Chapter 1 Defending Against Cybersecurity Threats Flashcards
Weakness in a device, system, application or process that might allow an attack to take place.
Vulnerability
- A force outside an organization that may exploit a vulnerability.
- Malicious i.e. hacker
- Non-malicious i.e. earthquake
Threat
- The relationship between threats and vulnerabilities
- If one of these don’t exist then this definition doesn’t either
Risk
Framework that outlines the risk assessment process that suggests an organization should identify threats and vulnerabilities and use this info to determine the level of risk posed by the combination or of these threats and vulnerabilities.
NIST SP 800-30
- NAC solution that use dedicated appliances that sit in between devices and the resources they wish to access.
- Solution typical in hotels
In-Band NAC
- NAC solution that leverages existing network infrastructure
- i.e. 802.1X
Out-of-Band NAC
Checks the characteristics of each packet against firewall rules without additional intelligence
Packet filtering firewalls
Maintains info about each state of each connection passing through the firewall
Stateful Inspection firewalls
- Ensures that there are not unauthorized modifications to info or systems, either internationally or unintentionally
- i.e. hashing and integrity monitoring solutions
Integrity
- Ensures that info and systems are ready to meet the needs of legitimate users at the time those users request them.
- i.e. fault tolerance, clustering and backups
Availability
- Under step 2: Conduct Assessment task Identify Threats NIST SP 800-300
- Represents individuals, groups, and organizations that are attempting to undermine security of organization
Adversarial Threats
- Under step 2: Conduct Assessments task Identify Threats NIST SP 800-30
- Represents individuals doing their routine work and mistakenly performs an action that undermines security
Accidental Threats
- Under step 2: Conduct Assessments task Identify Threats NIST SP 800-30
- Represents equipment, software, or environmental controls that fail due to exhaustion of resources, exceeding operational capacity, or failing due to age.
Structural Threats
- Under step 2: Conduct Assessments task Identify Threats NIST SP 800-30
- Represents natural to man-made disasters occurring
Environmental Threats
Controls put into place for systems, devices, software, and settings that work to enforce CIA.
Technical Threats