Security Overview Flashcards

(59 cards)

1
Q

Information Security

A

Act of protecting data and info from unauthorized access, unlawful modification, and disruption, disclosure, corruption, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Security Systems

A

Protecting the systems that hold the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality (CIA Triad)

A

Info has not been disclosed to unauthorized ppl (encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity (CIA triad)

A

info hasn’t been altered or modified without proper authorization (hashes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability (CIA Triad)

A

Info is able to be accessed, stored, and protected at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAAs of Security

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication (AAA of security)

A

persons identity is established with proof and confirmed by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 Methods of Authentication

A
  1. Something you know (user/pass)
  2. Something you are (retina scan/fingerprint)
  3. Something you have (token, drivers license)
  4. Something you do (speak, signature)
  5. location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authorization (AAA of security)

A

occurs when a user is given access to certain part of something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Accounting (AAA of security)

A

tracking of data, computer usage, network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-repudiation

A

Proof that someone has taken action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security threats

A

Malware, unauthorized access, system failure, social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

malicious software (worms, virus, trojan horse, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unauthorized access

A

occurs when access to computer resources and data happens without consent of the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System Failure

A

BSOD - blue screen of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social engineering

A

act of manipulating a user into revealing confidential info performing other detrimental actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mitigating Threats

A

Physical Controls
Technical Controls
Admin Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical Controls

A

alarm systems, locks, fences, doors, badges/id cards, security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Technical Controls

A

smart cards, encryption, access control lists (ACLs), intrusion detection systems (IDS), network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Admin Controls (Managerial Controls)

A

policies, procedures, security awareness, contingency, disaster recovery plans (user training is most cost effective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

2 Categories of Admin Controls

A

User procedural controls - org choses to do on its own

Legal/Regulatory - required by law (HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

White Hat

A

non-malicious hackers who attempt to break into a company’s system at their request (internal/contractors) - penetration testers/ethical hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Black Hat

A

People that break into computer systems and networks without authorization or permissions (bad guys)

25
Blue Hat
People who attempt to hack into a network with the permission of a company but are not employed by the company
26
Gray Hat
Hacker without affiliation to a company that attempts to break into a company's network but risks the law. Doesn't necessarily have bad intention, just wants to break in
27
Elite Hacker
find and exploit vulnerabilities before anyone else does (1 in 10,000)
28
Script Kiddie
limited skill and only run other people's exploits and tools
29
Hacktivist
Hackers who are driven by a cause like social change, political agendas, terrorism
30
Organized Crime
hackers who are part of a crime group that is well funded and highly sophisticated
31
Advanced Persistent Threats (APTs)
highly trained and highly funded groups of hackers, funded by nation states with covert and open source intelligence at their disposal (russia/china)
32
Threat Intelligence Sources
``` Timeliness Relevancy Accuracy Confidence Level Open Source Proprietary Open Source Intelligence (OSINT) Threat Hunting ```
33
Timeliness
property of intelligence source that ensures it is up to date
34
relevancy
property of an intelligence source that ensures it matches the use cases intended
35
Accuracy
property of an intelligence source that ensures it produces effective results
36
Confidence Levels
property of an intelligence source that ensures it produces qualified statements about reliability
37
MISP Project
codifies the use of the admirability scale for grading data and estimate langugae ``` confirmed probably true possibly true doubtfully true improbable cannot be judged ```
38
Proprietary
threat intelligence is very widely provided as a commercial service offering, where acess to updates and research is subject to a subscription fee
39
Closed Source
data derived from the provider's own research and analysis efforts, such as data from honenets that they operate, plus info mined from it's customers systems suitably anonymized
40
honeynet
network setup with intentional vulnerabilities hosted on a decoy server to attract hackers
41
open source
data that is available to use without subscription, whi may include threat feeds similar to the commercial providers, and may contain reputation lists and malware signature dbs
42
Open source intelligence (OSINT)
methods of obtaining info about a person or org through public records, websites, social media (talos, virustotal, whois)
43
Threat hunting
cyber security technique designed to detect presence of threat that have not been discovered by a normal security monitoring
44
Benefits of Threat Hunting
``` improves detection capabilities integrate intelligence reduces attack surface block attack vectors identify critical access ```
45
Kill Chain
model developed by lockeed martin that describes the stages by which a threat actor progresses a network intrusion
46
Kill Chain Stages
``` Reconaissance Weaponization Delivery Exploitation Installation Command and control (C2) Actions on Objectives ```
47
Reconaissance
the attacker determines what methods to use to complete the phases of attack (should have a good idea of what software and network looks like when completed)
48
Weaponization
attacker couples payload code that will enable access with exploit code that will use vulnerability to execute on the target system
49
Delivery
attacker identifies a vector by which to transmit the weaponized code to target environment
50
Exploitation
weaponized code is executed on the target system by this mechanism
51
installation
mechanism enables weaponized code to run a remote access tool and achieve persistence on the target system
52
Command and Control (C2)
weaponzed code establishes an outbound channel to a remote server that can then be used to control the remote access tool and possibly download additional tools to progress the attack
53
Actions on Objections
use access they've achieved to do what they want to. covertly collect info and transfer to remote system (data exfiltration)
54
MITRE ATT&CK Framework
knowledge base maintained by the MITRE corp for listting and explaining specific adversary tactics, techniques, and common knowledge or procedures
55
Diamond Model of intrusion analysis
framework for analyzing cybersecurity incidents and intrusion by exploring the relationship between 4 core features
56
4 core features of Diamond Model of Intrustion Analysis
Adversary Capability infrastructure victim
57
You are at the doctor’s office and waiting for the physician to enter the room to examine you. You look across the room and see a pile of patient records on the physician’s desk. There is no one in the room and your curiosity has gotten the better of you, so you walk across the room and start reading through the other patient records on the desk. Which tenent of security have you just violated? 1. Confidentiality 2. Authentication 3. Integrity 4. Availability
Confidentiality
58
You have just walked up to the bank teller and requested to withdraw $100 from checking account #7654123 (your account). The teller asks for your name and driver’s license before conducting this transaction. After she looks at your driver’s license, she thanks you for your business, pulls out $100 from the cash drawer, and hands you back the license and the $100 bill. What category best describes what the bank teller just did? 1. Accounting 2. Authorization 3. Authentication 4. availability
Authentication
59
You are in the kitchen cooking dinner while your spouse is in the other room watching the news on the television. The top story is about how hackers have been able to gain access to one of the state’s election systems and tamper with the results. Unfortunately, you only heard a fraction of the story, but your spouse knows that you have been learning about hackers in your Security+ course and asks you, “Which type of hacker do you think would be able to do this?” 1. Hackitivists 2. Organized crime group 3. Apts 4. Script kiddies
APTs