Casp Study Guide Pdf 2019 Pdf

Transcription

Continue

Casp study guide pdf download 2019 pdf free pdfIt is included under the account policy node. Methodically designed, tested, and reviewed 8. SOAP Simple Object Access Protocol (SOAP) is designed to exchange XML-based information in computer networks. Integrate Mobility Management Enterprise security is already a challenge, but with the advent of mobile devices it has gotten a whole lotharder. Such items are easily lost or stolen. b. Before changes are made, the change management request should list specific items about the requested change. For more Nmap scanning examples, take a look at and if you would like to view some video tutorials, check out YouTube or hop on over to www.irongeek.com and search for “Nmap.” LabA19: Introduction to the Metasploit Framework In this lab, you will download and install the Metasploit Framework within your NETinVM lab environment and perform simple exploitation of your Debian machines. /index.asp, line 5 Although knowing the syntax and response used for a database attack is not required exam knowledge, you should beable to recognize SQL probing where an attacker uses the single quote (') symbol. 308 Chapter 6 Risk Management Here is a list of resources to support the concepts covered in this chapter: Risk management and risk responses plan-risk-responses Business continuity planning and business impact analysis index-en.aspx Business affect-business-69474.html Review Questions 309 Review Questions You can find the answers in Appendix A. LDAP D. Bottom of Memory After A buffer overflow can lead to all types of security breaches because values will be accepted by applications no matter what the format. The Digital Signature Standardmakes use of the Digital Signature Algorithm, and it also makes use of SHA-1 and public key encryption. Finally, the audio output port is another exit point for data that should be monitored and/or restricted from potential abuse. Here are some QoS examples: Jitter is the variation in transmission latency that can cause packet loss anddegraded VoIP call quality. This gives the attackers the ability to leverage their access and perform a variety of activities. Authentication provides a way to ensure that a message is from whom we believe it’s from. 546 Appendix B CASP Lab Manual 4. DoS attacks can be launched for extortion, so-called hacktivism, or other reasons to disruptnormal operations. In such situations, it is important that appropriate constraints be placed on the employee so as to not violate basic security controls. User rights D. When that person is someone who just recently lost access, Training and Awareness for Users 335 there might be an added risk of malicious attack or theft of data. MobileAuthentication There are several ways that a user may authenticate on a mobile device, none of which make sense in the context of a workstation or server. D. SIEM solutions help security professionals identify, analyze, and report on threats in real time. Cloud computing offers users the ability to increase capacity or add services as needed withoutinvesting in new datacenters, training new personnel, or maybe even licensing new software. Virtual systems can be imaged or replicated and moved to another physical computer very quickly. The 802.1q standard places information inside the Ethernet frame. Bridge D. This way, the organization can quickly correct the problem. Standards Open standards Adherence to standards Competing standards Lack of standards De facto standards Interoperability issues Legacy systems and software/current systems Application requirements Software types In-house developed Commercial Tailored commercial Open source Standarddata formats Protocols and APIs Resilience issues Use of heterogeneous components Course of action automation/orchestration Distribution of critical assets Persistence and nonpersistence of data Redundancy/high availability Assumed likelihood of attack Data security considerations Data remnants Data aggregation Data isolation Data ownership Data sovereignty Data volume Resources’ provisioning and deprovisioning Users Servers Virtual devices Applications Data remnants Design considerations during mergers, acquisitions, and demergers/divestitures Network secure segmentation and delegation Logical deployment diagram and corresponding physical deployment diagram of all relevant devices Security and privacy considerations of storage integration Security implications of integrating enterprise applications CRM ERP CMDB CMS Integration enablers Directory services DNS SOA ESB 4.4 Given a scenario, implement cryptographic techniques. Believing a profi le belongs to someone you care about (or have other strong feelings for/ against) is a strong lure for a response that can be used against you. This approach divides the network into three pieces: the access layer, the distribution layer, and the core layer. CloudComputing 107 Cloud computing may not be right for every organization, but it does work for many. Protocol D. Select SHA256. This is especially true if you’re using the older 2.4 GHz IEEE 802.11g standard. An intercepting proxy is tremendously useful when it allows a common user to “look under the hood” and start to understand better how theapplication is passing data, such as, for example: Is the password encrypted? This command gives more detail than the brief command but may be the only command available to you in a test simulation. An application-level proxy inspects the entire packet and then makes a decision based on what was discovered while inspecting the contents. Asmore large firms move to network-enabled scientific/industrial equipment, the probability of attack has increased. This might include in-depth training on access control systems, incident response systems, account review, forensics, and log file reviews. Many transmit information via clear text. If you don’t think social media can be a problem,consider the following: Please Rob Me A proof-of-concept website set up to aggregate information from various social network sites to determine if someone is home or away so that their house could be robbed. It is important that a CASP understand how the protocols work, what are each of their strengths, and how they can be attacked andsecured. Under Keyword Search in the middle of the page, enter XSS. If a vendor still supports the product, such as Microsoft and Windows 10, it will most likely offer an update or patch to fix the discovered vulnerability. (Jailbreaking is the process of removing the limitations imposed by smartphone vendors to control the operating system and whatprograms can be loaded.) Search Engine PoisoningSearch engine poisoning or black hat search engine optimization is a technique by which attackers ensure that their sites appear high in the results lists of queries so that users are redirected to infected sites. It also includes implementing security policies and controls. As an example, if Bob wantsto send Alice a secret message but is afraid that Mike can monitor their communication, how can he send the message? Start an unencrypted VoIP conversation on your computer, and capture the traffic. Having a CSIRT in place along with the policies they need to function can provide an organization with an effective and efficient means of dealingwith a data breach or other unseen situations in a manner that can reduce the potential impact. 248 Chapter 5 Application Security and Penetration Testing Exercise 5.4 Performing TCP and UDP Port Scanning Using the kali.iso file downloaded in Exercise 5.2, perform the following basic port scanning: 1. They identify problems, and then, onlysome of the problems. Router and Switch Protection Distributed denial-of-service (DDoS) attacks have been around long enough to not label them as an emerging threat. C. That measured snapshot value is called the metric. Under the VPN Type pull-down menu, select L2TP/IPsec With Pre-shared Key. DNSSEC is a real 80 Chapter 2 Comprehensive Security Solutions consideration, since one of the big issues with running two DNS servers is that the external DNS server which provides information to external hosts remains vulnerable to attack. Just know that various configurations may present you with different challenges. As the name suggests, if network traffic is identified asunwanted, that traffi c is sent to the network version of a “black hole” and dropped. Reduced expenditures C. It is used by Pretty Good Privacy (PGP). The approach documents development requirements early on. 3 Attributes of symmetric and asymmetric encryption Method Description Parity Simple error detection code Hashing Integrity Public KeyInfrastructure Method Description Digital signature Integrity, authentication, and non-repudiation Hashed MAC Integrity and data origin authentication CBC MAC Integrity and data origin authentication Checksum Redundancy check, weak integrity 25 Digital signatures are typically used within the Digital Signature Standard. Operating systemsvulnerabilities are difficult to find, but there are security controls to help mitigate the risk of those vulnerabilities from being exploited. Eradication and recovery Review Questions 355 13. The variances between development approaches is Development Approaches 215 in how much structure and documentation is done initially, how muchinteraction is done with the customer, and whether everything is built to completion first or built in workable pieces to be fit together later. State-based thresholds have alerts that occur when there is a change in the metric value. Addressing risks immediately follows an early prototype, then comes testing and an assessment of the 216 Chapter 5 Application Security and Penetration Testing development. Privacy and protection of sensitive information touch the organization in a way that no other items do. Lightweight Directory Access ProtocolLightweight Directory Access Protocol (LDAP) is an application protocol used to access directory services across a TCP/IP network. SOAPSAML assertions are attached to the SOAP document’s envelope header to secure the payload. Bob produces a message digest by passing a message through a hashing algorithm. Cryptocurrencies are all pseudo-anonymous, and some coins have added features to assist in creating true anonymity. Enterprise mobility management Containerization Configuration profiles and payloads Personally owned, corporate-enabled Application wrapping Remote assistance access VNC Screen mirroring Application, content and data management Over-the-air updates (software/firmware) Remote wiping SCEP BYOD COPE VPN Application permissions Side loading Unsigned apps/system apps Context-aware management Security restrictions Time-based restrictions 4.1 Given a scenario, integrate hosts, storage, networks, and applications into a secure enterprise architecture. Still other types of malware can live exclusively in fi les and loadthemselves into RAM. The user responds with a packet containing the identity, and the AP forwards this packet to the authentication server. Spoofing and spamming are two of the vulnerabilities associated with SMTP, in addition to the fact that it is also transmitted in clear text. If asked, enable bleeding-edge repositories. Though the connection islikely encrypted, Bluetooth communication is vulnerable to attack, whether by bypassing and undermining the encryption or by jamming the communication. These roles might include programmers, database administrators, network administrators, security administrators, and emergency response teams. Bell-LaPadula B. It also includes a suggestedlab setup. The CASP must work with others from the organization to identify critical assets, define security requirements, and help implement effective security controls. Encryption B. C. A trunking port is one that is designed to share traffic from multiple VLANs. 2. 134 Chapter 3 Securing Virtualized, Distributed, and Shared Computing Keepin mind that data aggregation increases the impact and scale of a security breach. If you have questions about your company’s AUP, you should review these issues with management. This involves the investigation of a business or person and its security practices prior to signing a contract. Figure 6.2 shows an example of cloud-based services. Whatis the correct term for when two different files are hashed and produce the same hashed output? SSL Inspection The previous section helped to make you aware of the need to encrypt traffic as it flows across your network. Legal obligations are different than privacy, data security, and transfer obligations that may apply if the data is hosted withindifferent countries or is controlled by different cloud providers. Trust Models and Remote Access Remote access is the ability to get access to a computer, laptop, tablet, or other device from a network or remote host. is a protocol specification for exchanging structured information in the implementation of web services in computer networks.Organizations that thrive on large amounts of data include government agencies, credit card companies, airlines, telephone billing systems, global capital markets, e-commerce, and even email archive systems. Exposure 21. Which of the following is not a reason companies implement mandatory vacations? Least functionality control maps to the FIPS199 baseline. SCEP is highly scalable and widely implemented. These virtual services work well if you are trying to share very large files or move information that is too big to fit as an attachment. Scanners collect lots of useful information quickly. For example, if a user were attempting unauthorized access repeatedly, despite their location andworking hours being within the “appropriate” boundaries, that user’s access could then be restricted further. One of the issues with active vulnerability scanning is that some testing routines can cause host systems to hang or crash. There is only one SOA record in each zone database fi le. Hardware Security ModuleMany organizations useHardware Security Modules (HSMs) to store and retrieve escrowed keys securely. LDAPS provides for security by making use of which one of the following? Sandboxing is widely used for analysis of malware. You are now pinging the OpenSUSE system at IP address 10.5.0.1 from the internal network to another machine within the internal network.A free version is offered for home use, and there’s a commercial version as well. LDAP over SSL (LDAPS) provides for secure communications between the LDAP servers and client systems by means of encrypted SSL connections. Physical and virtual network and security devices 8 4- UTM 4- IDS/IPS 4- NIDS/NIPS 4- INE 4- NAC 4- SIEM 2- Switch 3- Firewall 3- W ireless controller 3- Router 3- Proxy 3 Introduction xxxix- Load balancer 3- HSM 3- MicroSD HSM 3 Application and protocol-aware technologies 4, 5- WAF 4, 5- Firewall 4, 5- Passive vulnerability scanners 5- DAM 5 Advancednetwork design (wired/wireless) 2- Remote access 10- VPN 10- IPSec 10- SSL/TLS 10- SSH 2- RDP 3- VNC 3- VDI 3- Reverse proxy 3- IPv4 and IPv6 transitional technologies 2- Network authentication methods 10- 8 02.1x 10- Mesh networks 2- Placement offixed/mobile devices 2- Placement of hardware and applications 2 Complex network security solutions for data flow 4- DLP 4- Deep packet inspection 4- Data flow enforcement 4- Network flow (S/flow) 10- Data flow diagram 10 xl Introduction Secure configuration and baselining of networking and securitycomponents. They have been assigned addresses in the 10.5.x.x range. Videoconferencing 18. The approaches include the following: Independent ReviewReports and findings related to risk are distributed to each department head for review. Fortunately, segmentation via VLANs can assist with remedying this kind of issue as well. VMM C. If theIDS knows the normal activity of the protocol, it can pick out abnormal activity. As a security professional, you need to able to communicate with others about cryptographic solutions and services. IP B. These companies did not have sufficient controls in place to protect personally identifiable information. A great site to learn more about this incidentresponse process is . Ta b l e 6 . Employees don’t know proper policies and procedures if they are not informed and trained. Chapter 8: Security Research and Analysis 1. One of the best ways to defend against these threats and many others is to perform periodic testing. Companies must consider the security implications of what they make public ontheir websites, although it’s always about finding a balance. ESB is a framework in that different ESB products have different capabilities. It has no startup or shutdown process like TCP. SQL injection occurs when an attacker is able to insert SQL statements into a query by means of a SQL injection vulnerability. You don’t have to be able to writeyour own cryptographic algorithm. An example would be a company’s private cloud storage of travel expenses. If the source and destination buffer overlap the behavior, then memcpy is undefi ned. Research can also help in identifying and correcting potential security problems before they become worse. Scroll down to view some higher-pricedantennas. Once the project or service has been provided, the customer pays the contractor and the relationship ends. Another critical item is the range of wireless devices that most companies must address. Security controls must be tested and evaluated to ensure their effectiveness. Also, broadcast traffic is not supported; instead, IPv6 uses a linklocal scope as an all-nodes multicast address. Avoid C. The IPS was designed to move beyond IDSs and provide the capability to enforce computer security policies, acceptable use policies, or standard security practices. This concept allows you to prove your knowledge without revealing the fact to a third party. C. The hypervisor is also known as avirtual machine monitor (VMM). SOAP functions by means of the web service protocol stack. Classification helps define the appropriate level of protection for specific types of data. SIEM 410 Chapter 8 Security Research and Analysis 12. e x e r C i S e 4 .1 reviewing and Assessing ACls You have been asked to examine an ACL that wasdeveloped to allow permissible traffic that is part of a valid session to communicate with either a Telnet or web server. Assess all remote sites connected to SCADA systems. 53 B. Figure 6.3 shows an example of a risk-ranking matrix and one method for determining a risk score. Server-Side Processing 231 Fortunately, today it’s rare to fi nd websitesstill relying on Flash. Memory Dumping Memory dumping is another technique that can be used to analyze a program or malicious application. HAVAL C. Performed by a team 310 Chapter 6 Risk Management 7. Do you remember the commercial, “You got your chocolate in my peanut butter?” While you may not consider cryptography as tastyas chocolate, there is a real benefit to combining both symmetric and asymmetric encryption. Shawn downloads a program for his iPhone that is advertised as a game yet actually tracks his location and browser activity. Right-click the Network Adapter icon (above the red X in the following graphic) in VMware Workstation Player and click Disconnect.Memory Leaks Memory leaks are the result of an application not freeing up memory that it has allocated, used, and no longer needs. This makes it imperative for companies to practice due care and due diligence. 7- Risk assessment (RA) 7- Business impact analysis (BIA) 7- Interoperability agreement (IA) 7- Interconnectionsecurity agreement (ISA) 7- Memorandum of understanding (MOU) 7- Service-level agreement (SLA) 7- Operating-level agreement (OLA) 7- Nondisclosure agreement (NDA) 7- Business partnership agreement (BPA) 7- Master service agreement (MSA) 7 Research security requirements for contracts. Firewalls andNetwork Access Control Firewalls can be hardware, software, or a combination of both. Intrusions are detected in one of three basic ways: Signature RecognitionSignature recognition relies on a database of known attacks, and it is also known as misuse detection. The idea is to conduct tests to verify that the product or application meets therequirements laid out in the specification documents. malfeasance. Diffie and Dr. M.E. Hellman released the first public key-exchange protocol in 1976. Cryptocurrency Cryptocurrency is the medium of exchange similar to the United States dollar (USD) but designed for the purpose of exchanging digital information through a process made possibleby certain principles of cryptography. Fragmentation Handling This fi ngerprinting technique takes advantage of the fact that different OS vendors handle fragmented packets differently. Although reviewing the structure of UDP, TCP, and IP packets may not be the most exciting part of security work, a basic understanding of doing so is desirablesince so many attacks are based on manipulation of the packets. Scroll up to see the previous list of available commands. MD5 processes a variable-size input and produces a fixed 128-bit output. If a metric answers the question, What are we doing?, then a KPI answers the question, How are we doing? Select VPN on the left side. Anotherimplementation concern is quality of service (QoS). IPv4 IPv4 is described in RFC 791. It also allows users to share files and data between a Mac, iPhone, and iPad. . B. Buffer overflows cannot be defended against by end-user policies and education. You were ARP poisoned. Here are some examples of insecure protocols: FTP Clear text username andpassword Telnet Clear text username and password HTTP Clear text SMTP Username and password, along with all data passed in the clear For data in transit that is not being protected by some form of encryption, there are many dangers including these: Eavesdropping Sniffing Hijacking Data alteration Operational Risks 287High-value data requires protection. From a security standpoint, these systems are an important consideration because they are typically used by the utilities industry to monitor critical infrastructure systems, control power distribution, and for many other forms of automation. This great tool tracks changes made to the filesystem, the Registry,memory, and the network. Whether the device is just a screen, or if it includes a camera, microphone, or other sensors, the trust we place in these devices often goes unchecked. MicroSD HSMMicroSD Hardware Security Module (HSM) is a lightweight hardware security module in a MicroSD card. Anyone attempting to crack RSA would be leftwith a tough challenge because of the difficulty of factoring a large integer into its two factors. (You can also type the IP address instead of the computer name.) If you do not know the computer’s name or IP address, you can find it out by typing the hostname and ipconfig, respectively, in a command window. Many IT departments have missionstatements in which they publicly identify the level of service they agree to provide to their customers. VLANs can also be used to separate portions of the network that have lower levels of security. You may be presented with scenario questions, simulations, or even drag-and-drop situations in which you must properly position required controls andcountermeasures. One type of block cipher is a transposition cipher, which shifts units of plain text in a consistent way so that the cipher text constitutes a permutation of the plain text. Registration Authority If the CA is like a passport authority, the registration authority (RA) is like a middleman. One example of this is the Sarbanes-Oxley Act (SOX).All of these questions are typically spelled out in various documents. Each of these tools can be executed from the command line. New applications are typically created when new opportunities are discovered, or when companies want to take advantage of new technology or use technology to solve an existing problem. Learn more about this tool ad/ Presence Presence is an Apple software product that is somewhat similar to Windows Remote Desktop. Symmetric encryption is fast, and with a small key it can be used to encrypt bulk data very quickly. Block Ciphers Block ciphers are widely used in software products. They cannot decide if they willjoin the Force or go with the Dark Side. IT change management is a formalized process designed to control modifications made to systems and programs. In Exercise 7.1, you will compare a company’s existing security policy to a template that contains best practices. Scripting and ReplicationOne of the great things about PowerShell is its ability toscript basic window commands of SQL server objects easily. Warning banners typically do not contain which of the following? Logical security doesn’t require you to build a 10-foot concrete wall around your computer, but it does require you to harden the host in such a way as to make an attacker’s job more difficult. ThreatA threat is any agent,condition, or circumstance that could potentially cause harm, loss, damage, or compromise to an IT asset or data asset. Uptime Agreement An uptime agreement (UA) is one of the best-known types of SLAs; it details the agreed amount of uptime. Which form of attack sends fake SMS text messages? USB OTG is flash drive storage with a physicalinterface capable of attaching to almost every smartphone or small form factor device. There are at least three certificates per site (site cert, intermediate cert, and root cert) that give you a few options on what to pin. RST is used to signal the end of an abnormal session. 368 Chapter 8 Security Research and Analysis Two NIST standards thatsecurity professionals should review are Special Publication 800-100, the Information Security Handbook: A Guide for Managers, and Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organizations. Precedence value 3. Finally, you have the aforementioned resources and tools sections. Asset ManagementAsset management is the process of organizing, tracking, and supporting the assets of a company. Fred Cohen is generally credited with coining the term computer virus. Implementing best practices is not easy—different industries must provide different levels of compliance. Originating from Russia or former Soviet states have been some of themost notorious malware that has targeted global consumers, banks, and retailers over the past few years: LoJax, BadRabbit, and NotPetya, to name just a few. The security issue with mobile code is that it is executed locally. Techniques such as fast-flux DNS provide the botnet with the ability to hide their servers behind ever-changing proxies, makingit difficult to locate the bot herder. Macros are an example of this. In this example, port 80 was used to tunnel out the connection. Automated Peripherals Interconnect C. 542 Appendix B CASP Lab Manual 11. Many of the TCP/IP protocols and applications were not designed with security in mind. 1 Reviewing Your Company’s Acceptable UsePolicy As a CASP , you should have intimate knowledge of your company’s policies and procedures. How long is it likely to remain valuable? In early 2011, some of the last blocks of IPv4 addresses were allocated. Word documents B. Confidentiality, Integrity, Availability C. Exclude the base machine by entering nmap -sL 10.5.0.0/24 --exclude10.5.0.1. 12. As an example, moving from a user in sales to a user in marketing is an example of horizontal escalation. These kits consist of a builder that enables a user to create malware capable of web injections. 166 Exercise 4.4 Taking Control of a Router with Physical Access . As the Internet has grown, businesses have allowed customer access todata to, for example, track orders and find out where things are at any given time. Chapter 9: Enterprise Security Integration 1. A good source of information regarding Wireshark is the official website, Wireshark.org. The path they take is determined by the routing protocol. A VoIP softphone resides on a system that has many different uses. Someexamples of full disk encryption include Microsoft BitLocker, Apple FileVault, and McAfee endpoint encryption. Using a WHOIS tool such as www.domaintools.com, perform a WHOIS query on your company and see who is listed as the contact person. One common approach is to use managed cloud services. Vendor bankruptcy C. Segmenting thenetwork is done often to enhance performance by reducing the broadcast domain, but from a security perspective, network segmentation also provides a key advantage in controlling traffic. 64 can be used as a replacement for POP3 and offers advantages over 14. Fitness DevicesPeople buy Fitbits and other fitness devices to track their heartbeat,calculate calories spent, and so on. An effective security governance program includes the following outcomes: Strategic AlignmentThe first step is the strategic alignment of information security with business strategy. Examples of input values include dollar amounts, transaction counts, and error detection and correction. There are severalbenefits to be obtained from monitoring and learning about the behavior Malware Sandboxing 225 of users. Corporate governance is the system an organization has in place for overall control and management of the organization, processes, customs, and policies. Also, this chapter includes coverage of the interaction between business units andtheir security goals. For example, in a nontechnical sense, you may have a gu

Casp study guide pdf download 2019 pdf free pdf It is included under the account policy node. Methodically designed, tested, and reviewed 8. SOAP Simple Object Access Protocol (SOAP) is designed to exchange XML-based information in computer networks. Integrate Mobility Management Enterprise security is already a challenge, but with the advent .