1 Overview of Security Flashcards

(32 cards)

1
Q

What is confidentiality

A

Information has not been disclosed to unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is integrity

A

Information has not been modified or altered without proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is availability

A

Information is able to be stored, accessed, or protected at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the AAA of security

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authentication

A

When a person’s identity is established with proof and confirmed by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of something you know

A

A password or pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of something you are

A

A fingerprint, retina scan, or voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of something you have

A

when you get a one-time passcode from your phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of something you do

A

Check in sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of somewhere you are

A

log in through a vpn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authorization

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Accounting

A

Tracking of data, computer usage, and network resources. Non-repudiation occurs when you have proof that someone has taken an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the different ways to mitigate threats

A

Physical Controls, Technical Controls, and Administrative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of Physical Controls

A

Alarm systems, locks, surveillance cameras, identification cards, and security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of Technical Controls

A

Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some examples of Administrative Controls

A

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans. User training is the most cost-effective security control to use

17
Q

What are the seven sections of the killchain

A

Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control (C2), and Actions on Objectives

18
Q

What is Reconnaissance

A

The attacker determines what methods to use to complete the phases of the attack

19
Q

What is Weaponization

A

The attacker couples payload code that will enable access with exploit code that will use a vulnerability to execute on the target system

20
Q

What is Delivery

A

The attacker identifies a vector by which to transmit the weaponized code to the target environment

21
Q

What is Exploitation

A

The weaponized code is executed on the target system by this mechanism

22
Q

What is Installation

A

This mechanism enables the weaponized code to run a remote access tool and achieve persistence on the target system

23
Q

What is Command & Control (C2)

A

The weaponized code establishes an outbound channel to a remote server that can then be used to control the remote access tool and possibly download additional tools to progress the attack

24
Q

What are Actions on Objectives

A

The attacker typically uses the access he has achieved to covertly collect information from target systems and transfer it to a remote system (data exfiltration) or achieve other goals and motives

25
What is the MITRE ATT&CK framework
lists and explains specific adversary tactics, techniques, and common knowledge or procedures
26
What is the Diamond Model of Intrusion Analysis
A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim
27
What are the different types of intelligence
Proprietary, Closed-source, and Open source
28
What is the difference between proprietary and closed source intelligence
Proprietary intelligence is provided as a commercial service offering, often requiring a subscription. While Closed Source intelligence is mainly derived from the provider's own research and analysis and is anonymized.
29
What is threat hunting
a technique designed to detect presence of threat that have not been discovered by a normal security monitoring
30
True or False: Is Threat hunting less disruptive than pen testing
True
31
What are the steps to threat hunting
establishing a hypothesis, profiling threat actors and activities, use of tools
32
What are the benefits of threat hunting
improve detection capabilities, integrate intelligence, reduces attack surface, block attack vectors, and identify critical assets