Ch1 Flashcards
(52 cards)
What is Information Security?
Protection of information systems against unauthorized access to or modification of information, in storage, processing or transit, and against the DoS to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats. InfoSec aims to keep data in any form (physical and digital data) protected from unauthorized access, use, disclosure, modification, inspection, recording or disruption.
What is Cyber Security?
The ability to protect or defend the use of cyberspace from cyber attacks. It is a subset of information security, focused on the practice of protecting internet-connected systems, programs, data and networks from digital attacks, unauthorized digital access, or damage by implementing various processes, technologies and practices. Cyber security protects only digital data.
What’s the main difference between Information Security and Cyber Security?
Information Security aims to protect both physical and digital data, while Cyber Security focuses specifically on protecting only digital data. Cyber Security is considered a subset of Information Security.
What are the main security goals (objectives) in cybersecurity?
Confidentiality, Integrity, and Availability (CIA triad)
What is Confidentiality in cybersecurity?
Refers to the protection of data to ensure data/information is only accessible by the people authorized to see it. An organization needs to guard against the malicious actions that endanger the confidentiality of its information.
What are the attacks threatening Confidentiality?
- Stealing passwords
- Breaking encryption to get unauthorized access
- Sniffing - obtaining information by monitoring online traffic
What controls help attain Confidentiality?
- Encryption (Data at rest, Data in transmission)
- Access control (physical and technical)
- Awareness Training
What is Integrity in cybersecurity?
Refers to the protection of information and systems from being modified by unauthorized entities. It means that changes need to be done only by authorized entities and through authorized mechanisms.
What are the attacks threatening Integrity?
- Modification - attacker intercepts the message and changes it
- Masquerading or spoofing - attacker impersonates somebody else
- Replaying - attacker obtains a copy of a message sent by a user and later tries to replay it
What controls help attain Integrity?
- Hashing
- Message Authentication Code (MAC)
- Digital Signature
- Error detection and correction controls
What is Availability in cybersecurity?
Refers to the protection of systems to ensure reliable access to data and resources as and when needed. It also ensures all hardware and software are maintained properly and updated when needed.
What are the attacks threatening Availability?
Denial of Service (DoS) - may slow down or totally interrupt the service of a system
What controls help ensure Availability?
- Load balancing
- Redundant network and power
- Business continuity management & Disaster Recovery plans (Backup & restoration)
- Network and system performance monitoring
What is a Vulnerability in cybersecurity?
Any weakness that could be exploited. The weakness could be on software, hardware, process, or human. This includes unpatched systems, misconfigured network devices, etc.
What is a Threat in cybersecurity?
A potentially damaging event associated with the exploitation of a vulnerability. Actors that exploit vulnerabilities are called threat agents.
What is an Exposure in cybersecurity?
The potential that a security breach could occur. For instance, an unpatched system exposes the organization to a potential loss.
What is Risk in cybersecurity?
The likelihood that a vulnerability could be exploited and the corresponding impact of such an event. Risk ties the vulnerability, threat, and likelihood of exploitation to the resulting business impact.
What is a Countermeasure in cybersecurity?
A control that is put in place to mitigate a risk. Controls include access control, deployment of firewalls, passwords, encryption, etc.
Explain the relationship between vulnerability, threat, risk, exposure, and countermeasure with an antivirus example.
- Vulnerability: Expired antivirus software with outdated signatures
- Threat: Viruses attacking the systems and disrupting productivity
- Risk: Likelihood of virus infiltration and potential damage
- Exposure: When vulnerability is exploited, company is exposed to loss
- Countermeasure: Purchase and install updated antivirus software on all computers
What are the types of security attacks based on origin?
- Outsider attacks - Actions originate from outside, attackers do not possess credentials
- Insider attacks - Actions originate from inside, attackers possess all credentials, highly difficult to prevent
What are Passive Attacks in cybersecurity?
Eavesdropping on or monitoring of information that is being transmitted. Purpose is to obtain message contents and perform traffic analysis. Types include reading the content of the message and traffic analysis (observing traffic patterns).
What are Active Attacks in cybersecurity?
Any attempt to modify, destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset. Types include masquerade, replay previous messages, modify messages, and denial of service.
List the types of active attacks.
- Masquerade: Using someone’s identity with authority to perform certain actions
- Replay previous messages: Capture message from sender to receiver and later replay to receiver
- Modify messages: Attacker captures the message from sender to receiver and modifies the contents
- Denial of service: Attacker disrupts services by flooding requests to the server
What are the common security tools used by defenders?
- Encryption
- Anti-virus software & Spam filters
- Firewalls
- Intrusion detection/prevention software
- Strong authentication
- Access control
- Authorization management
- Application security gateways and filters
- Digital signatures
- Disaster Recovery
- Awareness/Education