Building Blocks W1 Flashcards
What is Cybersecurity?
technologies and processes and practices designed to prevent, detect, and recover networks, computers, programs and data from attack, damage or unauthorized access.
What is the CIA Triad?
Confidentiality, Integrity, Availability.
Confidentiality – Concealment of information or resources
Integrity – Trustworthiness of data or resources
Availability – Ability to use information or resource by “authorized” parties
Where do Security Policies come from?
– Security Engineering
– Business
– Risk Management
– Legal and Compliance
The Adversary – Who are they?
- Script kiddies
- Brokers
- Insiders
- Cyber terrorists
- Hacktivists
- State-sponsored
What is a Threat?
Threat: the adversary steals the password, the adversary steals some money, the adversary
disrupts a service
What is a Threat model
“An adversary capability”
– E.g. The adversary can eavesdrop on traffic, the adversary controls a server and can make it act arbitrarily.