term
|
Definition
| amount of work required to perform cryptanalysis on ciphertext to recover plaintext without knowing key or algorithm |
|
|
Term
|
Definition
Pseudo-Random Number Generator - creates a random number sequence with properties similar to those of real random number sequences |
|
|
Term
|
Definition
| converts message to a message digest, MD |
|
|
Term
|
Definition
| two messages produce same MD |
|
|
Term
|
Definition
| Number used only once, helps prevent replay attacks |
|
|
Term
|
Definition
| each plaintext but transformed into cipher one bit at a time |
|
|
Term
|
Definition
| message divided into blocks and each is transformed into encrypted block of cipher bits using algorithm and key |
|
|
Term
|
Definition
| substitute one value for another |
|
|
Term
|
Definition
| rearranges values within a block to create ciphertext |
|
|
Term
|
Definition
uses same key to encrypt and decrypt message
Examples: DES, 3DES, AES |
|
|
Term
|
Definition
public key and private key if encrypted with key A can only be decrypted with key B |
|
|
Term
|
Definition
| Confidentiality, Integrity, Availability |
|
|