1 - Overview of Security Flashcards

1
Q

Information Security

A

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Act of protecting the systems that hold and process our critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Information has not been disclosed to unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Information has not been modified or altered without proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Information is able to be store, accessed, or protected at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the AAA of security

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

When a person’s identity is established with proof and confirmed by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authorization

A

Occurs when a user is given access to a certain piece of data or certain areas of. a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accounting

A

Tracking of data, computer usage, and network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four types of security threats

A

Malware, Unauthorized Access, System Failure, and Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Malware

A

short-hand term for malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is unauthorized access

A

Occurs when access to computer resources and data occurs without the consent of the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is system failure

A

occurs when a computer crashes or an individual application fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is social engineering

A

act of manipulating users into revealing confidential information or performing other detrimental actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can you mitigate threats through

A

Physical controls, technical controls, and administrative controls

17
Q

what are physical controls you can control

A

alarm systems, ID cards, and security guards

18
Q

what are technical controls you can control

A

smart cards, access control lists, network authentication, intrusion detection systems

19
Q

What are administrative controls

A

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans.

20
Q

What is the most cost-effective security control to use

A

User training

21
Q

What are the different types of hackers

A

white, black, gray, and blue hat. also elite hackers

22
Q

What is a blue hat hacker

A

hackers who attempt to hack into a network with permission of the company but are not employed by the company

23
Q

What are script kiddies

A

they have limited skill and only run other people’s exploits and tools

24
Q

What are hacktivists

A

hackers who are driven by a cause like social change, political agendas, or terrorism

25
Q

What is organized crime hackers

A

hackers who are part of a crime group that is well-funded and highly sophisticated

26
Q

What is an advanced persistent threats

A

highly trained and funded groups of hackers with covert and open-source intelligence at their disposal

27
Q

What do you measure the quality of intelligence

A

Timeliness, Relevancy, Accuracy, Confidence Levels

28
Q

What are the types of intelligence

A

Proprietary, Closed-Source, Open Source, OSINT

29
Q

What is Threat Hunting

A

A cybersecurity technique designed to detect presence of threat that have not been discovered by a normal security monitoring

30
Q

What is the kill chain

A

A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion

31
Q

What is MITRE ATT&CK Framework

A

A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures

32
Q

What is the Diamond Model of Intrusion Analysis

A

A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim