Chapter 1 - Getting Started: Essential Knowledge Flashcards
hack value
The idea a hacker holds about the perceived worth or interest in attacking a target.
vulnerability
Weakness in an information system, system security procedure, internal controls, or implementation that could be exploited or triggered by a thread source.
zero day attack
An attack carried out on a system or application before the vendor becomes aware and before a patch or fix action is available or correct underlying vulnerability.
payload
the contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.
exploit
Software code, a portion of data, or a sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Daisy-chaining
A method of external testing where by several systems or resources are used together to make an attack.
Security Controls
Safeguards or counter measures to avoid, counteract, or minimize security risks.
Security Controls Types
Physical (Guards, lights, camera)
Technical (Encryption, Smart Cards, ACLs)
Administrative (Training, Awareness, Policy)
Preventative (Authentication)
Detective (Audits, Alarm Bells, Alerts)
Corrective (Backups)
Business impact analysis (BIA)
An organized process to gauge the potential effects of an interruption to critical business operations as a result of a disaster, accident, or emergency.
maximum tolerable downtime
A measurement of potential cost due to a particular asset being unavailable, used as a means to prioritize the recovery of assets should the worst occur.
business continuity plan
A set of plans and procedures to follow in the event of a failure or a disaster security related or not to get business services back up and running. BCPs include a disaster recovery plan (DRP) that addresses exactly what to do to recover any lost data or services.
disaster recovery plan
A documented set of procedures to recover business infrastructures in the event of a disaster.
CIAA
securities holy trinity triad; confidentiality, integrity, availability. Also, authenticity (guarantee someone is who they say they are i.e. digital signature)
National Computer Security Center (NCSC)
In 1983, some guys from DoD and NSA worked to create security manuals and steps known as “Rainbow Series”. “Orange Book” held “Trusted Computer System Evaluations Criteria”.
Trusted Computer System Evaluation Criteria (TCSEC)
Old DoD standard with a goal to set security controls built into a computer system. Lasted until 2005.
Common Criteria for Information Technology Security Evaluation (CC)
Been around since 1999, but started in 2005. Provides a way for vendors to follow a set of standard of controls and testing methods resulting in (Evaluation Assurance Level (EAL))
Target of Evaluation (TOE)
Term associated with Common Criteria (CC) .What is being tested.
Security target (ST)
Term associated with Common Criteria (CC). The documentation describing the TOE and security requirements.
Protection profile (PP)
Term associated with Common Criteria (CC). A set of security requirements specifically for the type of product being tested.
Access Control
Restricting access to a resource in some selective manner.
Mandatory access control (MAC)
A method of access control where security policy is controlled by a security administrator. (i.e. users can’t set the access controls.)
Discretionary access control (DAC)
A method that allows users to set access controls on the resources they own or control. (e.g. Linux users, groups,other read/write/execute permissions)
Access Control Policy
This identifies the resources that need protection and the rules in place to control access to those resources.
Information Security Policy
This identifies to employees what company systems may be used for, what they cannot be used for, what they cannot be used for, and what the consequences are for breaking the rules. Generally employees are required to sign a copy before accessing resources. Version of this policy are also known as an Acceptable Use Policy.