Intro Flashcards
What is safety?
against unintended threats.
eg. seatbelt
What is security?
against deliberate threats.
eg. car alarm
Describe relationship between attackers and defenders
Assymetric.
Defend all the time, attack once.
What does CIA triad stand for?
Confidentiality
Integrity
Availability
What is the C in CIA?
Confidentiality - only authorized parties should be able to access data
What is the I in CIA?
Integrity.
You should be able to trust that the data is correct.
What is A in CIA?
Availability.
System should be available to user.
Tools against C?
Encryption
Access control system
policies and governance
Tools against I?
Data validation.
Change management/ version control.
Tools against A?
Redundancy and failover
Load balancing - distribute traffic across resources
Monitoring and alerting - before issue becomes big
What is a threat?
= potential violation of security, posed by attackers
What are the three elements of a threat?
Intent
Capability
Opportunity
What is a threat model?
strategic framework that identifies potential attacks a system aims to safeguard agains.
Helps understand and prepare for various security risks
Name some threat actor types and their motivation
(6)
Cybercriminals - profit
Nation States - geopolitical
Terrorist groups - ideology violence
Thrill seekers - satisfaction
Insider Threats - discontent
Hackers - variable
What is CVD?
Coordinated Vulnerability Disclosure
ethical practice where security researchers/individuals discover vulnerabilities and report them to the organization
What does Eggshell defense refer to?
Defense on diff layers (cybersecurity, physical security…)
What are the phases of the Cyber Kill Chain?
(7)
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on Objects
Why is the Cyber Kill Chain useful?
It balances the playing field
Attackers only need to be detected once
What are the levels of the Pyramid of Pain?
TTPs (Tactics, Techniques, Procedures)
Tools
Network/Host Artifacts
Domain Names
IP Addresses
Hash Values
What does the Pyramid of Pain refer to?
You can detect an attack on multiple levels. The higher the level of detection, the harder it is for attackers to circumvent the measure
What does security by design entail? What are the pros?
approach that integrates cybersecurity measures in the design & development phases of a system
pros:
- more secure
- cost-effective
What is Defense in Depth?
strategy that involved multiple layers of security controls against various types of threats
pros:
- reduces the risk of one failure bringing down the whole system
What is Usable Security? Why is it useful?
approach that seeks to integrate sec. measures in a positive and user-friendly experience
if not usable, users will find a way around them => more security risks