2.1.1 and 1.2.1 Flashcards
Name the group of threat actors is characterized by novice computer professionals with little expertise or knowledge?
Script Kiddies
What are the three fundamental principles of information security, also known as the CIA Triad?
Confidentiality, Integrity, and Availability.
Hacktivists are primarily driven by:
Political, commercial, or economic messages.
Which group of threat actors is fueled by money and the desire to gain power to continue their influence?
Nation States and APT.
What do Insider Threats primarily exploit to cause damage within an organization?
Weak points known within the organization.
Which type of hackers intend to cause damage and harm to their targets?
Black hat hackers
Shadow IT operates:
Within larger organizations but not following IT department rules.
Which type of threat actor comes from inside of an organization and has trusted access to information?
Internal threat actor.
Which motivation involves disrupting the normal operation of systems, networks, or services for various reasons?
Service disruptions.
What is the primary motivation for hacktivist groups?
Philosophical/political beliefs.
Which principle of the CIA Triad ensures that information remains accurate and complete, and hasn’t been tampered with or modified in any unauthorized way?
Integrity
What principle of the CIA Triad ensures that authorized users have timely and reliable access to information and systems when needed?
Availability
What is the purpose of the CIA Triad in information security?
To provide a framework for developing and implementing security controls.
What is the term for the application of scientific principles to provide assurance in explaining what has or has not happened on a computer system?
Digital forensics.
What is the purpose of hashing or running backups/data through a one-way algorithm in digital forensics?
To provide a non-repudiation with the evidence.