Identifies Principles, Policies, Practices, and Methods Flashcards

1
Q

Concept Risk

A

It refers to the potential for harm or less arising from uncetainty or occurrence of adverse events.

ex: Implementing a new software system entails the risk of technical issues disrupting business operations if not properly tested and managed

remembering: The uncertain path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Clickjacking

A

It is a cybersecurity attack technique where attackers trick users into clicking on a hidden or disgused elements on a web page without their knowledge.

ex: An attackers creates a malicious website that overlays an invisible frame over a ligtimate button, causing users to unknowingly click the hidden button.

remembering: Sneaky Clicks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pretexting

A

It is a social engineering technique where an attack fabricates a false idenity or scenario to decive individuals into disclosing sensitive information or performing actions that compromise security

ex: An attacker poses as an IT technician and convices an employee to provide login credentials under the pretext of preforming system maintenence

remembering: Pretend Trust Building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

It is a type of cyberattack targeting high-profile individuals, such as executives or senior management, within an organization.

ex: A phishing email purportedly from a senior executive asks an employee to provide login and credentials to access a supposed urgent document

remembering: Going for the Big Fish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baiting

A

It is a social engineering technique where attackers entice victums with the promise of a reward or benefit to trick them into taking a specfic action, such as click on a malicious link to download malware or give up sensitive information

ex: An attacker sends out fake emails promising free gift cards to recipients who click on a link and provide their personal information, leading to identify theft

remembering: Tempting Trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgating

A

It is also known as piggybacking, it is a phyiscal security breach where an unauthorized individual gains access to a restricted area by falsely following an authorized person through

ex: A delivery person tailgates behind a group of employees entering a data center, gaining access to sensitive server rooms without proper clearance

remembering: Sneak Entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Masquerading

A

It is a cybersecurity attack where an unauthorizied individual aor entity impersonates a legitimate user or system to gain access to sensitive information, resources or privleges.

ex: A hacker impersonates a company executive in an email to employee, requesting sensitive information or initiating fraudulent transactions

remembering: Disquised Intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

It is a cyberattack where the attackers send deceptive emails, text messages or websites that appear to be from reputable sources to trick individuals into providing sensitive information, such as passwords, financial details, or personal data, olr to install malware on their devices

ex: A text message claims to be from a delievery company and ask the recipient to click on the link to track the package,m but the link is actually installs malware on their device

remembering: Fishing for information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CAPTCHA

A

It is a security meausre used to determine whether a user is human or automated. It presents challenges that are easy for humans to solve but difficult for automated bots.

ex: A website requires users to enter distorted text from an image before submitting a form to verify they are human

remembering: Humanity Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Raw Data

A

It refers to unprocessed, unorganized information collected directly from sources without any manipulation or interperatioin. It reprents the most basic form of data and reqauires further processing or analysis to extract meaningful insights or draw conclusions.

ex: Survey repsonses entered into a spreadsheet without any formatting or analysis

remembering: Data Straight from the Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Metadata

A

It refers to descriptive or structural information about data, providing context and attributes that facilidate its management, discovery and understanding.

ex: In a digital photograph, metadata may include information about the camera settings, location coordinates and date/time of capture

remembering: Data about Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scoping

A

In cybersecurity it refers to defining the counderies and parameters of a security assessment, investigation or project. It involves identifying the specfic goals objectives, assets and constraints to ensure the effective allocation of resources and focus on releveant areas of concern.

ex: An incident response, scoping involves determining the extent of a security incident, such as identifying affected systems, data and users, to facilitate a targeted and effected responses.

remembering: Setting the Scene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mapping

A

It is the context of computer networks or cybersecurity, refers to the process of discovering and visualizing the interconnected devices, systems and resources within a network enviornment.

ex: Network administrators use mapping tools to create diagrams showing the layout of routers, switches and servers in an organizations network

remembering: Network Cartography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability Analysis

A

It is the process of identifying, assessing, and prioritzing weaknesses of vulnerabilities in systems, networks or processes that could be explotited by adversaries.

remembering: Spotting weak links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Awareness Program

A

It is an organized initiative aimed at educating infividuals within an organization about cybersecurity risks, best practices, and policies to promote a culture of security.

ex: A company launches a cybersecurity awareness campaign, distributing posters, newsletters, and online resources to employees to raise awareness about common security threats and how to prevent them.

remembering: Cybersecurity education hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3 = Post Office Protocol v3

A

It is a standard protocol used for retrieveing emails from a mail server to client device. It allows users to download emaiils from their mailbox to their computer or mobile device for offline access, typically deleting the emails from the server in the process

ex: An email application on a smartphone uses POP3 to download emails from the user’s mailbox to the device for offline reading

remembering: Postman Delievery

17
Q

What is Interagency OpSec Support Staff (IOSS)

A

It is a collaborative entity formed to provide operational security (OPSEC) support and expertise across multiple government agencies and departments. It facilitates coordination and cooperation in OPSEC efforts to protect sensitive information and operations

ex: IOSS assists verious government agencies in developing OPSEC plans and conducting vulnerability assessments to safeguard critical information

remembering: OPSEC Central Command

18
Q

What is Secure Encapsulated Authorization Layer (SEAL)

A

It is a security protocol designed for authenticiting and authorizing access to network resources in IoT (Internet of Things) enviornments. It provides secure communication between IoT devices and cloud services, ensuring data confidentiality, intergrity and authentication.

ex: A smart thermostat uses the SEAL protocol to securely authenticate with a cloud-based management platform, allowing users to remotely control and monitor temperature settings.

remembering: Guardian of IoT

19
Q

What is Operational Security (OPSEC)

A

It is a symmetic process used to identify, analyze, and mitigate risks to sensitve information or operations.

  1. Identification of Critical Information
  2. Threat Analysis
  3. Vulnerability Assessment
  4. Risk Assessment
  5. Countermeausre Developement
  6. Security Plan Implementation
  7. Monitoring and Review
20
Q

What is the First Law of Operations Security?

A

“If you don’t know threat, how can you protect against it”, The importance of undestanding threats in order to effectively secure operations and sensitive information

ex: A company conducts a thorough threat analysis, identifying potential cyber threats, to implement robust cybersecurity protocols and protect its data

remembering: Know the Enemy

21
Q

What is the Second Law of Operations Security?

A

This principle highlights the necessity of identifying critical information and assets that require protection to ensure effective security measures are implemented

ex: A military unit determines that its operational plans and communication channels are vital assets, insituting strigent security protocols to safe guard them from adversaries.

remembering: Protect Crown Jewels

22
Q

What is the Third Law of Operations Security?

A

This principle emphasizes the importance of implementing and maintaining security meausre to protect identifed critical inofrmation and asets from adversaries

ex: A military base continuously monitors and endorces security meausre to protect its operational plans and communications systems from espionage.

remembering: Defense in Action

23
Q

What is the Fourth Law of Operations Security?

A

This principle highlights the necessity of monitoring and detection to identify potential threats and respond effectively to protect critical information and assets

ex: A military installation uses surveillance systems and intelligence gathering to detect enemy activities and prevent breaches

remembering: Always be Watching