Explaining Common Security Concepts Flashcards
Three principles of security control and management. Also know. As the information security triad. Also referred to in reverse order as the AIC triad
CIA triad
Weakness that could be triggered accidentally or exploited intentionally to cause a security breach
Vulnerability
Potential for an entity to except use a vulnerability that is to breach security.
Threat
Likelihood and impact (or consequence) of a threat actor exercising a vulnerability
Risk
Process for verifying compliance with a health policy by using host health checks.
Posture assessment
Business or organizational activity that is too critical to be deferred for anything more than a few hours if at all
Mission essential function (MEF)
Systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations. Also called process assessment.
Business Impact Analysis (BIA)
Specific method by which malware code infects a target host, often via some vulnerability in a software process.
Exploit
Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability
Zero-day
Evaluation of a systems security and ability to meet compliance requirements based on the configuration state of the system, as represented by information collected from the system. Also called vulnerability testing.
Vulnerability assessment
Scheme for identifying vulnerabilities developed by MITRE and adopted by NIST
Common vulnerabilities and exposures (CVE)
Solution that provides real-time or near-real-time analysis or security alerts generated by network hardware and applications
Security Information and Event Management (SIEM)
Test that uses active memory oils and security utilities to evaluate security by simulating an attack on a system. A pen test will verify that a threat exists then will actively test and bypass security controls and will finally exploit vulnerabilities on the system.
Penetration testing
Basic principle of security stating that something should be allocated the minimum necessary rights, privileges or information to perform its role.
Least privilege
Access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions
Role based access