1.2 Attacking and Defending Flashcards
threat assessment
structured process of identifying the threats posed to a group or system
risk mitigation
the systematic reduction of the impact and likely occurrence of a negative event
Why mitigation and not eradication?
we cannot eradicate all risks. Cybersec is ever evolving, new threats emerge every day.
-business needs and budgetary constraints limit the ability to implement cybersecurity best practices.
attack
any kind of malicious activity that attempts to collect, disrupt, deny, degrade , or destroy information system resources of the information itself
physical machines
desktop or laptop; also known as bare metal machines; physical computers that have hardware components
-can run multiple virtual machines
virtual machine
an application that acts like a completely different physical machine
advantages of a virtual machine
easy and inexpensive (often free) to set up and run
can be easily distributed
advantage of a physical machine
typically more efficient b/c they access the hardware components directly
Ubuntu VM
a type of virtual machine
virtual box
a virtualization tool used to run various various operating systems on our local machines
Vagrant
tool used to build and set up virtual machines