Module 2 Flashcards
are anything of value to an organization, such as data and other intellectual property, servers, computers, smart phones, tablets, and more.
Assets
A potential danger to an asset such as data or the network itself.
Threat
A weakness in a system or its design that could be exploited by a threat.
Vulnerability
An attack surface is the total sum of the vulnerabilities in a given system that are accessible to an attacker. The attack surface describes different points where an attacker could get into a system, and where they could get data out of the system. For example, your operating system and web browser could both need security patches. They are each vulnerable to attacks and are exposed on the network or the internet. Together, they create an attack surface that the threat actor can exploit.
Attack surface
The mechanism that is used to leverage a vulnerability to compromise an asset. Exploits may be remote or local. A remote exploit is one that works over the network without any prior access to the target system. The attacker does not need an account in the end system to exploit the vulnerability. In a local exploit, the threat actor has some type of user or administrative access to the end system. A local exploit does not necessarily mean that the attacker has physical access to the end system.
Exploit
The likelihood that a particular threat will exploit a particular vulnerability of an asset and result in an undesirable consequence.
Risk
is the process that balances the operational costs of providing protective measures with the gains achieved by protecting the asset.
Risk management
There are four common ways to manage risk (Risk Management Strategy)
Risk acceptance
Risk avoidance
Risk reduction
Risk transfer
This is when the cost of risk management options outweighs the cost of the risk itself. The risk is accepted, and no action is taken.
Risk acceptance
This means avoiding any exposure to the risk by eliminating the activity or device that presents the risk. By eliminating an activity to avoid risk, any benefits that are possible from the activity are also lost.
Risk avoidance
This reduces exposure to risk or reducing the impact of risk by taking action to decrease the risk. It is the most commonly used risk mitigation strategy. This strategy requires careful evaluation of the costs of loss, the mitigation strategy, and the benefits gained from the operation or activity that is at risk.
Risk reduction
Some or all of the risk is transferred to a willing third party such as an insurance company.
Risk transfer
The actions that are taken to protect assets by mitigating a threat or reducing risk.
Countermeasure -
The potential damage to the organization that is caused by the threat.
Impact -
requires inside network access such as a user with an account on the network.
A local exploit
does not require an account on the network to exploit that network’s vulnerability.
A remote exploit
is a common term used to describe a threat actor.
hacker
A clever programmer capable of developing new programs and coding changes to existing programs to make them more efficient.
A network professional that uses sophisticated programming skills to ensure that networks are not vulnerable to attack.
A person who tries to gain unauthorized access to devices on the internet.
An individual who run programs to prevent or slow network access to a large number of users, or corrupt or wipe out data on servers.
Hacker
are ethical hackers who use their programming skills for good, ethical, and legal purposes. They may perform network penetration tests in an attempt to compromise networks and systems by using their knowledge of computer security systems to discover network vulnerabilities. Security vulnerabilities are reported to developers and security personnel who attempt to fix the vulnerability before it can be exploited. Some organizations award prizes or bounties to ____ when they provide information that helps to identify vulnerabilities.
White hat hackers
are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage. An example would be someone who compromises a network without permission and then discloses the vulnerability publicly. ___ may disclose a vulnerability to the affected organization after having compromised their network. This allows the organization to fix the problem.
Grey hat hackers
are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks. __ hackers exploit vulnerabilities to compromise computer and network systems.
Black hat hackers
emerged in the 1990s. They are teenagers or inexperienced threat actors
running existing scripts, tools, and exploits, to cause harm, but typically not for profit.
Script Kiddies
are grey hat hackers who attempt to discover exploits and report them
to vendors, sometimes for prizes or rewards.
Vulnerability Brokers
are grey hat hackers who rally and protest against different political and social
ideas.
Hacktivists