vocab Flashcards
(196 cards)
confindentitality
ensures that only approved individuals may access information
Integrity
ensures that information is correct and unaltered
Availability
Ensures that information is accessible to authorized users
Authentication
The act of ensuring a users credentials as authentic
Authroization
grants a permission for a user to take a particular action
Accounting
creates a record that is preserved of who accessed the network, what resources they accessed, and when they disconnected from the network
Cybersecurity
involves a range of practices, process and technologies intended to protect devices, networks, and programs that process and store data in an electronic form
Information Security
Protects “processed data” that is essential in an enterprise
environment
Threat Actor
Individual or entity responsible for attacks
Financial crime three target categories
Individual Users
Enterprises
Governments
Threat actor categories
Unskilled actors, shadow IT, organized crime, insiders, hacktivists, state actors
Unskilled Actors
Want to perform attacks yet lack technical knowledge to carry them out.
Data exfiltration or service disruption
Shadow IT
Bypassing corporate approval for technology purchases.
Motivation often ethical, but weakens security
Organized crime
Close-knit group of highly-centralized enterprises engaging in illegal activities
Motivation is financial gain
Insider threats
A company’s own employees, contractors, and business partners. Hard to recognize
Motivation revenge or blackmail
Hacktivists
Strongly motivated by ideology and want to make a political statement
Motivation is to cause chaos/disruption
Nation-State Actors
Own state-sponsored attacks on foes. Multiyear intrusion campaigns targeting sensitive economic, proprietary, or national security information
Advanced Persistent Threat (APT)
Use innovative attack tools that silently extract data over an extended period of time
Competitors
Launch attacks against opponents systems to steal classified information
Motivation steal new product research or current customers
Brokers
Sell their knowledge of weakness to other attacks or governments
Motivation financial gain sell to highest bidder
Cyberterrorists
Attacks a nations network and computer infrastructure to cause disruption and panic
motivation terror and control and target computers or electrical grids
Attack surface (threat vector)
digital platform that threat actors target for their exploit
Supply chain
a network that moves product from its creation to the end-user (causes supply chain infections)
Supply chain infection
Malware can be injected into a product during its manufacturing, storage, and distribution