1 Overview of Security Flashcards

1
Q

What is confidentiality

A

Information has not been disclosed to unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is integrity

A

Information has not been modified or altered without proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is availability

A

Information is able to be stored, accessed, or protected at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the AAA of security

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authentication

A

When a person’s identity is established with proof and confirmed by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of something you know

A

A password or pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of something you are

A

A fingerprint, retina scan, or voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of something you have

A

when you get a one-time passcode from your phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of something you do

A

Check in sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of somewhere you are

A

log in through a vpn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Authorization

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Accounting

A

Tracking of data, computer usage, and network resources. Non-repudiation occurs when you have proof that someone has taken an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the different ways to mitigate threats

A

Physical Controls, Technical Controls, and Administrative Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of Physical Controls

A

Alarm systems, locks, surveillance cameras, identification cards, and security guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of Technical Controls

A

Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some examples of Administrative Controls

A

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans. User training is the most cost-effective security control to use

17
Q

What are the seven sections of the killchain

A

Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control (C2), and Actions on Objectives

18
Q

What is Reconnaissance

A

The attacker determines what methods to use to complete the phases of the attack

19
Q

What is Weaponization

A

The attacker couples payload code that will enable access with exploit code that will use a vulnerability to execute on the target system

20
Q

What is Delivery

A

The attacker identifies a vector by which to transmit the weaponized code to the target environment

21
Q

What is Exploitation

A

The weaponized code is executed on the target system by this mechanism

22
Q

What is Installation

A

This mechanism enables the weaponized code to run a remote access tool and achieve persistence on the target system

23
Q

What is Command & Control (C2)

A

The weaponized code establishes an outbound channel to a remote server that can then be used to control the remote access tool and possibly download additional tools to progress the attack

24
Q

What are Actions on Objectives

A

The attacker typically uses the access he has achieved to covertly collect information from target systems and transfer it to a remote system (data exfiltration) or achieve other goals and motives

25
Q

What is the MITRE ATT&CK framework

A

lists and explains specific adversary tactics, techniques, and common knowledge or procedures

26
Q

What is the Diamond Model of Intrusion Analysis

A

A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim

27
Q

What are the different types of intelligence

A

Proprietary, Closed-source, and Open source

28
Q

What is the difference between proprietary and closed source intelligence

A

Proprietary intelligence is provided as a commercial service offering, often requiring a subscription. While Closed Source intelligence is mainly derived from the provider’s own research and analysis and is anonymized.

29
Q

What is threat hunting

A

a technique designed to detect presence of threat that have not been discovered by a normal security monitoring

30
Q

True or False: Is Threat hunting less disruptive than pen testing

A

True

31
Q

What are the steps to threat hunting

A

establishing a hypothesis, profiling threat actors and activities, use of tools

32
Q

What are the benefits of threat hunting

A

improve detection capabilities, integrate intelligence, reduces attack surface, block attack vectors, and identify critical assets