FUNDAMENTALS OF SECURITY Flashcards
THREAT ACTORS
WHAT ARE THREAT ACTORS MOTIVATION ?
DATA EXFILTRATION, BLACKMAIL, ESPIONAGE, SERVICE DISRUPTION, FINANCIAL GAIN, PHILISOPHICAL OR POLITICAL BELIEFS, ETHICAL REASONS, REVENGE DISRUPTION OR CHAOS, WAR
LIST THE DIFFFERENT TYPE OF THREAT ACTORS
UNSKILLED ATTACKERS
HACKTIVISTS
ORGANIZED CRIME
NATION-STATE ACTORS
INSIDER THREATS
DEFINE SHADOW IT
THEY ARE IT SYSTEMS, DEVICES, SOFTWARE, APPLICATIONS AND SERVICES WHICH ARE MANAGED AND UTILIZED WITHOUT ORGANIZATIONAL APPROVAL
DEFINE ALL THE THREAT VECTORS AND ATTACK SURFACES
MANAGED-BASED
IMAGE-BASED
FILE-BASED
VOICE-CALLS
REMOVABLE DEVICES
USE OF UNSECURED NETWORKS
LIST THE DECEPTION AND DISRUPTION TECHNOLOGIES THAT WE CAN USE
HONEYPOTS (DECOY SYSTEMS OR SERVERS DESIGN TO DECEIVE AND ATTRACT POTENTIAL ATTACKERS BY SIMULATING REAL WORLD IT ASSETS TO STUDY THEIR TECHNIQUES)
HONEYNETS (THEY ARE NETWORK OF DECOY SYSTEMS TO OBSERVE COMPLEX AND MULTI -STAGE ATTACKS)
HONEYFILES (THEY ARE PLACED WITHIN SYSTEMS TO DETECT UNAUTHORIZED ACCESS OR DATA BREACHES)
HONEYTOKENS(THEY ARE FAKE PIECE OF DATA LIKE FABRICATED USER CREDENTIALS INSERTED INTO DATABASES OR SYSTEMS TO ALERT ADMINS WHEN THEY ARE ACCESSED)