Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
127 views
15 pages
Security Concepts
Uploaded by
Carlos Alberto Mendes Betinho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Security Concepts For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
127 views
15 pages
Security Concepts
Uploaded by
Carlos Alberto Mendes Betinho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Security Concepts For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 15
Search
Fullscreen
BS anand guru Anand Guru Security+ | CySA+| CEH | ECIH round SOC Experts hutpsi//socexpertscom SUC EXPERTS Interview Questions on Security ConceptsWhat is CIA? Confidentiality, Integrity and Availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. The elements of the triad are considered the three most crucial components of security. Confidentiality means that only the authorized individuals/systems = can View sensitive or classified information. Encryption ar aay ‘The data being sent aver the network should not be accessed by Access Control Unauthorized individuals. Redundancy Availability Ensuring the systems and datas readily available to its users. Backups Load Balancers, BgElam ated tires cm sy Relate lal) Encryption is the process of encoding information in such a way that only authorized parties can understand it. Encryption is done using Keys. There are 2 types of Encryption: + Symmetric Encryption - Same key is used for encryption and decryption. : Blowfish, AES, RC4, DES, RCS, and RC6 + Asymmetric Encryption - Different keys are used encryption and decryption. + E.g: RSA, DSA, Elliptic curve techniques, PKCS.Lat edd Ty Encryp' In asymmetric encryption different keys are used encryption and decryption. Typically know as Private Key and Public Key (also referred to as Key Pair). ‘Any data encrypted with public key can only be decrypted by the corresponding private key. Example: Aserver keeps a key-pair. The public key is issued to all the users who request a connection. ‘At the user's end, the application encrypts the data using the server provided public key. Once the encrypted message reach the server, the server decrypts the message using its private key.DET eels + Hashing is the transformation of a string of characters into a fixed-length value or key that represents the original string. ABCDE — Ey}; = 2ECDDE3959051D913F61B14579EA136D + Hashing is one-way. ie. itis not possible to get the data back from the hash value. + Hashing is used to ensure the integrity of the data. Eg: * MDS. - 32 Hexadecimal characters + SHAT -40 Hexadecimal characters. + SHA.256 - 64 Hexadecimal characters soc BSExplai Lee ann Pte tonne Encryption is the process of encoding information in such a way that ‘only authorized parties can understand it ‘Two-way. i.e. we can get the data back by decryption Used to ensure confidentiality, ‘Algorithms: AES, DES, Bluefish Hashing is the transformation of a string of characters into afixed- length value or key that represents the original string. One-way. 2. we cannot get the data back from hash value Used to ensure integrity Algorithms: MDS, SHA-1, SHA-256Vulnerability Risk Threat Exploit Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset. The tool or mechanism used to take advantage of the vulnerabilityOE a + Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information. + If one mechanism fails, another steps up immediately to thwart an attack. + This multi-layered approach with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. er, ya. NS © BShat is System Hardenin; Systems hardening is a process of securing a system by reducing its attack surface. Few things on the system hardening checklist include: + Changing the default user credentials + Closing all unused ports + Stopping all unused services + Install updates and patches + Implement Access Control Install Antivirus and keep the signatures up-to-dateEater CM toate Zero trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. Few principles of zero trust model are: + Assume there are attackers both inside and outside the network = Concept of least privilege + Use Multi Factor Authentication wherever possible.POE Cle Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow systems to prove their identity to one another in a secure manner. Here are the most basic steps taken to authenticate in a Kerberized environment. Client requests an authentication ticket (TGT) from the Key Distribution Center (KDC) The KDC verifies the credentials and sends back an encrypted TGT and session key The TGT is encrypted using the Ticket Granting Service (TGS) secret key The client stores the TGT and when it expires the local session manager will request another TGT (this process is transparent to the user) AwN If the Client is requesting access to a service or other resource on the network, this is the process: 5, The client sends the current TGT to the TGS with the Service Principal Name (SPN) of the resource the client wants to access, 6. The KDC verifies the TGT of the user and that the user has access to the service 7. TGS sends a valid session key for the service to the client 8. Client forwards the session key to the service to prove the user has access, and the service grants access.If budget is not a concern how do you secure a web serve If budget is not a concern a web server can be secured by deploying the following technologies Network Security + Anti.DDOS technology + Fireal (To block traffic on unnecessary ports) + Intrusion Prevention System + Web Application Firewall Host Sec + Antivieus + HiPS/Host Firewall + Application control (To resriet the processes running) Apart from these preventive technologies, we should implement System Hardening and also enable log monitoring on the Web servers Also, the web application should be thoroughly tested by application penetration testing methods. soc BSWirral Me Tete Urm mu Ce Mees a] Acompliance framework is a structured set of guidelines that details an organization's processes for maintaining its cyber security. There are industry specific compliances like: PCLDSS ——- To protect credit card data. (Banks and E-commerce) HIPAA ~ To protect patients health information. (Hospitals and Insurance companies) SOx ~ Public listed companies GDPR - European companies and business that run in European countries.Pete ee Raa) Different types of Hackers + White Hat Hackers + White hat hackers are authorized hackers who work for the government and organizations by performing penetration testing and identifying loopholes in their cybersecurity. + Black Hat Hackers + Black Hat Hackers are hackers who hack for malicious intentions. Like financial gains. + Grey Hat Hackers + Gray hat hackers fall somewhere in the category between white hat and black hat hackers. They are not legally authorized hackers. They work with both good and bad intentions; they can use their skills for personal gain. + Script Kiddie + AScript kiddie is an unskilled person who uses scripts or downloads tools available for hacking provided by other hackers. + Hacktivist + Hacktivistis a hacker or a group of anonymous hackers who gain unauthorized access to governments computer files and networks for further social or political ends. + State/Nation Sponsored Hackers + State or Nation sponsored hackers are those who are appointed by the government to provide them cybersecurity and to gain confidential information from other countries to stay at the top or to avoid any kind of danger to the country. + Malicious Insider or Whistleblower + Amalicious insider or a whistleblower could be an employee of a company or a government agency who gains access/knowledge of inside operations which he speculates to be illegal and threatens to go publiceeu un ery If you had to both compress and encrypt data during a transmission, which would you do first? - Compress first (to reduce the size) and then Encrypt. Encryption on more data will take longer time. Between TLS and SSL, which is more secure? ~ TLS. SSL is the predecessor of TLS. What is Zeroday? - Avulnerability or a malware that has be identified but doesn’t have a fix (patch or signature) yet. It is the time period between a vulnerability/malware being identified and release of patch/signature. Difference between VA and PT. - Vulnerability Assessment is a process of identifying the vulnerabilities in a system or network. Penetration Testing is to go one step ahead of identifying the vulnerabilities and exploit the vulnerability. soc i]
You might also like
Messersectoprint
PDF
No ratings yet
Messersectoprint
48 pages
ML Complete Notes-AIDS
PDF
No ratings yet
ML Complete Notes-AIDS
115 pages
Desktop Support Questions and Operating System
PDF
No ratings yet
Desktop Support Questions and Operating System
11 pages
CFSS Internship Soc Analyst
PDF
100% (1)
CFSS Internship Soc Analyst
34 pages
Raw Logs
PDF
No ratings yet
Raw Logs
14 pages
IIS Interview Questions
PDF
No ratings yet
IIS Interview Questions
19 pages
Interview Q and A On Windows
PDF
No ratings yet
Interview Q and A On Windows
9 pages
11 Threat Hunting
PDF
No ratings yet
11 Threat Hunting
15 pages
91 SOC Interview Question Bank
PDF
No ratings yet
91 SOC Interview Question Bank
3 pages
Security Operation Center Cheat Sheet
PDF
No ratings yet
Security Operation Center Cheat Sheet
4 pages
Notes Feb2024
PDF
No ratings yet
Notes Feb2024
3 pages
Black Hat Rust
PDF
83% (6)
Black Hat Rust
357 pages
Top 50 Cybersecurity Interview Questions and Answers - 2021
PDF
No ratings yet
Top 50 Cybersecurity Interview Questions and Answers - 2021
9 pages
Interview Questions For Cyber Security SIEM Analyst
PDF
No ratings yet
Interview Questions For Cyber Security SIEM Analyst
4 pages
Information Security Analyst (Level 2) Key Objectives
PDF
No ratings yet
Information Security Analyst (Level 2) Key Objectives
1 page
Ip Addressing: Cisco Confidential
PDF
No ratings yet
Ip Addressing: Cisco Confidential
25 pages
04 SOC Processes
PDF
No ratings yet
04 SOC Processes
30 pages
Certified SOC Analyst CSA
PDF
No ratings yet
Certified SOC Analyst CSA
3 pages
Sy0-701 - 2 3
PDF
No ratings yet
Sy0-701 - 2 3
11 pages
03 Cyber Attacks
PDF
No ratings yet
03 Cyber Attacks
32 pages
Senior SOC Security Analyst L2 - Digital14
PDF
No ratings yet
Senior SOC Security Analyst L2 - Digital14
1 page
SOC Analyst Basics - Malware Analysis (Static)
PDF
No ratings yet
SOC Analyst Basics - Malware Analysis (Static)
31 pages
Paramean - Serverless - Infraless
PDF
No ratings yet
Paramean - Serverless - Infraless
13 pages
SoC Interview Questions
PDF
No ratings yet
SoC Interview Questions
24 pages
CompTIA Security+ (601 and 701) Study Notes
PDF
No ratings yet
CompTIA Security+ (601 and 701) Study Notes
194 pages
The Socialist Phenomenon
PDF
100% (1)
The Socialist Phenomenon
325 pages
Vulnerability Assessment
PDF
No ratings yet
Vulnerability Assessment
20 pages
Cyber Security Analyst Interview Questions and Answers
PDF
No ratings yet
Cyber Security Analyst Interview Questions and Answers
11 pages
Cisco Ccna
PDF
No ratings yet
Cisco Ccna
28 pages
Practice Test 1 CS0-003
PDF
No ratings yet
Practice Test 1 CS0-003
36 pages
Starting A Career in Cybersecurity
PDF
No ratings yet
Starting A Career in Cybersecurity
10 pages
SOC Interview
PDF
No ratings yet
SOC Interview
5 pages
What Are The Duties of A Lead Solutions Architect - Everyday Life - Global Post
PDF
No ratings yet
What Are The Duties of A Lead Solutions Architect - Everyday Life - Global Post
2 pages
Ritesh Resume Dec2023 - 113158
PDF
No ratings yet
Ritesh Resume Dec2023 - 113158
3 pages
Baba Sai Eswara Reddy Satti: Cybersecurity Student Ambassador
PDF
No ratings yet
Baba Sai Eswara Reddy Satti: Cybersecurity Student Ambassador
2 pages
Digispark HID Attacks 2020
PDF
100% (2)
Digispark HID Attacks 2020
68 pages
Swapneet Kaur 2
PDF
No ratings yet
Swapneet Kaur 2
2 pages
Cissp Notes 1627931054
PDF
No ratings yet
Cissp Notes 1627931054
101 pages
System and Networking Interview Questions PDF
PDF
No ratings yet
System and Networking Interview Questions PDF
138 pages
Isc2 Cissp 1 2 1 Understand and Apply Security Concepts (Cia)
PDF
No ratings yet
Isc2 Cissp 1 2 1 Understand and Apply Security Concepts (Cia)
2 pages
Remote Dictionary Server: Nilesh D Department of It
PDF
No ratings yet
Remote Dictionary Server: Nilesh D Department of It
17 pages
3 Ways To Hack CCTV Cameras
PDF
0% (1)
3 Ways To Hack CCTV Cameras
3 pages
General Requirement For The Effective Working of SOC
PDF
No ratings yet
General Requirement For The Effective Working of SOC
7 pages
CV SYSTEM SUPPORT - IT Support - Specialist
PDF
No ratings yet
CV SYSTEM SUPPORT - IT Support - Specialist
1 page
IBM QRadar SIEM For Security Intelligence - ScienceSoft
PDF
100% (1)
IBM QRadar SIEM For Security Intelligence - ScienceSoft
8 pages
Your Beginner's Guide To Becoming A SOC Analyst
PDF
No ratings yet
Your Beginner's Guide To Becoming A SOC Analyst
38 pages
Write Yourself Out of A Corner Unknown
PDF
No ratings yet
Write Yourself Out of A Corner Unknown
358 pages
Gourav Experience Resume
PDF
No ratings yet
Gourav Experience Resume
3 pages
Security-Windows Server Hardening Checklist
PDF
No ratings yet
Security-Windows Server Hardening Checklist
3 pages
SQL Injection Slides
PDF
No ratings yet
SQL Injection Slides
8 pages
9tut Notes
PDF
No ratings yet
9tut Notes
19 pages
C700 PerformanceAssessment
PDF
100% (1)
C700 PerformanceAssessment
18 pages
SOC Analyst Cyber Security Intrusion Training From Scratch
PDF
No ratings yet
SOC Analyst Cyber Security Intrusion Training From Scratch
3 pages
Practical Examples of Remote Attacks
PDF
No ratings yet
Practical Examples of Remote Attacks
20 pages
Arun Kumar Mohanty
PDF
No ratings yet
Arun Kumar Mohanty
3 pages
Lab 2 - Forensic Imaging
PDF
No ratings yet
Lab 2 - Forensic Imaging
2 pages
The Osint Cyber War 2021-02-22
PDF
No ratings yet
The Osint Cyber War 2021-02-22
26 pages
Sai Narendra Suraj RESUME
PDF
No ratings yet
Sai Narendra Suraj RESUME
2 pages
Securebasebook PDF
PDF
No ratings yet
Securebasebook PDF
184 pages
A+,Net+ Mcsa, Cap, Ccna, Scrum Master: Abraham Moncar
PDF
No ratings yet
A+,Net+ Mcsa, Cap, Ccna, Scrum Master: Abraham Moncar
4 pages
Lab4 Instruction Part2
PDF
No ratings yet
Lab4 Instruction Part2
22 pages
IT Help Desk Resume Sample
PDF
No ratings yet
IT Help Desk Resume Sample
2 pages
Cisco - Premium.210 255.by .VCEplus.34q DEMO
PDF
No ratings yet
Cisco - Premium.210 255.by .VCEplus.34q DEMO
17 pages
Eight Weeks Industrial Training: "Network Security"
PDF
No ratings yet
Eight Weeks Industrial Training: "Network Security"
27 pages
Understanding Cisco Cybersecurity Fundamentals (210-250) Blueprint
PDF
No ratings yet
Understanding Cisco Cybersecurity Fundamentals (210-250) Blueprint
6 pages
Creating Shellcodes in The Win32 Environment
PDF
No ratings yet
Creating Shellcodes in The Win32 Environment
34 pages
Netfilter and System Security Services
PDF
No ratings yet
Netfilter and System Security Services
22 pages
Hiding Files Using Kernel Modules
PDF
No ratings yet
Hiding Files Using Kernel Modules
22 pages
5 Ethical Hacking Malware Threats m5 Slides
PDF
No ratings yet
5 Ethical Hacking Malware Threats m5 Slides
22 pages
Entering The System by The Backdoor
PDF
No ratings yet
Entering The System by The Backdoor
8 pages
Cyber Information Security Analyst in Seattle WA Resume Robin Garrett
PDF
No ratings yet
Cyber Information Security Analyst in Seattle WA Resume Robin Garrett
3 pages
1.1 IDOR - Slides
PDF
No ratings yet
1.1 IDOR - Slides
12 pages
MindCert CISSP Law MindMap
PDF
No ratings yet
MindCert CISSP Law MindMap
1 page
Analysis and Incident Response
PDF
No ratings yet
Analysis and Incident Response
12 pages
4.1 EtterCap-TCPdump-Wireshark
PDF
No ratings yet
4.1 EtterCap-TCPdump-Wireshark
2 pages
Kanakaiah K
PDF
No ratings yet
Kanakaiah K
5 pages
Technical Interview Questions - Active Directory
PDF
No ratings yet
Technical Interview Questions - Active Directory
4 pages
Mcse Questions
PDF
No ratings yet
Mcse Questions
8 pages