Chapter 2 Flashcards

1
Q

What is the core duty of cybersecurity?

A

to identify, mitigate and manage cyber risk to an organization’s digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of approaches to cybersecurity implementation

A

Compliance-based
Risk-based
Ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the compliance-based approach

A

this approach relies on regulations or standards to

determine security implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the risk-based approach

A

relies on identifying the unique risk an organization faces and designing and implementing security controls to address that risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the ad hoc approach

A

an ad hoc approach simply implements security with no particular rationale or criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a risk?

A

The combination of the probability of an event and its consequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Threat

A

anything that is capable of acting against an asset in a manner that can result in harm

a potential cause of an unwanted incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Asset

A

Something of value that is worth protecting,

ex: people, information, finances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a vulnerability?

A

a weakness in the design, implementation or operation of a process that can expose the system to adverse threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Residual risk

A

the remaining risk after management has implemented a risk response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Inherent risk

A

the risk level prior to taking action to secure assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the criteria for approaching risk?

A

Risk Tolerance
Size of the environment
Amount of data available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define cyberattack

A

a cyberattack is a well-defined, advanced, targeted attack that is stealthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define attack

A

the actual occurrence of a threat
or
an activity by a threat agent (or adversary) against an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define attack vector

A

the path used to gain access to the target asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attack vector types

A

ingress and egress

17
Q

ingress

A

intrusion into a system

18
Q

egress

A

data exfiltration

19
Q

attack mechanism

A

method used to deliver the exploit, may involve a payload

20
Q

payload

A

the container that delivers the exploit to the target

21
Q

malware

A

malicious code designed to gain access to targeted computer systems, steal information or disrupt computer operations

22
Q

common malware types

A

viruses
network worms
trojan horses

23
Q

what is a worm?

A

they carry out routines related to the payload

24
Q

what is a link file?

A

propagates copies of the worm

25
Q

what is a rootkit?

A

hides malicious processes to prevent detection

26
Q

what are policies?

A

required and prohibited activities and behaviors

27
Q

what are standards?

A

Interpretation of policies in specific situations

28
Q

what are procedures?

A

details on how to comply with policies and standards

29
Q

what are guidelines?

A

general guidance on issues such as “what to do in particular circumstances.” These are not requirements
to be met, but are strongly recommended.

30
Q

What are the 5 attack attributes(steps)

A
Attack vector
Payload
Exploit
Vulnerability
Target Asset