Chapter 1 Flashcards
A response to risk that acknowledges the risk but takes no steps to address it.
accept
Security controls for developing and ensuring that policies and procedures are carried out; regulating the human factors of security.
administrative controls
A new class of attack that uses innovative attack tools to infect a system and then silently extracts data over a an extended period.
advanced persistent threat (APT)
Deficiencies in software due to poor. design
architecture/design weaknesses
an item that has value.
asset
Characteristic features of different groups of threat actors.
attributes
security actions that ensure that data is accessible to authorized users.
availability
A response to risk that identifies the risk and the decision is made to not engage in the risk-provoking activity.
avoid
Threat actors that launch attack against an opponents’ system to steal classified information.
competitors
the highest data label level of sensitivity.
confidentiality
having different groups responsible for regulating access to a system.
control diversity
the out-of-the-box security config settings
default config
Creating multiple layers of security defenses through which an attacker must penetrate; also called layered security.
defense-in-depth
system for which vendors have dropped all support for security updates due to the system’s age.
end-of-life system
the location outside an enterprise in which some threat actors perform.
external
an attribute of threat actors that can vary widely.
funding and resources
a group of threat actors that is strongly motivated by ideology
hactivists
software that does not properly trap an error condition and provides an attacker with underlying access to the system.
improper error handling
software that allows the user to enter data but does not validate or filter user input to prevent a malicious action.
improper input handling
account set up for a user that might provide more access than is necessary.
improperly config accounts
Frameworks/architectures that are specific to a particular industry or market sector.
industry-specific frameworks
“support structures” for implementing security; also called reference architectures
industry-standard frameworks
employees, contractors, and business partners who can be responsible for an attack.
insiders