Chapter 1 Flashcards

(58 cards)

1
Q

A response to risk that acknowledges the risk but takes no steps to address it.

A

accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security controls for developing and ensuring that policies and procedures are carried out; regulating the human factors of security.

A

administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A new class of attack that uses innovative attack tools to infect a system and then silently extracts data over a an extended period.

A

advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Deficiencies in software due to poor. design

A

architecture/design weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an item that has value.

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristic features of different groups of threat actors.

A

attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security actions that ensure that data is accessible to authorized users.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A response to risk that identifies the risk and the decision is made to not engage in the risk-provoking activity.

A

avoid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat actors that launch attack against an opponents’ system to steal classified information.

A

competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the highest data label level of sensitivity.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

having different groups responsible for regulating access to a system.

A

control diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the out-of-the-box security config settings

A

default config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Creating multiple layers of security defenses through which an attacker must penetrate; also called layered security.

A

defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

system for which vendors have dropped all support for security updates due to the system’s age.

A

end-of-life system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the location outside an enterprise in which some threat actors perform.

A

external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

an attribute of threat actors that can vary widely.

A

funding and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a group of threat actors that is strongly motivated by ideology

A

hactivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

software that does not properly trap an error condition and provides an attacker with underlying access to the system.

A

improper error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

software that allows the user to enter data but does not validate or filter user input to prevent a malicious action.

A

improper input handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

account set up for a user that might provide more access than is necessary.

A

improperly config accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Frameworks/architectures that are specific to a particular industry or market sector.

A

industry-specific frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

“support structures” for implementing security; also called reference architectures

A

industry-standard frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

employees, contractors, and business partners who can be responsible for an attack.

A

insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.

25
the reasoning behind attacks made by threat actors.
intent and motivation
26
the location within an enterprise in which some threat actors perform.
internal
27
information security framework/architectures that are worldwide.
international
28
when a company that made a device provides no support for the device.
lack of vendor support
29
creating multiple layers of security defenses through which an attacker must penetrate; also called defense-in-depth.
layered security
30
an incorrectly configured device.
misconfig
31
addressing risks by making risks less serious.
mitigate
32
state-sponsored attackers employed by a government for launching computer attacks against foes.
nation state actors
33
information security framework/architectures that are domestic.
national
34
a threat that has not been previously identified.
new threat
35
information security frameworks/architectures that are not required.
non-regulatory
36
freely available automated attack software.
open-source intel
37
threat actors that are moving from traditional organized criminal activities to more rewarding and less risky online attacks.
organized crime
38
A software occurrence when two concurrent threads of execution access a shared resources simultaneously, resulting in unintended consequences.
race condition
39
"supporting structures" for implementing security; also called industry-standard frameworks.
reference architectures
40
information security frameworks/architectures that are required by agencies that regulate the industry.
regulatory
41
a situation in which a hardware device with limited resources (CPU, memory, file system storage, etc.) is exploited by an attacker who intentionally tries to consume more resources than intended.
resource exhaustion
42
a situation that involves exposure to danger.
risk
43
different options available when dealing with risks.
risk response techniques
44
individual who lacks advanced knowledge of computers and networks and so uses downloaded automated attack software to attack information systems.
script kiddies
45
threat actors that have developed a high degree of complexity.
sophisticated
46
the widespread proliferation of devices across an enterprise.
system sprawl
47
using technology that is carried out or managed by devices as a basis for controlling the access to and usage of sensitive data.
technical controls
48
a type of action that has the potential to cause harm.
threat
49
a person or element that has the power to carry out a threat.
threat actor
50
a response to risk that allows a third party to assume the responsibility of the risk.
transfer
51
devices that are not formally identified or documented in an enterprise.
undocumented assets
52
users with little or no instruction in making security decisions.
untrained users
53
instructing employees as to the security reasons behind security restrictions.
user training
54
using security products provided by different manufactures.
vendor diversity
55
a flaw or weakness that allows a threat agent to bypass security.
vulnerability
56
a situation in which an attacker manipulates commonplace actions that are routinely performed; also called business process compromise.
vulnerable business processes
57
configuration options that provide limited security choices.
weak config
58
an attack in which there are no days of warning.
zero day