Domain 2 (Threats, Vulnerabilities, and Mitigations) Flashcards
Practice Questions unofficial sources
____ attacks seek to undermine confidentiality
Disclosure
Making sensitive information available to individuals or the general public without the owner’s consent
___ ___ are violations of confidentiality
Data Breaches
When confidentiality data loss occurs
___ ___ removes sensitive information from an organization’s control
Data Exfiltration
___ attacks seek to undermine integrity
Alteration
Hacker seeking to intentionally alter information, or a service disruption accidentally affecting data stored in a system
____ attacks seek to undermine availability
Denial
Denial-of-service attacks try to either overwhelm a system or cause it to crash, to deny legitimate users the access they need
___ risks involve monetary loss to the organization
Financial
Might include the cost of restoring damaged equipment and data, conducting an incident response investigation, etc.
___ risk impacts how stakeholders view our organization; may be difficult to quantify
Reputational
When the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, and other stakeholders
___ risk jeopardizes our ability to meet our major goals and objectives
Strategic
Organization may become less effective in meeting major goals and objectives as a result of a breach
___ risk affects our ability to carry out day to day activities
Operational
May slow down business processes, delay delivery of customer orders, or require implementation of time heavy workarounds
___ risk involves potential violations of laws or regulations
Compliance
Could include HIPAA if a hospital loses patient medical records, etc.
First step of end of life process for a product; Product will no longer be offered for purchase, but the vendor will continue to support existing customers
End of Sale
Next step of end of life process for a product; Vendor will reduce or eliminate support for existing users of the product; may become vulnerable
End of Support
Last step of end of life process for a product; Vendor will no longer provide any support or updates for the product; is vulnerable and exposed to risk
End of Life
This limits user permissions; when a user should only have the minimum necessary set of permissions required to do their job
Least Privilege
Processes and practices used to design systems; A set of well defined practices and processes used to build complex technical systems
IT architecture
When new devices are connected to a network, but old devices are not promptly disconnected, leading to security vulnerabilities; devices not managed using a full system lifecycle
System Sprawl
Every piece of malware that you encounter will have two components:
A propagation mechanism and a payload
The way that a malware object spreads from one system to another
Propagation Mechanism
The malicious action that the malware performs
Malware Payload
Spreads from system to system based upon some type of user action
Viruses
Spreads from system to system without any user interaction; they reach out and exploit system vulnerabilities; uses one infected system as the bae for spreading to other parts of the local area network or the broader internet
Worm
Infected about 10% of the Internet, was the first major worm outbreak, written by Robert Morris, eye opening event for security
The RTM Worm
Created in 2010, infiltrated Iranian nuclear facility, first worm to cross the virtual/physical barrier in a major way
Stuxnet Worm
Virus that hides itself; pretends to be legitimate software that the user may want to download and install, software performs as normal, but also carries malicious hidden payload
Trojan Horse