CySA+ Study for PASS Certification Exam !!! Flashcards
Integrity : ensures info is not subject to unauthorized modification.
confidentiality : protects info from unauthorized access
Availability : ensures that authorized users can access info when they are permitted to do so.
IOA
??? focuses on ways that an org. can use / share info that it has collected about individuals; goes beyond just security of this info.
Privacy
??? is weakness in device, system, application, or process that might allow an attack to take place; are internal factors, a web server can be outdated allowing attacker to do DoS affecting availability, can remedy by upgrading server to most recent version. Can perform scan for vulnerability.
Vulnerability
outside force that may exploit a vulnerability. A threat may also not be malicious, could be an earthquake etc.
Threat
combination of threat and corresponding vulnerability, ex : if hacker targets org.’s web server w/DoS attack but server was patched then there is no risk because even though a threat is present (the hacker), there is no vulnerability.
Risk
??? are individuals, groups, and org.’s attempting to undermine security of an org. Adversaries may include trusted insiders, competitors, suppliers, customers, business partners, or even nation-states. CySA’s should consider capability of threat actor to engage in attacks, intent of threat actor, and likelihood threat will target org.
Adversarial Threat
when equipment, software, or environmental controls fail due to exhaustion of resources (such as running out of gas), exceeding their operational capability (such as operating in extreme heat), or simply failing due to age. Structural threats may be IT components (like storage, servers and network devices), environmental controls (such as power and cooling infrastructure), and software (such as OS’s and applications).
Structural Threats
software called supplicant resides on device requesting to join network, supplicant communicates with authenticator which runs on WAP or network switch, authenticator passes access requests to authentication server using RADIUS, user if correctly authenticates is then allowed access to the network; if not then user is quarantined in special part of network.
RADIUS (802.1x)
??? : require that device requesting access to network run special software designed to communicate with the ??? service. ??? : approaches to ??? conduct authentication in web browser and doesnt require special software.
NAC (Agent-Based) / NAC (Agentless)
??? : use dedicated appliances that sit in between devices and the resources that they wish to access; they deny or limit network access that do not pass ??? authentication process. Captive portal is an example of in-band. ??? : like 802.1x, leverage existing network infrastructure and have network devices communicate w/authentication servers and then reconfigure the network to grant or deny access as needed.
NAC (In-Band) / NAC (Out-of-Band)