Lesson 7: Configuring SOHO Network Security Flashcards
Three principles of security control and management. Also known as the information security triad. Also referred to in reverse order as the AIC triad.
CIA triad
- Confidentiality
- Integrity
- Availability
Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.
cybersecurity
Person or entity responsible for an event that has been identified as a security incident or as a risk
threat actor
Likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
Risk
Weakness that could be triggered accidentally or exploited intentionally to cause a security breach
vulnerability
System whose configuration is different from its secure baseline.
non-compliant system
System where one or more required security controls (antivirus or firewall, for example) is missing or misconfigured.
unprotected system
Specific method by which malware code infects a target host, often via some vulnerability in a software process.
exploit
Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.
zero-day
EOL
End of Life
Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data. A provisioning model that allows employees to use personal mobile devices to access corporate systems and data.
BYOD
BYOD
Bring your own device
Using persuasion, manipulation, or intimidation to make the victim violate a security policy.
Social engineering
Social engineering attack where an attacker pretends to be someone they are not.
Impersonation
Social engineering tactic where a team will communicate, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood
pretexting
The social technique of discovering things about an organization (or person) based on what it throws away
Dumpster diving
Social engineering tactic to obtain someone’s password or PIN by observing him or her as he or she types it in
shoulder surfing
Social engineering technique to gain access to a building by following someone who is unaware of their presence
Tailgating
Allowing a threat actor to enter a site or controlled location without authorization
Piggybacking
Email-based social engineering attack, in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phising
Email-based or web-based form of phishing which targets specific individuals. When the attacker has some information that makes the target more likely to be fooled by the attack
Spear phishing
An email-based or web-based form of phishing which targets senior executives or wealthy individuals. An attack directed specifically against upper levels of management in the organization (CEOs and other “big catches”).
Whaling
Social engineering attack where the threat actor extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP). Conducted through a voice channel (telephone or VoIP, for instance).
Vishing
Wireless access point that deceives users into believing that it is a legitimate network access point. Similar to phishing but instead of an email, the attacker uses a rogue wireless access point to try to harvest credentials
Evil twin