Glossary Flashcards

1
Q

Advanced Persistent Threat (APT)

A

An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception) (NIST, 2013).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adversary Model (resources, capabilities, intent, motivation, risk aversion, access)

A

The model that describes the type of adversary, the objective, the motivation, and the payload ramifications. The model described is extensible and the tactics are clear and concise (Invincea, 2015).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset

A

Any software, hardware, data, administrative, physical, communications, or personnel resource within an IS (CNSS, 2003)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Timing

A

The measured and planned time that the cyber incident will be carried out. This could lead to a sequences of events that over a period of time are meant to weaken the defenses of the system by using planned timing sequences to carry out the attacks (Brocklehurst, 2014).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack Trees

A

These provide a formal, methodical way of describing the security of systems, based on varying attacks. The structure is used represent attacks against a system, with the goal as the root node and different ways of achieving that goal as leaf (Saini, V., Duan & Paruchuri, 2008).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack Vectors

A

The approach used to assault a computer system or network. A fancy way of saying “method or type of attack,” the term may refer to a variety of vulnerabilities. For example, an operating system or Web browser may have a flaw that is exploited by a website. Human shortcomings are also used to engineer these. For example, a novice user may open an email attachment that contains a virus, and most everyone can be persuaded at least once in their life to reveal a password for some seemingly relevant reason (PC Magazine, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backdoor

A

A secret way to take control of a computer. Also called “trap doors,” these are built into software by the original programmer, who can gain access to the computer by entering a code locally or remotely. For example, in an application, this would enable a person to activate either normal or hidden functions within the software. In an operating system, it would provide access to all system functions in the computer (PC Magazine, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bots

A
  1. ) A search engine program that indexes the Web;
  2. ) A program on the Internet that performs a repetitive function such as posting a message on blogs, newsgroups and social networks, or searching for information. These reside in the background waiting to respond to certain conditions. The term is used for myriad “intelligent agents” that continuously or periodically perform some function. It is estimated that as much as 60% of Web traffic comes from these, not humans. (PC Magazine, 2018)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute Force - Password Guessing

A

The systematic, exhaustive testing of all possible methods that can be used to break a security system. For example, in cryptanalysis, trying all possible keys in the keyspace to decrypt a ciphertext (PC Magazine, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Calculate the asset value (AV)

A

An asset is anything of value to an organization. Assets can be tangible (buildings) or intangible (reputation). A first step in risk assessment is to determine all the organization’s assets and their value—that is, the importance of each asset to the organization’s ability to meet its mission. Asset value should consider the replacement value of equipment or systems. It should also include factors such as lost productivity and loss of reputation or customer confidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Calculate the exposure factor (EF)

A

This represents the percentage of the asset value that will be lost if an incident were to occur. For example, not every car accident is a total loss. Insurance companies have actuaries who calculate the likely percentage loss for every claim. They know the cost of repairs for every make and model and can predict this value per claim. Their prediction won’t be right for any single claim (except by chance), but it will be right when grouped by the hundreds or thousands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Calculate the single loss expectancy (SLE)

A

You can calculate the value of a single loss using asset value and exposure factor. If an actuary calculates that the EF of a late-model SUV is 20 percent, then every time he receives a claim, all he needs to do is look up the asset value, multiply by the EF, and he’ll have a very good prediction of the payout. This allows the actuary to calculate insurance premiums accurately and reduce the risk of the insurance company losing money. (Equation: SLE = AV * EF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Determine how often a loss is likely to occur every year (ARO)

A

This is the annualized rate of occurrence, also called the risk likelihood. Some are greater than one. For example, a snowstorm in Buffalo or Berlin will happen many times per year. Others are likely to happen far less often. For example, a warehouse fire might happen once every 20 years. It is often difficult to estimate how often an incident will happen. Sometimes internal or external factors can affect that assessment. Historical data do not always predict the future. An incident such as one stemming from an internal threat is far more likely during times of employee unrest or contract negotiations than at other times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Determine annualized loss expectancy (ALE)

A

This value is the SLE (the loss when an incident happens) multiplied by the ARO. It helps an organization identify the overall impact of a risk. For infrequent events, this value will be much less than the SLE. For example, if you expect an event to occur only once every 10 years, the value will be 0.10, or 10 percent. If the SLE is $1,000, this is only $100 ($1,000 × 0.10). On the other hand, if the ARO is 20, indicating that it is likely to occur 20 times every year, the value is $20,000 ($1,000 × 20). (Equation: ALE = SLE * ARO) (Kim & Solomon, 2013)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Capability

A

In information security, an indicator (token, semaphore, etc.) that authorizes an access mode to an object such as a file or a device for a specific user or process (PC Magazine, 2018)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA Triad

A

A widely used formulation of the INFOSEC mission of the U.S. military. Also known as the “Classic Triad,” the three concepts fail to include important problems intuitively seen as breaches of security, forgeries or counterfeits; mislabeling of data; and problems of data usability (PC Magazine, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Covert Channels

A

An unintended or unauthorized intra-system channel that enables two cooperating entities to transfer information in a way that violates the system’s security policy but does not exceed the entities’ access authorizations (CNSS, 2003)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cross-Site Scripting (XSS)

A

Causing a user’s Web browser to execute a malicious script. There are several ways this is done. One approach is to hide code in a “click here” hyperlink attached to a URL that points to a non-existent Web page. When the page is not found, the script is returned with the bogus URL, and the user’s browser executes it (PC Magazine, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber Threats Motivations and Techniques (EXAMPLES: fraud, sabotage, vandalism, theft)

A
  1. ) Fraud — a deliberate action taken to benefit oneself or a collaborator at the expense of the organization;
  2. ) Sabotage — a deliberate action taken to cause a failure in an organizational asset or process, generally carried out against targeted key assets by someone possessing or with access to inside knowledge;
  3. ) Vandalism — the deliberate damaging of organizational assets, often at random;
  4. ) Theft — Taking something that doesn’t belong to you that you have not paid for (Cebula, Popeck, & Young, 2014)

5.)Denial-of-Service Attacks — An assault on a network that floods it with so many requests that regular traffic is either slowed or completely interrupted. Unlike a virus or worm, which can cause severe damage to databases, this interrupts network service for some period (PC Magazine, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data-at-rest

A

Inactive data stored in any form (for example, on hard drives or in offsite cloud backup). Data at rest is in a stable state, not currently being transmitted across a network or actively being read or being used by any application (Saltzer & Schroeder, 1975).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data-in-motion

A

Data that is currently traveling across a network or has been accessed by computer’s RAM ready to be read, updated, or processed (Saltzer & Schroeder, 1975).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data-in-use

A

Data that is actively being generated, updated, viewed or erased. It also includes data being viewed by users accessing it through various endpoints. (Saltzer & Schroeder, 1975).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Denial-of-Service Attacks

A

An assault on a network that floods it with so many requests that regular traffic is either slowed or completely interrupted. Unlike a virus or worm, which can cause severe damage to databases, this interrupts network service for some period (PC Magazine, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Separation (of Domains)

A

The division of power within a system. No one part of a system should have complete control over another part. There should always be a system of checks and balances that leverage the ability for parts of the system to work together (Tjaden, 2015)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Isolation

A

Individual processes or tasks running in their own space. This ensures that the processes will have enough resources to run and will not interfere with other processes running (Tjaden, 2015).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Encapsulation

A

The ability to only use a resource as it was designed to be used. This may mean that a piece of equipment is not being used maliciously or in a way that could be detrimental to the overall system (Tjaden, 2015).

27
Q

Least Privilege

A

The assurance that an entity only has the minimal amount of privileges to perform their duties. There is no extension of privileges to senior people just because they are senior; if they don’t need the permissions to perform their normal everyday tasks, then they don’t receive higher privileges (Tjaden, 2015).

28
Q

Simplicity (of Design)

A

The straightforward layout of the product. The ability to reduce the learning curve when analyzing and understanding the hardware or software involved in the Information System (Tjaden, 2015).

29
Q

Layering

A

Having multiple forms of security. This can be from hardware or software, but it involves a series of checks and balances to make sure the entire system is secured from multiple perspectives (Tjaden, 2015).

30
Q

Abstraction

A

Removal of clutter. Only the needed information is provided for an object-oriented mentality. This is a way to allow adversaries to see only a minimal amount of information while securing other aspects of the model (Tjaden, 2015).

31
Q

Information Hiding

A

Users having an interface to interact with the system behind the scenes. The user should not be worried about the nuts and bolts behind the scenes, only the modes of access presented to them. This topic is also integrated with object-oriented programming (Tjaden, 2015).

32
Q

Modularity

A

The breaking down of larger tasks into smaller, more manageable tasks. This smaller task may be reused, and therefore the process can be repurposed time and time again (Tjaden, 2015).

33
Q

Minimization of Implementation (Least Common Mechanism)

A

Mechanisms used to access resources should not be shared (Bishop, 2003).

34
Q

Open Design

A

The security of a mechanism should not depend on the secrecy of its design or implementation (Bishop, 2003).

35
Q

Complete Mediation

A

All accesses to objects should be checked to ensure that they are allowed (Bishop, 2003).

36
Q

Fail-Safe Defaults / Fail Secure

A

The theory that unless a subject is given explicit access to an object, it should be denied access to that object (Bishop, 2003).

37
Q

Least Astonishment (Psychological Acceptability)

A

Security mechanisms should not make the resource more difficult to access than when security mechanisms were not present (Bishop, 2003).

38
Q

Minimize Trust Surface (Reluctance to Trust)

A

The ability to reduce the degree to which the user or a component depends on the reliability of another component (Bishop, 2003)

39
Q

Usability

A

How easy hardware or software is to operate, especially for the first-time user. Considering how difficult applications and websites can be to navigate through, one would wish that all designers took usability into greater consideration than they do (PC Magazine, 2018).

40
Q

Trust Relationships

A

A logical connection that is established between directory domains so that the rights and privileges of users and devices in one domain are shared with the other (PC Magazine, 2018)

41
Q

Human Attack Surface

A

Humans have a range of complex vulner¬abilities that are frequently exploited. One of the great strengths of highly secure organizations is their emphasis on communicating security awareness and safety principles to their employees, partners, supply chain and even their customers (as when using the web to gain secure access to a bank or 401K accounts) (Brocklehurst, 2014).

42
Q

Insider Problem

A

The threat that an insider will use their authorized access, wittingly or unwittingly, to do harm to the security of the United States. This threat can include damage to the United States through espionage, terrorism, unauthorized disclosure, or through the loss or degradation of departmental resources or capabilities (CNSS, 2003).

43
Q

MAC Spoofing

A

Faking the sending address of a transmission to gain illegal (unauthorized) entry into a secure system;
The deliberate inducement of a user or resource to take incorrect action. Note: Impersonating, masquerading, piggybacking, and mimicking are forms of this (CNSS, 2003).

44
Q

Man-in-the-Middle (MITM) Attacks

A

An unauthorized interception of network traffic. The packets are viewed or modified by the perpetrator and sent on to the recipient, who is unaware of the intrusion. This can be used to intercept an encrypted message exchange and spoof the recipient into thinking the message is intact from a legitimate sender. In such a case, the attackers replace the public key from the original sender with their own public key in order to decrypt the message that will be sent back from the unsuspecting recipient (PC Magazine, 2018).

45
Q

Malware Attacks

A

Software designed to destroy data, steal information or aggravate the user (PC Magazine, 2018)

46
Q

Network Attack Surface

A

This presents exposure related to ports, protocols, channels, devices (from routers and firewalls to laptops and smartphones), services, network applications (SaaS) and even firmware interfaces;

Depending on your infrastructure, you may need to include cloud servers, data, systems and processes in this (Brocklehurst, 2014).

47
Q

PCI DSS

A

A document library that includes framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information (PCISSC, 2018).

48
Q

Phishing Attacks

A

This is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords. Also known as “brand spoofing,” this process involves an official-looking email being sent to potential victims and pretending to be from their bank or retail establishment. Emails can be sent to people on selected lists or any list, expecting some percentage of recipients will actually have an account with the organization (PC Magazine, 2018).

49
Q

Session Hijacking

A

Seizing unauthorized control of a computer or communications session in order to steal data or compromise the system in some manner (PC Magazine, 2018).

50
Q

Sniffing

A

This allows individuals to capture data as it is transmitted over a network. This technique is used by network professionals to diagnose network issues, and by malicious users to capture unencrypted data, like passwords and usernames (PC Magazine, 2018).

51
Q

Spoofing

A

Faking the sending address of a transmission in order to gain illegal entry into a secure system;
Creating fake responses or signals in order to keep a session active and prevent timeouts. For example, mainframes continuously poll their terminals. If the lines to remote terminals are temporarily suspended because there is no traffic, a local device spoofs the host with “I’m still here” responses;

52
Q

The most common forms of spoofing are:

A

DNS server: Modifies a DNS server in order to redirect a domain name to a different IP address. It’s typically used to spread viruses;
ARP: Links a perpetrator’s MAC address to a legitimate IP address through spoofed ARP messages. It’s typically used in denial of service (DoS) and man-in-the-middle assaults;
IP address: Disguises an attacker’s origin IP. It’s typically used in DoS assaults. (PC Magazine, 2018)

53
Q

Social Engineering

A

Using deception to obtain confidential information from someone by phone or in person. For example, these attackers may persuade someone to reveal an ID or password for a supposedly benign purpose. (“My computer is down; can I use yours in the meantime?”) They can even walk in off the street and pretend to be from IT doing a routine inspection (PC Magazine, 2018).

54
Q

Software Attack Surface

A

This is com¬prised of the software environment and its interfaces. These are the applications and tools available to authorized (and unauthorized) users;

This is calculated across a lot of different kinds of code, including applications, email services, configurations, compliance policy, databases, executables, DLLs, web pages, mobile apps, device OS, etc. (Brocklehurst, 2014)

55
Q

SQL Injection Attacks (SQLi)

A

An exploit that takes advantage of database query software that does not thoroughly test the query statement for correctness. Along with cross-site scripting, this is used by worms to break into websites and extract data or embed malicious code (PC Magazine, 2018).

56
Q

Threat Actor

A

An individual or entity that poses a threat to the security of an organization. Also called a “malicious actor” (PC Magazine, 2018).

57
Q

Threat Information Sources (e.g., CERT)

A

Analytical insights into trends, technologies, or tactics of an adversarial nature affecting information systems security (CNSS, 2003).

58
Q

Trojan Horse

A

The term comes from Greek mythology, in which the Greeks battled the Trojans (people of Troy). After years of being unable to break into the fortified city, the Greeks built this, filled it with soldiers and pretended to sail away. After the Trojans brought this into the city, the Greek soldiers crept out at night and opened the gates of Troy to the returning soldiers, and Troy was destroyed (PC Magazine, 2018).

59
Q

Trojan Virus

A

A program that appears legitimate but performs some illicit activity when run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy the user’s stored software and data. This is similar to a virus, except that it does not replicate itself. Often sneaking in attached to a free game or other supposedly worthwhile utility, it remains in the computer doing damage or allowing someone from a remote location to take control (PC Magazine, 2018).

60
Q

Virus

A

Software used to infect a computer. After the code is written, it is buried within an existing program. Once that program is executed, the code is activated and attaches copies of itself to other programs in the computer and other computers in the network. Infected programs continue to propagate it, which is how it spreads (PC Magazine, 2018).

61
Q

Web Application Attacks

A

These attacks are considered by security experts to be the greatest and often the least understood of all risks related to confidentiality, availability, and integrity. The purpose of a this attack is significantly different from other attacks; in most traditional penetration testing exercises, a network or host is the target of attack. These attacks focus on an application itself and function on layer 7 of the OSI (Desmond, 2004).

62
Q

Wireless Attacks

A

malicious action against wireless system information or wireless networks; examples can be denial of service attacks, penetration, and sabotage (Khosrow-Pour, 2005).

63
Q

Zero-Day Exploits

A

An attack that exploits a previously unknown hardware, firmware, or software vulnerability (CNSS, 2003)