Chapter 1 - Today's Cybersecurity Analyst Flashcards
How to assess cybersecurity threats, as well as how to evaluate and select controls to keep your networks and systems secure.
Confidentiality
Ensures that unathorized individuals are not able to gain access to sensitive information.
Integrity
Ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.
Availability
Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.
Vulnerability
A weakness in a device, system, application, or process that might allow an attack to take place. Internal factors that may be controlled by cybersecurity professionals.
Threat
An outside force that may exploit a vulnerability.
Adversarial Threats
Individuals, groups, and organizations that are attempting to deliberately undermine the security of an organization.
Accidental Threats
Occur when individuals doing their routine work mistakenly perform an action that undermines security.
Structural Threats
Occur when equipment, software, or environmental controls fail due to the exhaustion of resources, exceeding their operational capability or simply failing due to age.
Environmental Threats
Occur when natural or human-made disasters occur that are outside the control of the organization.
Network Access Control (NAC) Solutions
Help security professionals achieve two cybersecurity objectives: limiting network access to authorized individuals and ensuring that systems accessing the organization’s network meet basic security requirements.
Network Firewalls
Sit at the boundaries between networks and provide perimeter security.
Network Segmentation
Uses isolation to separate networks of differing security levels from each other.
Hardening Configurations
Includes disabling unnecessary services on endpoints to reduce their susceptibility to attack, ensuring that secure configuration settings exist on devices, and centrally controlling device security settings.
Patch Management
Ensures that operating systems and applications are not susceptible to known vulnerabilities.
Group Policy
Allows the application of security settings to many devices simultaneously.
Endpoint Security Software
Protects against malicious software and other threats.
NIST Process for Pen Testing
- Planning
- Discovery
- Attack
- Reporting
Penetration Testing Results
Valuable security planning tools that describe the actual vulnerabilities that an attacker might exploit to gain access to a network.
Sandboxing
An approach used to detect malicious software based on its behavior rather than its signatures.
Area of great promise for future cybersecurity analytics tools
The continued adoption of machine learning techniques designed to automatically extract knowledge from the voluminous quantity of information generated by security systems.
Privacy
Focuses on the ways that an organization can use and share information that has been collected about individuals (PII).
Generally Accepted Privacy Principles (GAPP)
- Management
- Notice
- Choice and consent
- Collection
- Use, retention, and disposal
- Access
- Disclosure
- Security
- Quality
- Monitoring and enforcement
Risk
The combination of a threat with a corresponding vulnerability.
802.1X Protocol
A common standard used for NAC