Risks, Threats, and Vulnerabilities Flashcards

1
Q

is a possible danger which may exploit a
vulnerability?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is any circumstance or event with the potential to adversely affect a system through
unauthorized access, destruction, disclosure, modification of data, or denial of service

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Threats does the STRIDE Model try to prevent?

A

Spoofing
Tampering
Repudiation
Information disclosure
denial of service
elevation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretending to be something or someone other than yourself

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Modifying something in memory

A

Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Claiming you didn’t do something or were not responsible; can be honest or false

A

Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Providing information to someone not authorized to access it.

A

Information Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exhausting resources needed to provide service.

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Allowing someone to do something they are not authorized to do.

A

Elevation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An Attack initiated by an insider, which have authorization to access a system but use it in a way that is not approved by the party that granted authorization. an entity inside of a security perimeter

A

Insider Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attack initiated by an outsider, an entity outside of a security perimeter. threats gain unauthorized or illegitimate access to a system.

A

Outside attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are utilized in outside attacks. they are focal points from collecting stolen information that launched automated attacks and distribute spam. is an aggregation of compromised computers, turning them into robots and used by attackers. communicate through a central control server and activate by attackers via chat rooms.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a flaw or weakness in a system’s design, implementation, or operation and management, which could be exploited to violate the system’s security policy. It MAY be exploited by a threat, but not every threat always results in an actual attack to the system.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the degree of Vulnerability, strength of attack, or effectiveness of countermeasures will determine an…

A

Attack Success

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Targeted resources may include data stored in an information system; services provided to the user; system processing power; and hardware; firmware; software; or physical design of the facility. is example of what kind of attack?

A

Network Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intentional act by which an intelligent threat attempts to evade security services and violate the security policy of a system.

A

Computer Network Attack

17
Q

Network attack are Characterized By?

A

Intent
point of initiation
method of delivery
may target one of multiple system resources

18
Q

Data contained in an information system
services provided by a system
processing power
bandwidth
hardware/firmware/software
facilities

A

Examples of System resources

19
Q

Types of computer network Attacks?

A

Denial of service DoS
DDOS
Unauthorized access
executing commands illicitly
destructive behavior

20
Q

sends more request to a machine then it can handle
easy to launch
difficult or impossible to track

A

Denial of service

21
Q

used to make DoS attacks easier
runs a program to blast a host with requests

A

toolkit

22
Q

allows an attacker access to information they should not have.

A

Unauthorized access

23
Q

occurs when an unknown and untrusted person executes commands on a server

A

executing commands illicitly

24
Q

2 main categories of severity of illicit commands

A

normal user and admin access

25
Q

the 2 destructive behavior

A

data diddling and data destruction

26
Q

attack changes entries in record
very dangerous
usually not obvious

A

data diddling

27
Q

attacker deletes files
can impact computing capabilities

A

data destruction

28
Q

Software designed to infiltrate or damage a computer
system without the owner’s informed consent through
email and Internet.

A

malware

29
Q

written to do harm
can be classified into many categories based on how they propagate and behave

A

computer viruses

30
Q

▪ Restricts communications to/from the network.
▪ Protects network resources against threats.

A

firewall

31
Q

Repairing a vulnerability or a flaw that is ID’d after the
release of an application or software.
▪ Regularly patching software is critical to deny malware
access.

A

software patching

32
Q

Prevention measures that stop unauthorized users from
accessing any part of the computers.

A

Mitigation Mechanism

33
Q

Mimics malicious network activity that hosts could
encounter.
▪ Routine scanning ID’s vulnerable hosts.

A

vulnerability scanning

34
Q

Prevents spyware from collecting information about the
user.

A

Anti-Spyware.

35
Q

A proxy resides between a user’s computer and the Internet.
▪ Provides security, privacy and web filtering.
▪ Often used as part of a firewall

A

proxy servers/ web content filters