01 Introduction Flashcards
Information security
Protecting information and information systems.
Defines sets processes and activities performed in order to protect information.
Hack value
Hackers’ evaluation of whether something is worth or interesting.
High hack value examples
Accessing peoples credit card information as it can generate money.
Just accessing peoples names just to show a difficult task is doable.
Vulnerability
Weakness which can compromise the system and be used for a possible attack.
Exploit
Breach through vulnerabilities.
Also refers to a software that allows taking advantage of identified vulnerabilities.
E.g. connecting a malicious USB.
Payload
Part of malware or exploit code
E.g. a keylogger or a RAT (Remote Administration Tool) that a malicious USB installs.
Zero day attack
Exploiting previously unknown vulnerabilities before patch is released.
Daisy chaining
An attack in which hackers gain access to one network/device and then using it to access next networks/devices.
Doxing
Finding and publishing someone’s personally identifiable information (PII) for malicious reasons.
Bot
A software that can be controlled to execute predefined tasks.
Used by hackers to control the infected machines for malicious reasons.
E.g. creating a botnet by infecting more machines
CIA triad
known as three principles of information security
Ensures
Confidentiality: so no one can see what’s inside.
Integrity: no one tampers data-in transit
Availability: data is accessible on demand
Confidentiality
Ensures that information is available only to people who are authorized to access it.
Improper data handling or a hacking attempt leads to confidentiality breaches.
💡 Controls: * encryption * classification * access control * proper disposal (e.g. of DVDs, CDs, etc.)
Integrity
Ensures the accuracy of the information
Prevents improper and unauthorized changes—the
💡 Controls: * hashing * access control
Availability
Ensuring resources are available whenever the authorized user needs them
💡 Controls: * redundancy * data back-ups * antivirus * DDoS prevention
Authenticity
Ensures the quality of being genuine or uncorrupted, either:
users are actually who they present themselves to be through authentication
or a document or information presented is not corrupted.
Controls: * users (biometrics) * smart cards * data (digital certificates)