Introductory Class Flashcards
(61 cards)
Incident
is a security event that compromises an information asset’s integrity, confidentiality, or availability.
Breach
is an incident that results in the confirmed disclosure—not just potential exposure—of data to an unauthorized party.
Assets
depend on the type of organization; for example, a bank’s asset is its money while the assets of a software company are in its computer code
Vulnerabilities
exist in both software and hardware. The discovery of such vulnerabilities is only a matter of time.
Exploitation
is the sse of a vulnerability to gain access to an organization.
Risk
is the level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system, given the potential impact of a threat and the likelihood of that threat occurring.
Threat
is any circumstance or event that can adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and denial of service; also, the potential for a threat source to successfully exploit a particular information system vulnerability.
Pen-test
also known as penetration testing, is the method of employing hacker tools and techniques to evaluate security and implemented controls. Another way of understanding a pen test is to discover both known and unknown vulnerabilities.
Confidentiality
preserves authorized restrictions on information access and disclosure, including the means of protecting personal privacy and proprietary information.
Integrity
guards against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.
Availability
ensures timely and reliable access to and use of information
Defense-in-Depth
is an information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and dimensions of the organization.
Security controls
include safeguards, measures, or steps taken to avoid, transfer, mitigate, reduce, or share the risks to organizational assets.
Exposure
is the combination of the likelihood and the impact levels of risk.
Red Team
is a group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. The Red Team’s objective is to improve enterprise cybersecurity by demonstrating the impacts of successful attacks and what works for the defenders (i.e., the Blue Team) in an operational environment. Also known as the Cyber Red Team.
Blue Team
is a group responsible for defending an enterprise’s use of information systems by maintaining its security posture against a group of mock attackers (i.e., the Red Team). Typically the Blue Team and its supporters must defend against real or simulated attacks 1) over a significant period; 2) in a representative operational context (e.g., as part of an operational exercise); and 3) according to rules established and monitored with the help of a neutral group refereeing the simulation or exercise (i.e., the White Team).
Pentest
is a method of testing where testers target individual binary components or the application as a whole to determine whether intra- or intercomponent vulnerabilities can be exploited to compromise the application, its data, or its environmental resources.
Malware
is hardware, firmware, or software intentionally included or inserted into a system for a harmful purpose.
Rogue access point
is an unauthorized access point connected to a network.
Ransomware
disables the victim’s access to data until a ransom is paid. (e.g., Ryuk).
Fileless malware
changes files native to the OS (e.g., Astaroth).
Spyware
collects user activity data without the user’s knowledge (e.g., DarkHotel).
Adware
serves unwanted advertisements (e.g., Fireball types of malware and their characteristics).
Trojans
disguise themselves as desirable code (e.g., Emotet)