CH1 Flashcards
(80 cards)
Any potential danger to an asset
Threat
If a vulnerability exist but has not yet been exploited the threat is considered what?
Latent
If someone is actively launching an attack against your system and successfully accesses something or compromises your security against an asset the threat is what?
Realized
The entity that takes advantage of a vulnerability
malicious actor
The path used by a malicious actor to perform an attack
threat agent or threat vector
A weakness in the system design, implementation, software, or code, or the lack of a mechanism.
Vulnerability
5 places vulnerabilities can be found
Applications, Operating Systems, Hardware, Misconfiguration, Shrinkwrap software
The identifier used by vendors, security researchers, and vulnerability coordination centers to disclose vulnerabilities to the public
CVE (Common Vulnerability Exposures)
A piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system.
Exploit
The probability or likelihood of the occurrence or realization of a threat.
risk
Any item of economic value owned by an individual or corporation.
asset
The amount of risk left after safeguards and controls have een put in place to protect the asset
residual risk
List 5 types of threat actors
Script kiddies, organized crime groups, state sponsors and governemnts, hacktivists, terrorist groups.
People who use existing scripts or tools to hack into computers and networks. They lack expertise to write their own scripts
Script kiddies
Group whose main purpose is to steal information, scam people, and make money
Organized crime group
These agents are interested in stealing data, including intellectual property and research-and-development data from major manufacturers, government agencies, and defense contractors.
State sponsors and governments
People who carry out cybersecurity attacks aimed at promoting a social or political cause
Hacktivist
These groups are motivated by political or religious beliefs
Terrorist Groups
These individuals perform ethical hacking to help secure companies and organizations.
White hat hacker
These individuals perform illegal activities, such as organized crime.
Black hat hacker
These individuals usually follow the law but sometimes venture over to the darker side of black hat hacking.
Gray hat hacker
The knowledge about an existing or emerging threat to assets, including networks and systems.
Threat intelligence
What 5 items make up threat intelligence
context, mechanisms, indicators of compromise, implications, and actionable advise
Typically require a host program or file to infect, requiring some human interaction.
Viruses