Chapter 1 - introduction To Security Flashcards

1
Q

End-of-life systems

A

System for which vendors have dropped all support for security updates due to the systems age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Improper input handling

A

Software that allows the user to enter data but does not validate or filter user input to prevent a malicious action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Improper error handling

A

Software that does not properly trap an error condition and provides an attacker with underlying access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Race condition

A

A software occurrence when two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Resource exhaustion

A

A situations in which a hardware device with unlimited resources (CPU, memory, file system storage, etc.) is exploited by an attacker who intentionally tries to consume more resources than intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerable business processes

A

A situation in which an attacker manipulated commonplace actions that are routinely performed, also called business process compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System sprawl

A

The widespread proliferation of devices across an enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Undocumented assets

A

Devices that are not formally identified or documented in an enterprise. Leads to system sprawl.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero day

A

An attack in which there are no days of warning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Security actions that ensure that only authorized parties can view the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Availability

A

Security actions that ensure that data is accessible to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information security

A

That which protects the integrity, confidentiality, and availability of information through products, people, and procedures on the devices that store, manipulate, and transmit the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asset

A

An item that has value

Ex. Scooter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat

A

A type of action that has the potential to cause harm.

Ex. Theft of scooter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat actor

A

A person or element that has the power to carry out a threat

Ex. Thief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerability

A

A flaw or weakness that allows a threat agent to bypass security.

Ex. Fence hole

18
Q

Attack vector

A

The means by which an attack can occur

Ex. Go through fence hole

19
Q

Risk

A

A situation that involves exposure to danger

Ex. Stolen scooter

20
Q

Attack surface

A

The sum of all the different attack vectors

21
Q

Risk response techniques

A

1) accept
2) transfer
3) avoid
4) mitigate

22
Q

Risk deterrence

A

Involves understanding something about attackers and then informing them of the harm that could come their way if they attack an asset

23
Q

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

A

Healthcare enterprises must guard protected healthcare information and implement policies and procedures to safeguard it, whether in paper or electronic format

24
Q

The Sarbanes-Oxley Act of 2002

A

An attempt to fight corporate corruption. Stringent reporting requirements and internal controls on electronic financial reporting systems are required.

25
Q

Gramm-Leach Bliley Act of 1999 (GLBA)

A

Requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. All electronic and paper data containing personally identifiable financial information must be protected.

26
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

A set of security standards that all companies that process, store, or transmit credit or debit card information must follow.

27
Q

California’s Database Security Breach Notification Act of 2003

A

Require businesses to inform residents within a specific period (typically 48 hours) if a breach of personal information has or is believed to have occurred.

28
Q

Script kiddies

A

Individual who lacks advanced knowledge of computers and networks and so uses downloaded automated attack software to attack information systems

29
Q

Hacktivists

A

A group of threat actors that is strongly motivated by ideology

30
Q

Nation state actors

A

State-sponsored attackers employed by a government for launching computer attacks against foes.

31
Q

Advanced Persistent Threat (APT)

A

A new class of attack that uses innovative attack tools to infect a system and then silently extracts data over an extended period.

32
Q

Five fundamental security principles

A

1) layering
2) limiting
3) diversity
4) obscurity
5) simplicity

33
Q

Layered security

A

Creating multiple layers of security defenses through which an attacker must penetrate. Also called defense-in-depth

34
Q

Limiting

A

Limiting access to information reduces the threat against it. Only personnel who must use the data should have access to it.

35
Q

Diversity

A

Just as it is important to protect data with layers of security, the layers also must be different

36
Q

Vendor diversity

A

Using security products provided by different manufacturers

37
Q

Control diversity

A

Having different groups responsible for regulating access to a system

38
Q

Obscurity

A

Obscuring to the outside world what is in the inside makes attacks that much more difficult

39
Q

Simplicity

A

The more complex of information security becomes, the more difficult it is to understand. Complex systems allow many opportunities for something to go wrong.

40
Q

Black hat hacker

A

Attackers who violated computer security for personal gain or to inflict malicious damage.

41
Q

White hat hackers

A

“Ethical attackers” who received permission to probe system for any weaknesses.

42
Q

Gray hat hackers

A

Attackers who would break into computer system without permission and then publicly disclose vulnerability