Chapter 2 Flashcards

(30 cards)

1
Q

What is the core duty of cybersecurity?

A

to identify, mitigate and manage cyber risk to an organization’s digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of approaches to cybersecurity implementation

A

Compliance-based
Risk-based
Ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the compliance-based approach

A

this approach relies on regulations or standards to

determine security implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the risk-based approach

A

relies on identifying the unique risk an organization faces and designing and implementing security controls to address that risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the ad hoc approach

A

an ad hoc approach simply implements security with no particular rationale or criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a risk?

A

The combination of the probability of an event and its consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Threat

A

anything that is capable of acting against an asset in a manner that can result in harm

a potential cause of an unwanted incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Asset

A

Something of value that is worth protecting,

ex: people, information, finances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a vulnerability?

A

a weakness in the design, implementation or operation of a process that can expose the system to adverse threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Residual risk

A

the remaining risk after management has implemented a risk response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Inherent risk

A

the risk level prior to taking action to secure assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the criteria for approaching risk?

A

Risk Tolerance
Size of the environment
Amount of data available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define cyberattack

A

a cyberattack is a well-defined, advanced, targeted attack that is stealthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define attack

A

the actual occurrence of a threat
or
an activity by a threat agent (or adversary) against an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define attack vector

A

the path used to gain access to the target asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attack vector types

A

ingress and egress

17
Q

ingress

A

intrusion into a system

18
Q

egress

A

data exfiltration

19
Q

attack mechanism

A

method used to deliver the exploit, may involve a payload

20
Q

payload

A

the container that delivers the exploit to the target

21
Q

malware

A

malicious code designed to gain access to targeted computer systems, steal information or disrupt computer operations

22
Q

common malware types

A

viruses
network worms
trojan horses

23
Q

what is a worm?

A

they carry out routines related to the payload

24
Q

what is a link file?

A

propagates copies of the worm

25
what is a rootkit?
hides malicious processes to prevent detection
26
what are policies?
required and prohibited activities and behaviors
27
what are standards?
Interpretation of policies in specific situations
28
what are procedures?
details on how to comply with policies and standards
29
what are guidelines?
general guidance on issues such as “what to do in particular circumstances.” These are not requirements to be met, but are strongly recommended.
30
What are the 5 attack attributes(steps)
``` Attack vector Payload Exploit Vulnerability Target Asset ```