Computer Security Flashcards

(25 cards)

1
Q

What is offensive security?

A

Offensive security involves breaking into computer systems and exploiting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is defensive security?

A

Defensive security is the process of protecting an organization’s network and computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who specializes in offensive security?

A

Red teams and penetration testers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of a Security Operations Center (SOC) in defensive security?

A

A SOC monitors the network and systems (24/7) to detect malicious cybersecurity events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is threat intelligence in defensive security?

A

Threat intelligence gathers information to help organizations better prepare against potential adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is identification in web application security?

A

Identification refers to uniquely identifying a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication in web application security?

A

Authentication is the process of verifying a user’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of an identification and authentication weakness? (One example for each)

A

Allowing brute force attacks and storing passwords in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is broken access control in web application security?

A

Broken access control occurs when users can access files or data they shouldn’t have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can attackers exploit broken access control?

A

They can view or modify others’ accounts or access protected pages as unauthenticated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a common cryptographic failure?

A

Sending sensitive data in clear text, such as using HTTP instead of HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three ways of achieving authentication?

A
  • Something you know (e.g., password)
  • something you are (e.g., fingerprint)
  • something you have (e.g., phone number for SMS).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most common form of authentication?

A

passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is weak file permissions, and why is it a security risk?

A

Weak file permissions can allow unauthorized access to files, compromising confidentiality and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is network security?

A

Network security is the protection of a computer network and its data from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some hardware solutions for network security?

A

Firewall appliances, Intrusion Detection System (IDS) appliances, and Intrusion Prevention System (IPS) appliances.

17
Q

What is a host firewall, and how does it differ from a firewall appliance?

A

A host firewall is software that runs on a system, while a firewall appliance is a hardware device that filters network traffic.

18
Q

What is the first step in network security exploitation from an attacker’s perspective?

A

Reconnaissance (Recon) involves gathering information about the target, such as server types, IP addresses, and email addresses.

19
Q

What is weaponization in the context of network security exploitation?

A

Weaponization is the preparation of a file with a malicious component.

20
Q

What is delivery, and how does it fit into network security exploitation?

A

Delivery involves delivering the weaponized file to the target through methods like email or USB drives.

21
Q

What is digital forensics?

A

Digital forensics is the application of computer science to investigate digital evidence for a legal purpose.

22
Q

What is the role of proper search authority (legality) in digital forensics?

A

Investigators cannot commence without the proper legal authority.

23
Q

What is the chain of custody in digital forensics?

A

It tracks who had possession of evidence at any given time.

24
Q

How is mathematical validation (hashing) used in digital forensics?

A

Hash functions are used to confirm that a file has not been modified.

25
What are some data sources used by a SOC for monitoring?
Server logs, DNS activity, firewall logs, and DHCP transactions.