Cyber basics Flashcards
What does CIA stand for?
Confidentiality , integrity, availability
What does confidentiality in CIA refer to?
the act of sharing or revealing information only with authorized personal
What does integrity in CIA refer to?
the ability to ensure that information or data remains unchanged and accurate
What does availability in CIA refer to?
ensuring timely and reliable access to and use of information
What does the red team do?
Test defenses, search for weaknesses, provide assesments
What does the blue team do?
Maintain security, Prevent breaches, Monitor for threats, Respond to incidents, Research technologies
What is an HVA?
High Value Asset
What are the primary roles of Cybersecurity in a business?
protect assests or HVA, protect data, protect functions and processes, protect ALL org assets.
True or False: The cost of treating risk should never meet or exceed the potential loss?
True
What does NIST stand for?
National institute of Standards and Technology
Is NIST framework required or voluntarily implemented?
A voluntary framework
What is risk?
Risk is the level of organizational assets, organizational operations, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occuring.
What is risk more simply?
Risk is if you have an asset with a vulnerability that has a threat of being exploited.
What does PII (pii) refer to?
Personally identifiable information
What are the security risk factors?
Threat, Vulnerability, Likelihood, Impact
What does CONTROL refer to when associated with the word RISK?
Managing risk, including policies, procedures, guidelines, practices, or org structures
What does VULNERABILITY refer to when associated with the word RISK?
Weakness in a system, system security procedures, internal controls, or implementation
What does CYBERRISK refer to when associated with the word RISK?
risk to a business due to the failure of a business function dependent on digital technologies
What does LIKELIHOOD refer to when associated with the word RISK?
A weighted factor based on subjective analysis if the probability that a given threat is capable of exploiting a given vulnerability.
What does RMF mean?
Risk Management Framework - a flexible risk based approach
In order what are the 7 phases of the RMF?
- Prepare 2. Categorize information systems. 3. Select security controls. 4. implement security controls. 5. Assess security controls. 6. authorize information systems. 7. monitor security controls.
What is an asset?
Assets can be hardware, software, or information.
What is a threat?
A potentially negative action or event often caused by taking advantage of a vulnerability
What is a risk?
probability of exposure or loss resulting from a cyber attack.
What is a vulnerability?
errors/flaws that weaken the overall security of the device/system.
What is an exploit?
taking advantage of a program/system to produce an unintended consequence/result
What are examples of threats and attacks?
Global threat (pandemic), regional threat (weather conditions), Industry specific (microchip shortage), cybersecurity (randsomeware, DDoS, etc)
What are some common threat vectors? (methods people use to exploit a system)
Unpatched vulnerabilities, security misconfiguration, weak, leaked, or stolen credentials, social engineering, and insider threats
What are some common attacks? (type of attack)
Malware, on path (man in the middle {MiTM}), DoS, DDoS, Phishing, SQL injection, Zero Day, DNS tunneling, ARP poisoning.
What is Malware?
Malware stands for malicious software. A program or code that can harm a computer or network
What is an on path or man in the middle attack?
An attack places themselves between two devices and modifies communications between the two
What is a DoS attack?
DoS stands for denial of service when a computer aims to make a computer or network unavailable to it’s users.
What is a DDoS attack?
DDoS stands for distributed denial of service when an attacker aims to flood a server with traffic using multiple comprised computers AKA a “Botnet”.
What is phishing?
A method used where someone pretends to be legitimate in order to trick individuals into providing sensitive information data.
What is DNS tunneling?
a method where cybercriminals exploit the DNS protocol to create a covert communication channel.
What is SQL injection?
SQL injection is when someone tricks a website into running harmful commands
What is a Zero Day attack?
Exploits a software flaw that the software’s creator doesn’t know about yet.
What is ARP poisoning?
sends fake ARP (Address Resolution Protocol) messages to a network
What is an IOC?
Indicator of compromise - present after an attack
What is an IOA?
Indicator of attack - early warning or clues that reveal suspicious activity. Present before an attack
What are some common malware types?
Worm, rootkit, keylogger, bot(s), mobile malware.
What is a worm and which part of CIA is impacted?
Worms spread through a network by replicating itself and not needing interaction. This impacts Integrity.
What is a rootkit and what part of CIA is impacted?
Gives remote access to devices. This impacts confidentiality and integrety.
What is a keylogger and what part of CIA is impacted?
A keylogger can monitor keystrokes. This impacts confidentiality.
What are bots and what part of CIA is impacted?
Can launch a broad flood of attacks. This impacts availability.
What is mobile malware and what part of CIA is impacted?
This infects mobile devices and impacts confidentiality and integrity.
What are the phases of incident response?
- Prepare. 2. Detection and analysis. 3. Containment, eradication, and recovery. 4. Post incident activity.
What are 3 types of AI?
Artificial narrow intelligence , artificial general intelligence, artificial super intelligence.
What is a network?
two or more devices that can interact over links or connections.
What are the 4 types of network?
PAN, LAN, MAN, WAN
What is PAN and what does it stand for?
PAN is personal area network. A network connected by only two computers