Lesson 1 Flashcards

1
Q

What is SOC

A

Security Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The cost of mitigating risk should never _________ the potential loss.

A

Meet/Exceed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False
It’s impossible to mitigate all risk.

A

True
Residual risk is the left over risk after all mitigation and controls have been applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIST

A

National Institute of Standards & Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST Cyber Security Framework

A

A voluntary set of guidelines, standards and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5 Components of Cybersecurity Framework

A
  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover
  6. Govern (newest)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Incident Response Activities

A
  1. Report Attack
  2. Prepare Options
  3. Respond
  4. Identify Threat
  5. Coordinate
  6. Validate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybersecurity Framework Identify Stage

A

Understands your systems, assets, data and the risk they face.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cybersecurity Framework Protect Stage

A

Implement safeguards and controls to prevent attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity Framework Detect Stage

A

Continuously monitor your systems for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity Framework Respond Stage

A

Have a plan to address and contain security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybersecurity Framework Recover Stage

A

Restore your systems and data after a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cybersecurity Framework Govern Stage

A

Establish and monitor the organizations cybersecurity risk management strategy, expectations and policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST RMF

A

National Institute of Standards & Technology Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST RMF Stages

A
  1. Prepare
  2. Categorize
  3. Select
  4. Implement
  5. Assess
  6. Authorize
  7. Monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CIA

A

CIA Triad
Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The C in CIA

A

Confidentiality - Data is only shared with authorized personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The I in CIA

A

Integrity - Ensures that information or data regains unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The A in CIA

A

Availability - Ensures timely and reliable access to and use of information.

20
Q

Asset

A

Person or property owned by a person or company, regarded as having value.

21
Q

Threat

A

Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems.

22
Q

Types of Threats

A
  1. Malware
  2. Social Engineering
  3. Supply Chain Attacks
  4. Man-In-The- Middle Attacks (On-Path)
  5. DoS/DDoS Attacks
  6. SQL Injeftion Attacks
  7. APTs
  8. MITRE ATT&CK
23
Q

Risk

A

The potential for exposure or loss resulting from a cyberattack or data breach in your organization.

24
Q

Types of Risk

A
  1. Malware Attacks
  2. Randomware Attacks
  3. Insider Threats
  4. Phishing Attacks
  5. Poor Compliance Management
25
Q

Vulnerability

A

A weakness in an IT that can be exploited by an attacker to deliver a successful attack.

26
Q

Exploit

A

The successful attack of a computer system.

27
Q

Types of Exploits

A
  1. SQL Injection
  2. XSS - Cross-Site Scripting
  3. CSRF - Cross-Site Request Forgery
  4. Abuse of Broken Authentication Code
  5. Security Misconfigurations
28
Q

Types of Social Engineering

A
  1. Phishing
  2. Smishing (SMS/Mobile)
  3. Vishing (Voice)
  4. Spear Phishing (Specific Individual)
  5. Whaling (C Suite companies)
29
Q

IoC

A

Indicator of Compromise

30
Q

IoA

A

Indicator of Attack

31
Q

What are IoCs

A
  1. A means of collecting forensic data in relation to breach or attack
  2. Are valid threats
  3. Present after an attack has happened
    Example: Burglar successfully entered your home.
32
Q

What are IoAs

A
  1. Early warnings or clues that reveal suspicious activities
  2. Become a threat based on the situation and what it means in that situation
  3. Present before an attack occurs
    Example: Stakinhbout a home you plan to rob.
33
Q

Types of Malware

A
  1. Worms
  2. Rookies
  3. Keyloggers
  4. Bots
  5. Mobile malware
34
Q

Worms

A

Spreads thru a network by replicating itself.

35
Q

Rootkits

A

Gives hackers remote control of a victims device.

36
Q

Keyloggers

A

Monitors users keystrokes

37
Q

Bots

A

Launches a broad floor of attacks.

38
Q

Attacks Malware

A

Infects mobile devices.

39
Q

Ethical Hackers

A

Experts who is their abilities for ethical and legal purposes.

40
Q

Hacktivist

A

Hackers who often use their abilities to support a political or ideological agenda. Actions are typically illegal but not motivated by personal gain.

41
Q

Unethical Hacker

A

Hackers who are out for personal gain, seeking money or causing damage; operate illegally, without authorization

42
Q

Macine Learning (ML)

A

A subset of AI that allows systems to learn from data and make decisions without being explicitly programed.

43
Q

Computer Vision

A

A field of AI that trains computers to interpret and make decisions based on visual data from the world, like photos or videos.

44
Q

Robotics

A

A field of AI that focuses on the design, construction Ave operation of robots, enabling then to interact autonomous with their environment.

45
Q

Types of Artificial Intelligence

A
  1. Artificial Narrow Intelligence - perform specific tasks w/in limited week- defined problems
  2. Artificial General Intelligence - possess human-like intermittent abs can understand, learn and apply knowledge across various tasks.
  3. Artificial Super Intelligence - surpass human intelligence across all cognitive abilities and capabilities.
46
Q

Generative AI

A

A branch of AI that focuses on creating content from existing data.

47
Q

Generative AI

A

A branch of AI that focuses on creating content from existing data.