Ch 3 SC Flashcards
CVE
Common Vulnerabilities and Exposures.
• An identifier of Common Vulnerabilities.
• A dictionary of publicly known Vulnerabilities and exposures in products and systems maintained by MITRE.
• CVE ID is the industry standard to identify Vulnerabilities.
• The goal of CVE is to make it easier to share data across tools, vulnerability repositories, and security services.
Vulnerability
An exploitable weakness in a system or its design.
Threat
- Any potential danger to an asset.
- If a vulnerability exists but has not yet been exploited or, more importantly, it is not yet publicly known-the threat is latent and not yet realized.
Malicious actor
• The entity that takes advantage of the vulnerability.
Threat vector
• The path used by this actor to perform the attack
Countermeasure
- A safeguard to mitigate a potential risk
* It does this by either reducing or eliminating the vulnerability
Threat Actor
• The individuals (or group) who perform an attack or are responsible for security.
Eg: script kiddies, organized crime, state sponsors and governments, Hactivists, terrorist groups
Threat Intelligence
- Knowledge about an existing or emerging threat to assets.
- Threat intelligence includes context, mechanisms, indicators of compromise (IOCs), implications, and actionable advice.
IOC
• Indicator of compromise. Threat intelligence information
Exploit
- Software or sequence of commands that takes advantage of a vulnerability in order to cause harm to a system or network.
- Most Common exploit categories are remote and local exploits.
CVSS
- Common Vulnerability Scoring System.
* Industry standard to convey vulnerability severity and to help determine urgency and priority of response.
PII
- Personally identifiable information
* Name, Social Security number, DOB, Drivers license, etc
PHI
• Protected Health information
Separation of Duties
• An administrative control that dictates that a single individual should not perform all critical or privilege level duties.
SOC
- Security Operation Center
- Provides detection, containment, and remediation via People, Processes, technology.
- facilities where an organization asset’s, including applications, databases,servers, networks, desktops, and other endpoints are monitored.