Untitled Deck Flashcards

(313 cards)

1
Q

Information Security

A

Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Ensures information is accessible only to authorized personnel (e.g., encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Ensures data remains accurate and unaltered (e.g., checksums)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Ensures information and resources are accessible when needed (e.g., redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-Repudiation

A

Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIANA Pentagon

A

An extension of the CIA triad with the addition of non-repudiation and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Triple A’s of Security

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

Verifying the identity of a user or system (e.g., password checks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorization

A

Determining actions or resources an authenticated user can access (e.g., permissions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Accounting

A

Tracking user activities and resource usage for audit or billing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Control Categories

A

Technical, Managerial, Operational, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Control Types

A

Preventative, Deterrent, Detective, Corrective, Compensating, Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Zero Trust Model

A

Operates on the principle that no one should be trusted by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control Plane (Zero Trust)

A

Adaptive identity, threat scope reduction, policy-driven access control, and secured zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Plane (Zero Trust)

A

Subject/system, policy engine, policy administrator, and establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threat

A

Anything that could cause harm, loss, damage, or compromise to our information technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Threat Sources

A

Natural disasters, Cyber-attacks, Data integrity breaches, Disclosure of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Vulnerability

A

Any weakness in the system design or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vulnerability Sources

A

Software bugs, Misconfigured software, Improperly protected network devices, Missing security patches, Lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Risk

A

The intersection of a threat and a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Reasons Confidentiality is important

A

To protect personal privacy, To maintain a business advantage, To achieve regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Methods to ensure Confidentiality

A

Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Encryption
Process of converting data into a code to prevent unauthorized access
26
Access Controls (Confidentiality)
Setting up strong user permissions to ensure only authorized personnel can access certain data
27
Data Masking
Obscuring specific data within a database for unauthorized users while retaining its use for authorized users
28
Physical Security Measures (Confidentiality)
Ensuring confidentiality for both physical and digital information
29
Training and Awareness (Confidentiality)
Regular training on security awareness best practices
30
Reasons Integrity is important
To ensure data accuracy, To maintain trust, To ensure system operability
31
Methods to maintain Integrity
Hashing, Digital Signatures, Checksums, Access Controls, Regular Audits
32
Hashing
Process of converting data into a fixed-size value
33
Digital Signatures
Ensure both integrity and authenticity
34
Checksums
Method to verify the integrity of data during transmission
35
Access Controls (Integrity)
Ensure only authorized individuals can modify data
36
Regular Audits
Systematically reviewing logs and operations to ensure only authorized changes have been made
37
Reasons Availability is important
Ensuring Business Continuity, Maintaining Customer Trust, Upholding an Organization's Reputation
38
How to maintain Availability
Using redundancy in systems and network designs
39
Redundancy
Duplication of critical components or functions of a system to enhance reliability
40
Server Redundancy
Using multiple servers in a load-balanced or failover configuration
41
Data Redundancy
Storing data in multiple places
42
Network Redundancy
Ensures that if one network path fails, the data can travel through another route
43
Power Redundancy
Using backup power sources, like generators and UPS systems
44
Reasons Non-repudiation is important
To confirm the authenticity of digital transactions, To ensure the integrity of critical communications, To provide accountability in digital processes
45
5 Commonly used Authentication Methods
Something you know (Knowledge Factor), Something you have (Possession Factor), Something you are (Inherence Factor), Something you do (Action Factor), Somewhere you are (Location Factor)
46
Something you know (Authentication)
Relies on information a user can recall
47
Something you have (Authentication)
Relies on the user presenting a physical item
48
Something you are (Authentication)
Relies on a unique physical or behavioral characteristic
49
Something you do (Authentication)
Relies on a unique action
50
Somewhere you are (Authentication)
Relies on the user being in a certain geographic location
51
Multi-Factor Authentication (MFA)
Requires multiple methods of identification
52
Reasons Authentication is critical
To prevent unauthorized access, To protect user data and privacy, To ensure resources are accessed by valid users only
53
Authorization
Permissions and privileges granted after authentication
54
Reasons Authorization mechanisms are important?
To protect sensitive data, To maintain system integrity, To create a streamlined user experience
55
Accounting
Ensures all user activities are tracked and recorded
56
Reasons a robust Accounting system is important?
Create an audit trail, Maintain regulatory compliance, Conduct forensic analysis, Perform resource optimization, Achieve user accountability
57
Technologies used for Accounting
Syslog Servers, Network Analysis Tools, SIEM Systems
58
Syslog Servers
Aggregate logs from various devices for analysis
59
Network Analysis Tools
Capture and analyze network traffic
60
SIEM Systems
Real-time analysis of security alerts
61
Security Control Categories (4)
Technical, Managerial, Operational, Physical
62
Technical Controls
Technologies, hardware, and software to manage and reduce risks
63
Managerial Controls
Strategic planning and governance of security
64
Operational Controls
Procedures and measures for day-to-day data protection
65
Physical Controls
Tangible measures to protect assets
66
Security Control Types (6)
Preventive, Deterrent, Detective, Corrective, Compensating, Directive
67
Preventive Controls
Proactive measures to thwart threats
68
Deterrent Controls
Discourage attackers by making attacks less appealing
69
Detective Controls
Monitor and alert to malicious activities
70
Corrective Controls
Mitigate damage and restore systems
71
Compensating Controls
Alternative measures when primary controls are not feasible
72
Directive Controls
Guide, inform, or mandate actions (often policy-based)
73
Gap Analysis
Evaluating the differences between current and desired performance
74
Steps in Conducting a Gap Analysis
Define the scope, Gather data on the current state, Analyze the data, Develop a plan to bridge the gap
75
Types of Gap Analysis
Technical Gap Analysis, Business Gap Analysis
76
Technical Gap Analysis
Evaluating technical infrastructure
77
Business Gap Analysis
Evaluating business processes
78
Plan of Action and Milestones (POA&M)
Outlines measures to address vulnerabilities, allocate resources, and set timelines
79
Zero Trust
Demands verification for every device, user, and transaction
80
Two Planes of Zero Trust
Control Plane, Data Plane
81
Control Plane (Zero Trust)
Framework for defining, managing, and enforcing access policies
82
Elements of Control Plane (Zero Trust)
Adaptive Identity, Threat Scope Reduction, Policy-Driven Access Control, Secured Zones
83
Adaptive Identity (Zero Trust)
Real-time validation based on user behavior, device, location, etc.
84
Threat Scope Reduction (Zero Trust)
Limits user access to reduce the attack surface
85
Policy-Driven Access Control (Zero Trust)
Managing access based on roles and responsibilities
86
Secured Zones (Zero Trust)
Isolated environments for sensitive data
87
Components used by Control Plane (Zero Trust)
Policy Engine, Policy Administrator
88
Policy Engine (Zero Trust)
Cross-references access requests with predefined policies
89
Policy Administrator (Zero Trust)
Establishes and manages access policies
90
Data Plane (Zero Trust)
Consists of the Subject/System and Policy Enforcement Point
91
Subject/System (Zero Trust)
The entity attempting to gain access
92
Policy Enforcement Point (Zero Trust)
Where access decisions are executed
93
Threat Actor Objectives
Summarize security concepts, Compare threat actors and motivations, Explain threat vectors and attack surfaces
94
Threat Actor Motivations
Data Exfiltration, Blackmail, Espionage, Service Disruption, Financial Gain, Philosophical/Political Beliefs, Ethical Reasons, Revenge, Disruption/Chaos, War
95
Threat Actor Attributes
Internal vs. External, Differences in resources and funding, Level of sophistication
96
Types of Threat Actors
Unskilled Attackers, Hacktivists, Organized Crime, Nation-state Actors, Insider Threats
97
Unskilled Attackers (Script Kiddies)
Individuals with limited technical expertise who use readily available tools
98
Hacktivists
Individuals or groups driven by political, social, or environmental ideologies
99
Organized Crime
Groups that execute cyberattacks for financial gain (e.g., ransomware, identity theft)
100
Nation-state Actors
Highly skilled attackers sponsored by governments for cyber espionage or warfare
101
Insider Threats
Security threats originating from within the organization
102
Shadow IT
IT systems, devices, software, or services managed without explicit organizational approval
103
Threat Vector
The means or pathway by which an attacker gains unauthorized access
104
Shadow IT
Use of information technology systems, devices, software, applications, and services without explicit organizational approval; IT-related projects managed outside of the IT department.
105
Why does Shadow IT exist?
An organization's security posture is set too high or too complex, negatively affecting business operations.
106
Bring Your Own Devices (BYOD)
Involves the use of personal devices for work purposes.
107
Threat Vector
The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload.
108
Attack Surface
Encompasses all the various points where an unauthorized user can try to enter or extract data from an environment. Can be minimized by restricting access, removing unnecessary software, and disabling unused protocols.
109
Message-based Threat Vectors
Threats delivered via email, SMS text messaging, or other forms of instant messaging. ## Footnote Phishing campaigns are commonly used.
110
Phishing Campaigns (Message-based)
When an attacker impersonates a trusted entity to trick victims into revealing sensitive information.
111
Image-based Threat Vectors
Embedding malicious code inside an image file.
112
File-based Threat Vectors
Files, often disguised as legitimate documents or software, transferred as email attachments, through file-sharing services, or hosted on malicious websites.
113
Voice Calls (Threat Vector)
Vhishing: Use of voice calls to trick victims into revealing sensitive information.
114
Vhishing
Use of voice calls to trick victims into revealing sensitive information.
115
Removable Devices (Threat Vector)
One common technique is baiting: leaving a malware-infected USB drive in a public location.
116
Baiting (Removable Devices)
An attacker leaves a malware-infected USB drive in a location where a target might find it.
117
Unsecure Networks (Threat Vector)
Wireless, wired, and Bluetooth networks that lack appropriate security measures. Unauthorized access can intercept communications or gain network access.
118
MAC Address Cloning
An attack that can occur with physical access to network infrastructure.
119
VLAN Hopping
An attack that can occur with physical access to network infrastructure.
120
BlueBorne
A set of vulnerabilities in Bluetooth technology that allows attackers to take over devices, spread malware, or establish on-path attacks.
121
BlueSmack
A type of Denial of Service attack targeting Bluetooth devices by sending a specially crafted packet.
122
Deception and Disruption Technologies
Technologies designed to mislead, confuse, and divert attackers while detecting and neutralizing threats.
123
Tactics, Techniques, and Procedures (TTPs)
Specific methods and patterns of activities associated with a particular threat actor.
124
Honeypots
Decoy systems or networks set up to attract potential hackers.
125
Honeynets
A network of honeypots designed to mimic an entire network of systems (servers, routers, switches).
126
Honeyfiles
Decoy files placed within a system to lure attackers.
127
Honeytokens
Pieces of data or resources with no legitimate value but are monitored for access or use.
128
Bogus DNS entries
Fake Domain Name System entries introduced into a system's DNS server.
129
Creating decoy directories
Fake folders and files placed within a system's storage.
130
Dynamic page generation
Effective against automated scraping tools or bots trying to index or steal content.
131
Port Triggering
Security mechanism where services/ports remain closed until a specific outbound traffic pattern is detected.
132
Spoofing fake telemetry data
When a system detects a network scan, it can be configured to respond with fake network data.
133
Physical Security
Measures to protect tangible assets (buildings, equipment, people) from harm or unauthorized access.
134
Fencing and Bollards
Physical security controls. Fences are barriers made of posts and wire or boards. Bollards are short, sturdy vertical posts preventing vehicle access.
135
Fences
Barriers made of posts and wire or boards to enclose or separate areas; provide visual deterrent, physical barrier, and delay intruders.
136
Bollards
Robust, short vertical posts (steel or concrete) designed to manage or redirect vehicular traffic.
137
Brute Force Attacks (Physical Security)
Forcible entry, tampering with security devices, confronting security personnel, or ramming barriers with vehicles.
138
Forcible Entry
Gaining unauthorized access by physically breaking or bypassing barriers (windows, doors, fences).
139
Tampering with security devices
Manipulating security devices to create exploitable vulnerabilities.
140
Confronting security personnel
Direct confrontation or attack of an organization's security personnel.
141
Ramming barriers with vehicles
Using a vehicle to ram into physical security barriers.
142
Surveillance Systems
An organized strategy to observe and report activities. Components include video surveillance, security guards, lighting, and sensors.
143
Video Surveillance
Can include motion detection, night vision, facial recognition, and remote access.
144
Security Guards
Flexible and adaptable forms of surveillance.
145
Lighting
Crucial for effective surveillance; deters criminals, reduces hiding spots, and enhances video quality.
146
Sensors
Devices that detect and respond to external stimuli. Categories include infrared, pressure, microwave, and ultrasonic.
147
Infrared Sensors
Detect changes in infrared radiation (emitted by warm bodies).
148
Pressure Sensors
Activated when a specified weight is detected.
149
Microwave Sensors
Detect movement by emitting microwave pulses and measuring reflections.
150
Ultrasonic Sensors
Measure the reflection of ultrasonic waves off moving objects.
151
Bypassing Surveillance Systems
Visual obstruction, blinding sensors/cameras, interfering with acoustics or electromagnetics, or attacking the physical environment.
152
Visual Obstruction
Blocking a camera's line of sight (e.g., paint, stickers, objects).
153
Blinding Sensors and Cameras
Overwhelming a sensor or camera with a sudden burst of light.
154
Interfering with Acoustics
Jamming or playing loud music to disrupt microphones.
155
Interfering with Electromagnetic Signals (EMI)
Jamming the signals that surveillance systems rely on.
156
Attacking the Physical Environment
Physically tampering with surveillance equipment (e.g., cutting wires).
157
Access Control Vestibules
Double-door systems electronically controlled so only one door is open at a time; prevents piggybacking and tailgating.
158
Piggybacking
Two people working together; one with access allows another without access to enter.
159
Tailgating
An unauthorized person closely follows someone with access into a secure area without their knowledge.
160
Door Locks
Restrict and regulate access to spaces. Types include padlocks, pin and tumbler locks, numeric locks, wireless locks, biometric locks, and cipher locks.
161
Padlocks
Easily defeated, offer minimal protection.
162
Basic Door Locks
Vulnerable to simple techniques like lock picking.
163
Modern Electronic Door Locks
Utilize various authentication methods (identification numbers, wireless signals, biometrics).
164
Biometric Challenges
False Acceptance Rate (FAR), False Rejection Rate (FRR), Crossover Error Rate (CER).
165
False Acceptance Rate (FAR)
System erroneously authenticates an unauthorized user.
166
False Rejection Rate (FRR)
System denies access to an authorized user.
167
Crossover Error Rate (CER)
Balance between FAR and FRR for optimal authentication.
168
Cipher Locks
Mechanical locks with numbered push buttons requiring a correct combination.
169
Access Badge Cloning
Copying data from an RFID or NFC card onto another device. Steps: Scanning, Data Extraction, Writing, Using.
170
Radio Frequency Identification (RFID)
A technology used for contactless authentication.
171
Near Field Communication (NFC)
A technology used for contactless authentication.
172
Social Engineering
Manipulative strategy exploiting human psychology for unauthorized access.
173
Motivational Triggers (Social Engineering)
Familiarity/Likability, Consensus/Social Proof, Authority/Intimidation, Scarcity/Urgency, Fear.
174
Authority (Social Engineering)
People comply if they believe the request comes from someone in authority.
175
Urgency (Social Engineering)
Creating a sense of immediacy to drive quick action.
176
Social Proof (Social Engineering)
Looking to others' behaviors to determine one's own actions.
177
Scarcity (Social Engineering)
Psychological pressure when a resource is perceived as limited.
178
Likability (Social Engineering)
People want to interact with those they like.
179
Fear (Social Engineering)
Threatening negative consequences if instructions aren't followed.
180
Impersonation (Social Engineering)
Pretending to be someone else. Includes brand impersonation, typosquatting, and watering hole attacks.
181
Brand Impersonation
Pretending to represent a legitimate company or brand.
182
Typosquatting/URL Hijacking/Cybersquatting
Registering domain names similar to popular websites with typographical errors.
183
Watering Hole Attacks
Compromising a website or service that a target is known to use.
184
Pretexting
Creating a fabricated scenario to manipulate targets.
185
Phishing
Sending fraudulent emails to obtain personal information.
186
Spear Phishing
Targeted phishing focused on a specific group or organization.
187
Whaling
Targets high-profile individuals (CEOs, CFOs).
188
Business Email Compromise (BEC)
Using a compromised business email account to trick other employees.
189
Vishing (Voice Phishing)
Tricking victims into sharing information over the phone.
190
Smishing (SMS Phishing)
Using text messages to trick individuals into providing information.
191
Key Indicators of Phishing
Urgency, unusual requests, mismatched URLs, strange email addresses, poor spelling/grammar.
192
Frauds
Wrongful or criminal deception for financial or personal gain.
193
Identity Fraud/Identity Theft
Using another person's information without authorization.
194
Scams
Fraudulent or deceptive acts or operations.
195
Invoice Scam
A scam in which a person is tricked into paying for a fake invoice for a product or service they did not order.
196
Influence Campaigns
Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group. They foster misinformation and disinformation.
197
Misinformation
False or inaccurate information shared without harmful intent.
198
Disinformation
The deliberate creation and sharing of false information with the intent to deceive or mislead.
199
Diversion Theft
Involves manipulating a situation or creating a distraction to steal valuable items or information.
200
Hoaxes
Malicious deceptions often spread through social media, email, or other communication channels, often paired with phishing and impersonation. Prevention requires fact-checking and critical thinking.
201
Shoulder Surfing
Involves looking over someone's shoulder to gather personal information, sometimes using cameras. Prevention requires awareness of surroundings.
202
Dumpster Diving
Searching through trash to find valuable information, often discarded documents. Prevention involves clean desk and clean desktop policies.
203
Eavesdropping
Secretly listening to private conversations, intercepting communications without knowledge. Prevention involves data encryption in transit.
204
Baiting
Leaving a malware-infected physical device (e.g., USB drive) in a place where it will be found by a victim. Prevention requires user training not to use found devices.
205
Tailgating
An attacker follows an employee through an access control point without their knowledge.
206
Piggybacking
An attacker convinces an authorized employee to let them into a facility by having them swipe their access badge.
207
Malware
Malicious software designed to infiltrate and potentially damage computer systems without user consent. Categories include viruses, worms, Trojans, ransomware, spyware, rootkits, and spam.
208
Threat Vector
The method used to infiltrate a victim's machine (e.g., unpatched software, USB drives, phishing).
209
Attack Vector
The means by which the attacker gains access and infects the system, combining infiltration method and infection process.
210
Viruses
Attach to clean files, spread, and corrupt host files.
211
Worms
Standalone programs replicating and spreading to other computers without user interaction.
212
Trojans
Disguise as legitimate software, granting unauthorized access.
213
Ransomware
Encrypts user data and demands ransom for decryption.
214
Zombies/Botnets
Compromised computers (zombies) remotely controlled in a network (botnet) for malicious purposes.
215
Rootkits
Hide presence and activities on a computer, operating at the OS level.
216
Backdoors
Bypass normal security and authentication functions, often placed by designers/programmers or threat actors.
217
Logic Bombs
Malicious code that executes only when specific conditions are met.
218
Keyloggers
Record every keystroke made on a computer or mobile device.
219
Spyware
Monitors and gathers user/system information without knowledge.
220
Bloatware
Unnecessary software pre-installed on devices, consuming resources and potentially introducing vulnerabilities.
221
Computer Virus
Malicious code that runs on a machine without the user's knowledge, infecting the computer when executed.
222
Boot Sector Virus
Stored in the first sector of a hard drive, loaded into memory upon boot-up.
223
Macro Virus
Code embedded inside a document, executing when the document is opened.
224
Program Virus
Infects executable or application files.
225
Multipartite Virus
Combines boot sector and program virus characteristics.
226
Encrypted Virus
Hides from detection by encrypting its code/payloads.
227
Polymorphic Virus
Changes its code each time it executes to evade detection.
228
Metamorphic Virus
Rewrites itself entirely before infecting a file.
229
Stealth Virus
Uses techniques to prevent detection by antivirus software.
230
Armored Virus
Has a layer of protection to confuse analysis.
231
Hoax Virus
A form of technical social engineering that scares users into undesirable actions.
232
Worm
Self-replicating malicious software that spreads without user interaction, disrupting network traffic.
233
Trojan
Malicious software disguised as harmless or desirable software.
234
Remote Access Trojan (RAT)
Provides an attacker with remote control of a victim's machine.
235
Ransomware
Malware that blocks access to a system or data by encrypting it until a ransom is paid.
236
Botnet
A network of compromised computers or devices controlled remotely.
237
Zombie
A compromised computer or device within a botnet.
238
Command and Control Node
The computer managing and coordinating botnet activities.
239
Distributed Denial-of-Service (DDoS) Attack
Many machines target a single victim simultaneously.
240
Rootkit
Designed to gain administrative-level control over a system without detection.
241
Administrator/Root Account
Account with the highest level of permissions.
242
Kernel Mode
Operating at Ring 0, controlling access to device drivers and other core system functions.
243
DLL Injection
Technique to run arbitrary code within another process by forcing it to load a dynamic-link library.
244
Dynamic Link Library (DLL)
A collection of code and data used by multiple programs.
245
Shim
Software code placed between two components to intercept and redirect calls.
246
Backdoor
Bypasses normal security and authentication functions.
247
Easter Egg
A hidden feature or novelty within a program.
248
Logic Bomb
Malicious code that executes when specific conditions are met.
249
Keylogger
Software or hardware that records every keystroke.
250
Spyware
Malicious software designed to gather and send user/organization information without knowledge.
251
Bloatware
Unnecessary software pre-installed on devices.
252
Stage 1 Dropper/Downloader
Malware that retrieves additional malware code and tricks the user into activating it.
253
Dropper
Malware designed to initiate or run other malware forms within a payload.
254
Downloader
Retrieves additional tools post-initial infection.
255
Shellcode
Lightweight code meant to execute an exploit.
256
Stage 2 Downloader
Downloads and installs a remote access Trojan.
257
"Actions on Objectives" Phase
Threat actors execute primary objectives (e.g., data exfiltration, file encryption).
258
Concealment
Hiding tracks and erasing logs to prolong unauthorized access.
259
"Living off the Land"
Exploiting standard system tools for intrusions.
260
Account Lockouts
Multiple failed login attempts.
261
Concurrent Session Utilization
Multiple simultaneous sessions from a single account.
262
Blocked Content
Increased alerts from security tools.
263
Impossible Travel
Account access from geographically separated locations in an impossibly short time.
264
Resource Consumption
Unusual spikes in CPU, memory, or network bandwidth.
265
Resource Inaccessibility
Files or systems suddenly become inaccessible.
266
Out-of-Cycle Logging
Logs generated at odd hours.
267
Missing Logs
Gaps in logs or cleared logs without authorization.
268
Published/Documented Attacks
Reports of network infection.
269
Data Protection
Safeguarding information from corruption, compromise, or loss.
270
Data Classifications
Categorizing data based on value and sensitivity (e.g., Sensitive, Confidential, Public).
271
Data Owners
Senior executives responsible for labeling and protecting information assets.
272
Data Controllers
Entities responsible for determining data storage, collection, and usage purposes.
273
Data Processors
Entities hired by data controllers to assist with data tasks.
274
Data Stewards
Focus on data quality and metadata, ensuring proper labeling and classification.
275
Data Custodians
Responsible for managing data storage systems and enforcing access controls.
276
Data States
Data at rest, data in transit, and data in use.
277
Data at Rest
Inactive data on storage devices.
278
Data in Transit/Data in Motion
Data actively moving from one location to another.
279
Data in Use
Data actively being created, retrieved, updated, or deleted.
280
Full Disk Encryption (FDE)
Encrypts the entire hard drive.
281
Partition Encryption
Encrypts specific partitions.
282
File Encryption
Encrypts individual files.
283
Volume Encryption
Encrypts selected files or directories.
284
Database Encryption
Encrypts data within a database.
285
Record Encryption
Encrypts specific fields within a database record.
286
SSL (Secure Sockets Layer)/TLS (Transport Layer Security)
Secure communication over networks.
287
VPN (Virtual Private Network)
Creates secure connections over less secure networks.
288
IPSec (Internet Protocol Security)
Secures IP communications by authenticating and encrypting IP packets.
289
Encryption at the Application Level
Encrypts data during processing.
290
Access Controls
Restricts access to data during processing.
291
Secure Enclaves
Isolated environments for processing sensitive data.
292
Regulated Data
Controlled by laws, regulations, or industry standards.
293
PII (Personal Identification Information)
Information used to identify an individual.
294
PHI (Protected Health Information)
Information about health status, healthcare provision, or payment.
295
Trade Secrets
Confidential business information giving a competitive edge.
296
Intellectual Property (IP)
Creations of the mind (e.g., inventions, literary works).
297
Legal Information
Data related to legal proceedings, contracts, or regulatory compliance.
298
Financial Information
Data related to financial transactions.
299
Human-Readable Data
Understandable directly by humans.
300
Non-Human-Readable Data
Requires a machine or software to interpret.
301
Data Sovereignty
Digital information is subject to the laws of the country where it is located.
302
GDPR (General Data Protection Regulation)
Protects EU citizens' data.
303
Geographic Restrictions/Geofencing
Virtual boundaries to restrict data access based on location.
304
Encryption
Transforms plaintext into ciphertext.
305
Hashing
Converts data into fixed-size hash values.
306
Masking
Replaces data with placeholders.
307
Tokenization
Replaces sensitive data with non-sensitive tokens.
308
Obfuscation
Makes data unclear or unintelligible.
309
Segmentation
Divides a network into separate segments.
310
Permission Restrictions
Defining data access and actions through ACLs or RBAC.
311
Data Loss Prevention (DLP)
A strategy to prevent sensitive information from leaving an organization.
312
Endpoint DLP System
Installed on workstations/laptops, monitors data in use.
313
Network DLP System
Monitors data in transit across the network.