Security Part 1 Flashcards
What is Defense in Depth?
It is a cybersecurity risk management strategy that is based on the idea that systems can never be completely secure
It encompasses 3 categories of controls:
- Physical
- Technical
- Administrative
What is layered security?
- It is a part of the defense in depth technical controls
- It is a approach that creates overlapping protective layers so that if 1 security measure fails, deeper layers will stop or slow an attack
- Under this ideology, individual system components can never be completely secure
What are stakeholders in IT?
- Systems analysts
- Internal end users
- Internal managers
- External companies (customers)
- Stakeholders are any individual/organization with an interest in/affected by an information system
What is a cybercriminal?
They conduct ransomware attacks to extort money
What is a cyberterrorist?
They interrupt critical systems to spread hear or create civil unrest
Why would a company communicate social media policies to employees as part of a security awareness training program?
They would do that to reduce the risk of aiding cyberattack reconnaissance
What is RECONNAISSANCE?
- The attacker will scan public sources to gather planning information
- Employees who are not cyber aware may post something on social media that attackers can use for malicious purposes
- Ex: Employee may post on instagram where they work and attackers can use that info for malicious purposes
What is a replay attack?
- The threat agent intercepts info while it is being transmitted and resubmits it to trick another system into providing more info
- Ex: if an encrypted bank password is intercepted, the attacker may later resubmit it to transfer funds
- In this case, the attacker would appear as the original sender because the encrypted password would match
What is a preventitive control in a replay attack?
It would be to add time/session stamps to all encrypted messages
What is an attack surface?
- It is the sum of all the points where an attacker can try to gain unauthorized access to an organization’s environment
- Adding more IoT devices expands the attack surface, creating additional weaknesses
What are some common authentication techniques?
- Iris reader
- Fingerprint reader
- Facial recognition
- Smart card reader
What is a digital signature?
- It is something that uses data encryption to record a unique identifier, and other info such as the date, time, and location of the signature
- This stamp protects electronic documents from unauthorized alteration and records signers’ identity
- It would NOT prevent unauthorized access to a company payroll file because it is not used to grant entry into a system
What is the Internet of Things?
- It is a network of physical objects with embedded sensors, software used to connect and exchange data via the internet
- IoT devices use unencrypted communication channels, leaving the data transmitted between the devices vulnerable to attacks
What is Man in the Middle?
It is an attack where attackers can intercept, read, and alter data in transit from one person to another person
What is a buffer overflow attack?
It is an attack that exploits hardware memory limitations
What is a buffer?
It is a temporary storage area used to hold data for processing/transmission
What do software coding errors create?
They create vulnerabilities that attackers can use to overwhelm a system
What is a covert channel attack?
It is a cyberattack technique where an unauthorized intrasystem channel adds small bits of data to the stream without being detected
What is a race condition attack?
- It is a cyberattack technique that exploits a brief gap in time during a processing sequence
- Ex: The moment between when a user logs in and when the login is verified in a database
What is a SQL injection attack?
It is an attack where a SQL query is injected into an application through a data input field
Organizations use what kind of controls to lessen the risks associated with cyberattacks?
- Preventitive
- Detective
- Corrective
What is virus quarantining?
It corrects a detected incident in which files were infected with spyware, ransomware, malware
What is firewall redundancy?
- It is a preventitive control
- Firewalls mitigate the risk of unauthrorized access
What is network analysis?
- It is a detective control associated with computer-generated logging
- Ex: An event log records network traffic and usage, like logins, failed passwords