CH01 Overview of Security Flashcards
What is CIA Triad
Confidentiality - information has not been disclosed to unauthorized people
Integrity - information has not been modified without proper authorization
Availability - information is able to be stored, access, or protected at all times
What is AAA of Security?
Authentication - When a person’s identity is established with proof and confirmed by a system
Authorization - Occurs when a user is given access to a certain piece of data or certain areas of a building
Accounting - Tracking of data, computer usage, and network resources
5 Methods of authentication
Something you know - username and password
Something you are - finger print, eye scan
Something you have - token, driver license, credit card
Something you do - way you speak, way you sign your name
somewhere you are - location factor based on your GPS location
What are 4 Security Threads?
Malware
Unauthorized Access
System Failure
Social Engineering
What are 3 controls that you do to mitigate Threads?
Physical Controls - Alarm systems, locks, surveillance cameras, identification cards, and security guards
Technical Controls - Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication
Administrative Controls - Policies, procedures, security awareness training, contingency planning, and disaster recovery plans
What is White Hats Hacker
Non-malicious hackers who attempt to break into a company’s systems at their request
What is Black Hats Hacker
Malicious hackers who break into computer systems and networks without authorization or permission
What is Gray Hats Hacker
Hackers without any affiliation to a company who attempt to break into a company’s network but risk the law by doing so
What is Blue Hats Hacker
Hackers who attempt to hack into a network with permission of the company but are not employed by the company (Freeland ethical hacker or freelance penetration tester)
What is Elite Hacker
Hackers who find and exploit vulnerabilities before anyone else does. They create their own tools. They do their own programming and they’re the ones who are going to develop the tools that pretty much everyone else is going to end up using
What is Script kiddies
Hackers who have limited skill and only run other people’s exploits and tools
What is Hacktivists Hacker
Hackers who are driven by a cause like social change, political agendas, or terrorism
What is Organized Crime Hacker
Hackers who are part of a crime group that is well-funded and highly sophisticated
What is Advanced Persistent Threats Hacker
Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal
4 Factors of thread intelligence and sources
- Timeliness – property of an intelligence source that ensures it is up to date. Over the time the information is not as nearly as valuable.
- Relevancy – property of an intelligence source that ensures it matches the use cases intended for it. Increase in attacks on Mac OS may not be as relevant for me if I use Windows or Linux.
- Accuracy – property of an intelligence source that ensures it produces effective results. Information needs to be valid and true.
- Confidence Level – property of an intelligence source that ensures it produces qualified statements about reliability. Information can be graded to check how good we think that information is.