1A Flashcards
(37 cards)
A ____ is any circumstance or event with the potential to adversely affect a system through unauthorized access, destruction, disclosure, modification of data, or denial of service.
threat
A threat is a ___ danger that ___ exploit a vulnerability.
possible
may
The model Microsoft uses for threat analysis and identification is called ____.
STRIDE
What does STRIDE stand for?
- Spoofing
- Tampering
- Repudiation
- Information disclosure
- Denial of Service
- Elevation of privilege
What is spoofing?
Pretending to be something or someone other than yourself.
What is tampering?
Modifying something on a disk, network, memory, or elsewhere.
What is repudiation?
Claiming you didn’t do something or were not responsible.
What is information disclosure?
Providing information to someone not authorized to have it.
What is denial of service?
Exhausting resources needed to provide services to the user.
What is elevation of privilege?
Allowing someone to do something they are not authorized to do.
What are the three types of threat agents?
Inside Attack, Outside Attack and Botnet
What is an Inside Attack?
An inside attack is initiated by an insider, which is an entity inside of a security perimeter. Insider threats have authorization to access a system, but they use their authorization in a way that is not approved by the party that granted authorization.
What is an Outside Attack?
This is initiated by an outsider, which is an entity outside of a security perimeter. Outsider threats gain unauthorized or illegitimate access to a system.
What is utilized on outside attacks?
Botnets
What is a botnet?
A botnet is an aggregation of compromised computers, turning them into robots used by attackers.
A bot (short for ___) is an automated program that
executes commands.
robot
Botnets operate through a central command-and-control server and can be activated by attackers via ___ ___.
chat rooms
A ___ is a flaw or weakness in a system’s design, implementation, or operation and management which could be exploited to violate the system’s security policies.
vulnerability
A vulnerability ___ be exploited by a threat, but not every threat always results in an actual attack to a system
may
The degree of ___, ____, and ___ will determine an attack’s success.
vulnerability, strength of attack and effectiveness of countermeasures
An attack to a network is an intentional act by which an intelligent threat actor attempts to evade security services and violate the security policy of a system.
Network Attack
A network attack can be characterized according to ___, ___, and ___.
intent, point of initiation and method of delivery
A network attack may also affect…?
one or multiple systems
In a network attack, targeted resources may include…?
- Data stored in an information system (IS)
- Services provided to the user
- System processing power
- Hardware
- Firmware
- Software
- The physical design of the facility