CH01 Overview of Security Flashcards

1
Q

What is CIA Triad

A

Confidentiality - information has not been disclosed to unauthorized people
Integrity - information has not been modified without proper authorization
Availability - information is able to be stored, access, or protected at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is AAA of Security?

A

Authentication - When a person’s identity is established with proof and confirmed by a system
Authorization - Occurs when a user is given access to a certain piece of data or certain areas of a building
Accounting - Tracking of data, computer usage, and network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 Methods of authentication

A

Something you know - username and password
Something you are - finger print, eye scan
Something you have - token, driver license, credit card
Something you do - way you speak, way you sign your name
somewhere you are - location factor based on your GPS location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 4 Security Threads?

A

Malware
Unauthorized Access
System Failure
Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 3 controls that you do to mitigate Threads?

A

Physical Controls - Alarm systems, locks, surveillance cameras, identification cards, and security guards

Technical Controls - Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication

Administrative Controls - Policies, procedures, security awareness training, contingency planning, and disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is White Hats Hacker

A

Non-malicious hackers who attempt to break into a company’s systems at their request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Black Hats Hacker

A

Malicious hackers who break into computer systems and networks without authorization or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Gray Hats Hacker

A

Hackers without any affiliation to a company who attempt to break into a company’s network but risk the law by doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Blue Hats Hacker

A

Hackers who attempt to hack into a network with permission of the company but are not employed by the company (Freeland ethical hacker or freelance penetration tester)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Elite Hacker

A

Hackers who find and exploit vulnerabilities before anyone else does. They create their own tools. They do their own programming and they’re the ones who are going to develop the tools that pretty much everyone else is going to end up using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Script kiddies

A

Hackers who have limited skill and only run other people’s exploits and tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hacktivists Hacker

A

Hackers who are driven by a cause like social change, political agendas, or terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Organized Crime Hacker

A

Hackers who are part of a crime group that is well-funded and highly sophisticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Advanced Persistent Threats Hacker

A

Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 Factors of thread intelligence and sources

A
  1. Timeliness – property of an intelligence source that ensures it is up to date. Over the time the information is not as nearly as valuable.
  2. Relevancy – property of an intelligence source that ensures it matches the use cases intended for it. Increase in attacks on Mac OS may not be as relevant for me if I use Windows or Linux.
  3. Accuracy – property of an intelligence source that ensures it produces effective results. Information needs to be valid and true.
  4. Confidence Level – property of an intelligence source that ensures it produces qualified statements about reliability. Information can be graded to check how good we think that information is.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three places you can get information from

A

Proprietary - threat intelligence that comes as a commercial service offering with a fee.

Closed-Source - Data that is derived from the provider’s own research and analysis efforts.

Open-Source - Data that is available to use without subscription

17
Q

Sources for open-source

A

▪ US-CERT
▪ UK’s NCSC
▪ AT&T Security (OTX)
▪ MISP
▪ VirusTotal
▪ Spamhaus
▪ SANS ISC Suspicious Domains

18
Q

What is Open-Source Intelligence (OSINT)

A

Methods of obtaining information about a person or organization through public records, websites, and social media

19
Q

What is Thread Hunting

A

cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring.
Proactive ways to look for threats.
Threat hunting is potentially less disruptive than penetration testing.
Penetration test – you’re trying to break into your system to demonstrate a weakness
Threat hunting – trying to analyze data within the systems we already have.

20
Q

3 types of attack frameworks

A

▪ Lockheed Martin Kill Chain - describes the stages by which a threat actor progresses a network intrusion
▪ MITRE ATT&CK framework - A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures
▪ Diamond Model of Intrusion Analysis - A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim