Module 1 Flashcards

(60 cards)

1
Q

Assets

A

An organization resource that is being protected.

can be logical or physical

They are the focuse of what security efforts are attempting to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information assets

A

The focus of information security

any collection, set, or database of information or any asset that collects, stores, processes, or transmits information of value to the organzation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

three groups involved in information security planning

A

those in the field of information security

those in the field of IT

those from the rest of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Role of Information Security Community

A

protects the organziations information assets from the many threats they face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Role of the IT Community

A

supports the business objectives of the organization by supplying and supporting IT that is appropriate to the organization’s needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

role of general business community

A

articulates and communicates organizational policy and objectives and allocates resources to the other groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Specialized Areas of Security

A

Physical

Operations

Communications

Cyber

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical Security

A

protection of physical items, objects, or areas from unauthorized access and misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

operations security

A

The protection of the details of an organziations operations and activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

communications security

A

the protection of all communications media, technology, and content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cyber security

A

the protection of computerized information processing systems and the data they contain and process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network security

A

a subset of communications security and cybersecurity; the protection of voice and data networking components, connections, and content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information Security (InfoSec)

A

Protection of the confidentiality, integrity, and availability of informaiton assets, whether in storage, processing, or transmision, via the application of policy, education, training and awareness, and technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

McCumber Cube

A

standard for understanding many aspects of infosec, and shows the three dimensions that are central to the discussion of infosec

  1. information characteristics
  2. information location
  3. security control categories.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The CIA Triad

A

key characteristic of information that make it valuable to an organization

  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

confidentiality

A

limiting access to informaiton only to those who need it and preventing access to those who do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

integrity

A

an attribute of information that describes how data is whole, complete, and uncorrupted

Threatened when exposed to corruption, damage, destruction, or other disruption of its authentic state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Availability

A

users, either people or other systems, have access to it in a usable format.

access when needed by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

privacy

A

the right of individuals or groups to protect themselves and thier informaiton from unauthorized access, providing confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

synonym for attack

A

threat event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

12 categories of threats to information security

A
  1. compromises to intellectual property
  2. Deviations in quality of service
  3. espionage or tresspass
  4. force of nature
  5. human error or failure
  6. information extortion
  7. sabotage and vandalism
  8. software attacks
  9. technical hardware failures and errors
  10. technical software failures and errors
  11. technological obsolescence
  12. theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

example of compromises to intellectual property

A

software piracy

copyright infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Examples of deviations in quality of service

A

internet service issues

communications and service provider issues

power irregularities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

competitive intelligence

A

collectiion and analysis of informaiton about an organization’s business competitors through legal and ethical means to gain business intelligence and competive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
industrial espionage
collection of information of business competitors through illegal and unethical means to gain an unfair competitive advantge. Also known as corporate spying.
26
APT
advanced persistent threat
27
cracking
attempting to bypass a password orr other access control protection.
28
rainbow table
table of hash values and their corresponding plaintext values that can be used to look up passwords if attacker is able to steal a system's encrypted password file.
29
espionage or trespass
when unauthorized person gains acess to informaiton an oranization is trying to protect
30
types of password attacks
brute force dictionary attack rainbow table social engineering
31
advance fee fraud
nigerian scam scam requiring overpayment scam pretending to be a legit business saying you are due a large amount of money where you only need to provide small fee and banking information.
32
what are common human error attcks
social engineering advance fee fraud phishing spear phishing pretexting
33
other term of informaiton extortion
cyberextortion
34
Example of information extortion
ransomeware attack
35
TTP
tools, techniques, and procedures
36
Types of software attacks
malware, viruses, worms, trojan horses back doors, trap doors, and maintanance hooks denial of service email attack communications interception attacks
37
other name for malware
malicous code malicous software
38
macro virus
virus written in macro language to target applications that use that language typically affects documents, slideshows, emails, or spreadsheets created by office suite applications.
39
boot virus
boot sector virus virus that targets the boot sector or master boot record of a computer system's harddrive or removable storage media.
40
polymorphic threat
malware that over time changes the way it appears to anitvirus software programs making it undetectable.
41
another term for back door
maintenance hook
42
types of software attacks
malware back doors DOS and DDOS email attacks communications interception attacks
43
types of communication interception attacks
packet sniffer spoofing pharming man in the middle
44
pharming
the redirection of legitamite user web traffic to illegitamite web sites with the intent to collect personal information
45
Domain Name System (DNS) cashe poisoning or DNS Spoofing
intentional hacking and modification of a DNS database to redirect legitimate traffic to illegitamate ineternet locations
46
TCP hijacking
also known as session hijacking form of Man in the middle attack where attacker inserts himself into TCP/IP based communications allows attacker to eavesdrop as well as to change, delete, reroute, add, forge, or divert data.
47
mean time between failures (MTBF)
average amount of time between hardware failures presumes hardware can be repaired whereas mean time to failure (MTTF) presumes must be replaced
48
Types of technical softwared failures or errors
1. web application sins - sql injection, web server related vulnerabilities 2. implementation sins - buffer overflow, format string problems 3. cyrptographs sins - use of weak password, weak random numbers 4. networking sins - failure to protect traffic
49
POLC - popular management theory
management appraoch that uses the core principles of planning, organizing, leading, and controlling
50
Planning
process of developing, creating, and implementing strategies for the accomplishment of objectives
51
What are the three levels of planning
1. strategic planning 2. tactical planning 3. operational planning
52
strategic planning
occurs at highest levels of organization and for a long period of time, usually five or more years
53
tactical planning
focuses on production planning and integrates organizational resources at a level below the entire enterprise and or an intermediate duration (1-5 years)
54
operational planning
focuses on day to day operations of local resources and occurs in the present or short term.
55
organzing
the structuring of resources to support the accomplishment of objectives
56
controlling
the process of monitoring progress and making necessary adjustments to achieve desired goals or objectives
57
What are the problem solving steps
1. recognize and define the problem 2. gather facts and make assumptions 3. develop possible solutions 4. analyze and compare possible solutions 5. select, implelment, and evaluate
58
what are the 6 Ps?
planning, policy, programs, protection, people, project management
59
60