1A Flashcards
A ____ is any circumstance or event with the potential to adversely affect a system through unauthorized access, destruction, disclosure, modification of data, or denial of service.
threat
A threat is a ___ danger that ___ exploit a vulnerability.
possible
may
The model Microsoft uses for threat analysis and identification is called ____.
STRIDE
What does STRIDE stand for?
- Spoofing
- Tampering
- Repudiation
- Information disclosure
- Denial of Service
- Elevation of privilege
What is spoofing?
Pretending to be something or someone other than yourself.
What is tampering?
Modifying something on a disk, network, memory, or elsewhere.
What is repudiation?
Claiming you didn’t do something or were not responsible.
What is information disclosure?
Providing information to someone not authorized to have it.
What is denial of service?
Exhausting resources needed to provide services to the user.
What is elevation of privilege?
Allowing someone to do something they are not authorized to do.
What are the three types of threat agents?
Inside Attack, Outside Attack and Botnet
What is an Inside Attack?
An inside attack is initiated by an insider, which is an entity inside of a security perimeter. Insider threats have authorization to access a system, but they use their authorization in a way that is not approved by the party that granted authorization.
What is an Outside Attack?
This is initiated by an outsider, which is an entity outside of a security perimeter. Outsider threats gain unauthorized or illegitimate access to a system.
What is utilized on outside attacks?
Botnets
What is a botnet?
A botnet is an aggregation of compromised computers, turning them into robots used by attackers.