Appendix B. Memory Tables and Lists

Chapter 1

The following are examples of security mechanisms designed to preserve confidentiality:

Image

Image Encryption (in motion and at rest)

Image

Image

The following are the different components of STRIDE:

Image ______________: You must consider if the system or applications require nonrepudiation controls, such as system logs, web access logs, and audit trails. Another consideration is that an application should run with the user’s privileges, not more.

Image ______________: It is very important that you ensure in any application or system that users cannot elevate their privileges. Many organizations develop an authorization matrix to ensure that only authorized users and roles can access privileged functionality.

Image ______________: Sometimes referred to as identify spoofing. Attackers can disguise themselves as someone else. They can also disguise their systems as some other systems. For instance, in many distributed denial-of-service (DDoS) attacks, attackers can spoof the source of the attacks (that is, the IP addresses of the attacking machines or bots) in order to carry out the attack and maintain anonymity. This is why systems should have protection in place against spoofing attacks—and not just for DDoS. In general, users should not be able to become any other users or assume the attributes of other users, period.

Image ______________: You must make sure that a system or application does not disclose information that is not intended. For example, a web application should not store usernames and passwords in its source. Also, user credentials should not be stored in logs or in any other configuration or troubleshooting feature in plain text.

Image ______________: This ties into the discussion earlier in this chapter about integrity. Users must not be able to tamper with data, applications, or systems. In threat modeling, you must understand what threats could allow an attacker to tamper with data, applications, or systems in your organization.

Image ______________: You should evaluate what threats can cause a denial-of-service condition. This is beyond just performance testing and should employ methodologies such as fuzzing (sending random data to an application or protocol).

Chapter 3

The following are some of the most common evasion techniques against traditional IDS and IPS devices:

Image ______________: When the attacker evades the IPS box by sending fragmented packets.

Image Using low-bandwidth attacks: ______________

Image ______________: Using spoofed IP addresses or sources, as well as using intermediary systems such as proxies to evade inspection.

Image Pattern change evasion: ______________

Image Encryption: ______________

Chapter 5

The following are the most common incident response team structures:

Image _______________________________

Image _______________________________

Image _______________________________

The following are the most common incident response team staffing models:

Image _______________________________

Image _______________________________

Image _______________________________

The VERIS schema is divided into the following five main sections:

Image ________________________________

Image _______________________________

Image _______________________________

Image _______________________________

Image _______________________________

Chapter 7

Image

Table 7-4 PCI Data Security Standard—High-Level Overview

Chapter 9

While studying for the CCNA Cyber Ops SECFND exam, you learned about the concept of the 5-tuple. As a refresher, the 5-tuple refers to the following five elements:

Image _________________________

Image Source port

Image _________________________

Image Destination port

Image _________________________

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset