Chapter 1: Introduction to Security Flashcards
The protection of information from harm; protection of the integrity, confidentiality, and availability of information through practices, people, and procedures on the devices that store, manipulate, and transmit information
Information security
The CIA triad
Confidentiality
Integrity
Availability
An individual or entity responsible for cyber incidents against the technology equipment of enterprises and users
Threat actor (malicious actor, attacker, hacker)
The hardware device and OS which run applications, programs, or processes
Platforms
Three types of platforms
Legacy
On-premises
Cloud
The array of features and security settings that must be properly implemented to repel attacks
Configurations
7 weak configurations include …
- Default settings
- Open ports and services
- Unsecured root accounts
- Open permissions
- Insecure protocols
- Weak encryption
- Errors
External entities outside of the org, engaging in outsourced code development, data storage, vendor management, and system integration
Third parties
The Principle of the Weakest Link
If the security of the third party has any weaknesses, it can provide an opening for attackers to infiltrate the organization’s computer network
An officially released software security update intended to repair a vulnerability
Patches
3 patching vulnerabilities include …
- Difficulty patching firmware
- Few patches for application software
- Delays on in patching OSs
A vulnerability that is exploited by attackers before anyone else even knows it exists
Zero-day
A pathway or avenue used by a threat actor to penetrate a system
Attack vector
7 Common attack vectors include …
- Wireless
- Direct access
- Social media
- Removable media
- Supply chain
- Cloud
Gathering data by relying on the weaknesses of individuals
Social engineering
Common psychological principles exploited by social engineering include …
- Authority
- Intimidation
- Consensus
- Scarcity
- Urgency
- Familiarity
- Trust
Influencing a subject before an event occurs
Prepending