Assets, Threats, and Vulnerabilities Flashcards

(98 cards)

1
Q

What are Access Controls?

A

Security controls that manage access, authorization, and accountability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Adware?

A

A type of legitimate software that is sometimes used to display digital advertisements in applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is APT?

A

Advanced Persistent Threat - An instance when a threat actor maintains unauthorized access to a system for an extended period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Algorithm?

A

A set of rules used to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Angler Phising?

A

A technique where attackers impersonate customer service representatives on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a API token?

A

Application Programming Interface -A small block of encrypted code that contains information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Asset?

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Asset Classification?

A

The practice of labeling assets based on sensitivity and importance to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Asset Inventory?

A

A catalog of assets that need to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Asset Management?

A

The process of tracking assets and the risks that affect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Asymmetric Encryption?

A

The use of a public and private key pair for encryption and decryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Attack Surface?

A

The characteristics and features of the areas where an attack can come from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Attack Tree?

A

A diagram that maps threats to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Attack Vector?

A

The pathways attackers use to penetrate security defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Baiting?

A

A social engineering tactic that tempts people into compromising their security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Basic Auth?

A

The technology used to establish a user’s request to access a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Bit?

A

The smallest unit of data measurement on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Botnet

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Brute Force Attack?

A

The trial and error process of discovering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Bug Bounty?

A

Programs that encourage freelance hackers to find and report vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Cypher?

A

An algorithm that encrypts information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a CVE list?

A

An openly accessible dictionary of known vulnerabilities and exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is CVSS?

A

A measurement system that scores the severity of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Compliance?

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is XSS?
An injection attack that inserts code into a vulnerable website or web application
26
What is Cryptojacking?
A form of malware that installs software to illegally mine cryptocurrencies
27
What is a Cryptographic Key?
A mechanism that decrypts ciphertext
28
What us Cryptography?
The process of transforming information into a form that unintended readers can’t understand
29
What is the CNA?
An organization that volunteers to analyze and distribute information on eligible CVEs
30
What is Data?
Information that is translated, processed, or stored by a computer
31
What is Data at Rest?
Data not currently being accessed
32
What is Data in Transit?
Data traveling from one point to another
33
What is Data in Use?
Data being accessed by one or more users
34
What is a Data Custodian?
Anyone or anything that’s responsible for the safe handling, transport, and storage of information
35
What is a Data Owner?
The person that decides who can access, edit, use, or destroy their information
36
What is Defense in Depth?
A layered approach to vulnerability management that reduces risk
37
What is a DOM-based XSS Attack?
An instance when malicious script exists in the webpage a browser loads
38
What is a Digital Certificate?
A file that verifies the identity of a public key holder
39
What is a Dropper?
A type of malware that comes packed with malicious code which is delivered and installed onto a target system
40
What is Encryption?
The process of converting data from a readable format to an encoded format
41
What is a Exploit?
A way of taking advantage of a vulnerability
42
What is Exposure?
A mistake that can be exploited by a threat
43
What is Fileless Malware?
Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer
44
What is a Hacker?
Any person who uses computers to gain access to computer systems, networks, or data
45
What is Hash Collision?
An instance when different inputs produce the same hash value
46
What is a Hash Function?
An algorithm that produces a code that can’t be decrypted
47
What is a Hash Function?
A data structure that's used to store and reference hash values
48
What is IAM?
Identity and Access Management - A collection of processes and technologies that helps organizations manage digital identities in their environment
49
What is Information Privacy?
The protection of unauthorized access and distribution of data
50
What is InfoSec?
Information Security - The practice of keeping data in all states away from unauthorized users
51
What is a Injection Attack?
Malicious code inserted into a vulnerable application
52
What is a Input Validation?
Programming that validates inputs from users and other programs
53
What is IDS?
Intrusion Detection System - An application that monitors system activity and alerts on possible intrusions
54
What is a Loader?
A type of malware that downloads strains of malicious code from an external source and installs them onto a target system
55
What is Malware?
Software designed to harm devices or networks
56
What is MITRE?
A collection of non-profit research and development centers
57
What is MFA?
Multi-Factor Authentication - A technology that requires at least two distinct forms of identification
58
What is the NIST CSF?
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
59
What is Non-Repudiation?
The concept that the authenticity of information can’t be denied
60
What is OAuth?
An open-standard authorization protocol that shares designated access between applications
61
What is PASTA?
Process of Simulation and Threat Analysis - A popular threat modeling framework that’s used across many industries
62
What are PCI DSS?
Payment Card Data Security Standards - A set of security standards formed by major organizations in the financial industry
63
What is a Phishing Kit?
A collection of software tools needed to launch a phishing campaign
64
What is PUA?
Potentially Unwanted Application - A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software
65
What is a Prepared Statement?
A coding technique that executes SQL statements before passing them onto the database
66
What is a Principle of Least Privilege?
The concept of granting only the minimal access and authorization required to complete a task or function
66
What are Procedures?
Step-by-step instructions to perform a specific security task
67
What is PHI?
Protected Health Information - Information that relates to the past, present, or future physical or mental health or condition of an individual
68
What is PKI?
Public Key Infrastructure - An an encryption framework that secures the exchange of online information
69
What is Quid Pro Quo?
A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money
70
What is a Rainbow Table?
A file of pre-generated hash values and their associated plaintext
71
What is Ransomeware?
Type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access
72
What are Regulations?
Rules set by a government or other authority to control the way something is done
73
What is a Reflected XSS attack?
An instance when malicious script is sent to a server and activated during the server’s response
74
What is Risk?
Anything that can impact confidentiality, integrity, or availability of an asset
75
What is a Rootkit?
Malware that provides remote, administrative access to a computer
76
What is Salting?
An additional safeguard that’s used to strengthen hash functions
77
What is Scareware?
Malware that employs tactics to frighten users into infecting their device
78
What is a Security Assessment?
A check to determined how resilient current security implementations against threats
79
What is a Security Audit?
A review of an organization's security controls, policies, and procedures against a set of expectations
80
What are Security Controls?
Safeguards designed to reduce specific security risks
81
What is Security Hardening?
The process of strengthening a system to reduce its vulnerability and attack surface
82
What is Separation of Duties?
The principle that users should not be given levels of authorization that would allow them to misuse a system
83
What is a session?
A sequence of network HTTP basic auth requests and responses associated with the same user
84
What is a Session Cookie?
A token that websites use to validate a session and determine how long that session should last
85
What is Session Hijacking?
An event when attackers obtain a legitimate user’s session ID
86
What is a Session ID?
A unique token that identifies a user and their device while accessing a system
87
What is SSO?
Single Sign-on - A technology that combines several different logins into one
88
What is Smishing?
The use of text messages to trick users to obtain sensitive information or to impersonate a known source
89
What is Spyware?
Malware that’s used to gather and sell information without consent
90
What is a SQL Injection?
An attack that executes unexpected queries on a database
91
What are Standards?
References that inform how to set policies
92
What are Stored XSS Attacks?
An instance when a malicious script is injected directly on the server
93
What us Symmetric Encryption?
The use of a single secret key to exchange information
94
What is Tailgating?
A social engineering tactic in which unauthorized people follow an authorized person into a restricted area
95
What is Threat Modeling?
The process of identifying assets, their vulnerabilities, and how each is exposed to threats
96
What is a Trojan Horse?
Malware that looks like a legitimate file or program
97
What is User Provisioning?
The process of creating and maintaining a user's digital identity