1A Flashcards

1
Q

A ____ is any circumstance or event with the potential to adversely affect a system through unauthorized access, destruction, disclosure, modification of data, or denial of service.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A threat is a ___ danger that ___ exploit a vulnerability.

A

possible
may

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The model Microsoft uses for threat analysis and identification is called ____.

A

STRIDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does STRIDE stand for?

A
  • Spoofing
  • Tampering
  • Repudiation
  • Information disclosure
  • Denial of Service
  • Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spoofing?

A

Pretending to be something or someone other than yourself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is tampering?

A

Modifying something on a disk, network, memory, or elsewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is repudiation?

A

Claiming you didn’t do something or were not responsible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is information disclosure?

A

Providing information to someone not authorized to have it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is denial of service?

A

Exhausting resources needed to provide services to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is elevation of privilege?

A

Allowing someone to do something they are not authorized to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three types of threat agents?

A

Inside Attack, Outside Attack and Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Inside Attack?

A

An inside attack is initiated by an insider, which is an entity inside of a security perimeter. Insider threats have authorization to access a system, but they use their authorization in a way that is not approved by the party that granted authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Outside Attack?

A

This is initiated by an outsider, which is an entity outside of a security perimeter. Outsider threats gain unauthorized or illegitimate access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is utilized on outside attacks?

A

Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a botnet?

A

A botnet is an aggregation of compromised computers, turning them into robots used by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A bot (short for ___) is an automated program that
executes commands.

A

robot

17
Q

Botnets operate through a central command-and-control server and can be activated by attackers via ___ ___.

A

chat rooms

18
Q

A ___ is a flaw or weakness in a system’s design, implementation, or operation and management which could be exploited to violate the system’s security policies.

A

vulnerability

19
Q

A vulnerability ___ be exploited by a threat, but not every threat always results in an actual attack to a system

A

may

20
Q

The degree of ___, ____, and ___ will determine an attack’s success.

A

vulnerability, strength of attack and effectiveness of countermeasures

21
Q

An attack to a network is an intentional act by which an intelligent threat actor attempts to evade security services and violate the security policy of a system.

A

Network Attack

22
Q

A network attack can be characterized according to ___, ___, and ___.

A

intent, point of initiation and method of delivery

23
Q

A network attack may also affect…?

A

one or multiple systems

24
Q

In a network attack, targeted resources may include…?

A
  1. Data stored in an information system (IS)
  2. Services provided to the user
  3. System processing power
  4. Hardware
  5. Firmware
  6. Software
  7. The physical design of the facility
25
Q

What are the three types of network attacks?

A

Denial of Service
Distributed Denial of Service
Unauthorized Access

26
Q

__ __ __ attacks are probably the nastiest, and most difficult to address. They are very easy to launch and often difficult (sometimes impossible) to track because of their timing.

A

Denial of Service

27
Q

The following describes which type of network attack?

The intent is to send more requests to a machine than it can handle, disrupting or even totally blocking user services.

A

Denial of Service

28
Q

The following describes which type of network attack?

While a standard DoS attack comes from one computer, a ___ ___ ___ attack involves multiple computers sending requests, and is usually performed by a botnet.

A

Distributed Denial of Service

29
Q

The following describes which type of network attack?

The goal of these attacks is to access a resource that a machine should not provide the attacker. They may falsely identify as the originating host.

A

Unauthorized Access

30
Q

In the cyber world, we do not want unknown or untrusted individuals to gain access to our equipment. To help control this, systems are divided into two main classifications of users and their system access
capability:

A

user access and administrator access

31
Q

Among destructive types of break-ins and attacks, there are two major categories:

A

data diddling and data destruction.

32
Q

___ ___ occurs when an attacker makes small changes or entries in records to change the original meaning. It is a form of computer fraud involving the intentional falsification of numbers in data entry.

A

Data Diddling

33
Q

___ ___ is likely the worst type of attack since the fact of a break-in might not be immediately obvious.

A

Data Diddling

34
Q

The term ___ ___ can be defined as the process of destroying the data stored on tapes, hard disks, and other forms of electronic media so that it is completely unreadable.

A

Data Destruction

35
Q

Some countermeasures that may reduce the risk of DDoS attacks include:

A
  • Not running your visible-to-the-world servers at a level close to capacity.
  • Packet filtering to prevent obviously forged packets from entering your network address space.
  • Security-related patches for host operating systems.
36
Q

Some examples of data destruction include:

A
  • Erasing the recycle bin. This method allows you to quickly delete basic junk files from the computer without having to worry about formatting your entire computer’s hard drive.
  • Overwriting data to change the entire format.
  • Degaussing. This method uses a magnetic field to erase data and cause irreversible damage to the data.
  • Destroying hard drives with special software
  • Electronic shredding. This refers to physically destroying the entire system equipment.
37
Q

When data is destroyed for authorized purposes, it must be completely ____, regardless of the method, to ensure it is unreadable and cannot be accessed, recovered, or used for unauthorized purposes. This process can vary for each equipment type, classification, or scenario.

A

sanitized