Lesson 1 Flashcards

(47 cards)

1
Q

What is SOC

A

Security Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The cost of mitigating risk should never _________ the potential loss.

A

Meet/Exceed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False
It’s impossible to mitigate all risk.

A

True
Residual risk is the left over risk after all mitigation and controls have been applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST

A

National Institute of Standards & Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST Cyber Security Framework

A

A voluntary set of guidelines, standards and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5 Components of Cybersecurity Framework

A
  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover
  6. Govern (newest)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident Response Activities

A
  1. Report Attack
  2. Prepare Options
  3. Respond
  4. Identify Threat
  5. Coordinate
  6. Validate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybersecurity Framework Identify Stage

A

Understands your systems, assets, data and the risk they face.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cybersecurity Framework Protect Stage

A

Implement safeguards and controls to prevent attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity Framework Detect Stage

A

Continuously monitor your systems for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity Framework Respond Stage

A

Have a plan to address and contain security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybersecurity Framework Recover Stage

A

Restore your systems and data after a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cybersecurity Framework Govern Stage

A

Establish and monitor the organizations cybersecurity risk management strategy, expectations and policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST RMF

A

National Institute of Standards & Technology Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST RMF Stages

A
  1. Prepare
  2. Categorize
  3. Select
  4. Implement
  5. Assess
  6. Authorize
  7. Monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CIA

A

CIA Triad
Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The C in CIA

A

Confidentiality - Data is only shared with authorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The I in CIA

A

Integrity - Ensures that information or data regains unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The A in CIA

A

Availability - Ensures timely and reliable access to and use of information.

20
Q

Asset

A

Person or property owned by a person or company, regarded as having value.

21
Q

Threat

A

Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems.

22
Q

Types of Threats

A
  1. Malware
  2. Social Engineering
  3. Supply Chain Attacks
  4. Man-In-The- Middle Attacks (On-Path)
  5. DoS/DDoS Attacks
  6. SQL Injeftion Attacks
  7. APTs
  8. MITRE ATT&CK
23
Q

Risk

A

The potential for exposure or loss resulting from a cyberattack or data breach in your organization.

24
Q

Types of Risk

A
  1. Malware Attacks
  2. Randomware Attacks
  3. Insider Threats
  4. Phishing Attacks
  5. Poor Compliance Management
25
Vulnerability
A weakness in an IT that can be exploited by an attacker to deliver a successful attack.
26
Exploit
The successful attack of a computer system.
27
Types of Exploits
1. SQL Injection 2. XSS - Cross-Site Scripting 3. CSRF - Cross-Site Request Forgery 4. Abuse of Broken Authentication Code 5. Security Misconfigurations
28
Types of Social Engineering
1. Phishing 2. Smishing (SMS/Mobile) 3. Vishing (Voice) 4. Spear Phishing (Specific Individual) 5. Whaling (C Suite companies)
29
IoC
Indicator of Compromise
30
IoA
Indicator of Attack
31
What are IoCs
1. A means of collecting forensic data in relation to breach or attack 2. Are valid threats 3. Present after an attack has happened Example: Burglar successfully entered your home.
32
What are IoAs
1. Early warnings or clues that reveal suspicious activities 2. Become a threat based on the situation and what it means in that situation 3. Present before an attack occurs Example: Stakinhbout a home you plan to rob.
33
Types of Malware
1. Worms 2. Rookies 3. Keyloggers 4. Bots 5. Mobile malware
34
Worms
Spreads thru a network by replicating itself.
35
Rootkits
Gives hackers remote control of a victims device.
36
Keyloggers
Monitors users keystrokes
37
Bots
Launches a broad floor of attacks.
38
Attacks Malware
Infects mobile devices.
39
Ethical Hackers
Experts who is their abilities for ethical and legal purposes.
40
Hacktivist
Hackers who often use their abilities to support a political or ideological agenda. Actions are typically illegal but not motivated by personal gain.
41
Unethical Hacker
Hackers who are out for personal gain, seeking money or causing damage; operate illegally, without authorization
42
Macine Learning (ML)
A subset of AI that allows systems to learn from data and make decisions without being explicitly programed.
43
Computer Vision
A field of AI that trains computers to interpret and make decisions based on visual data from the world, like photos or videos.
44
Robotics
A field of AI that focuses on the design, construction Ave operation of robots, enabling then to interact autonomous with their environment.
45
Types of Artificial Intelligence
1. Artificial Narrow Intelligence - perform specific tasks w/in limited week- defined problems 2. Artificial General Intelligence - possess human-like intermittent abs can understand, learn and apply knowledge across various tasks. 3. Artificial Super Intelligence - surpass human intelligence across all cognitive abilities and capabilities.
46
Generative AI
A branch of AI that focuses on creating content from existing data.
47
Generative AI
A branch of AI that focuses on creating content from existing data.