S3, M1-M? Flashcards
(128 cards)
What are the four highest security concerns for senior executives?
B - Breaches of Data
T - Theft
R - Regulatory NonCompliance
S - Service Disruptions
What is a service disruption?
unplanned event that causes general system to be inoperable for an unacceptable length of time
What types of business and sector does the ISO/IEC 27001 apply to?
any business in any section
What is a cyberattack (3-part definition)?
- any kind of malicious activity that
- targets computers (broadly), and
- attacks to influence the system or its resources
The impacts of a cyberattack can extend to what four groups?
- organization
- customers
- vendors
- partner organizations
What is a threat agent (3-part definition)?
- internal or external attacker
- that could negatively impact data security
- through theft, manipulation, or control of sensitive information/systems
T/F: A threat agent can be someone inside the organization.
True.
What is the usual goal of a threat agent?
financial gain
What is an attacker/threat actor/hacker?
individuals or groups of individuals (hacking rings, APTs) that target people or organizations to gain access to systems, networks, and data
What is an adversary?
interests in conflict with the organization
What is a government/state-sponsored actor?
funded, directors, or sponsored by nations (think espionage)
What are hactivists?
groups of hackers that promote certain social causes or political agendas
What types of targets do hacktivists usually stay away from?
hospitals, churches, etc.
What are insiders?
employees
Why do insiders pose such a serious threat to organizations?
because of the level of access that they have
Does an insider threat actor have to had come into the organization with the goal to hack them later?
No, they could have organically grown their malicious intent over time.
What is an external threat?
one that is outside the organization
What are network-based attacks?
attacks that target the infrastructure of a network, including switches, routers, servers, and cabling
What are backdoors and trapdoors (network-based attacks)?
create a simple entry point and exit point to the network that is undocumented
Why do backdoors and trapdoors exist?
for developers to gain quick access
What are covert channels (network-based attacks)?
transmit data in small parts, in ways not originally intended
What is an example to illustrate covert channels?
In a foreign currency translation, a hacker reroutes any excess money beyond two decimal places (ex: $50.356, take the 0.006). This grows to be larger over time.
What is a storage channel (covert channel)?
modify a storage location to transmit data
What is a timing channel (covert channel)?
use delay in transmitting data packets to hide the re-route