Intro Flashcards

1
Q

What is safety?

A

against unintended threats.
eg. seatbelt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security?

A

against deliberate threats.
eg. car alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe relationship between attackers and defenders

A

Assymetric.
Defend all the time, attack once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CIA triad stand for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the C in CIA?

A

Confidentiality - only authorized parties should be able to access data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the I in CIA?

A

Integrity.
You should be able to trust that the data is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is A in CIA?

A

Availability.
System should be available to user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tools against C?

A

Encryption
Access control system
policies and governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tools against I?

A

Data validation.
Change management/ version control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tools against A?

A

Redundancy and failover
Load balancing - distribute traffic across resources
Monitoring and alerting - before issue becomes big

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a threat?

A

= potential violation of security, posed by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three elements of a threat?

A

Intent
Capability
Opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a threat model?

A

strategic framework that identifies potential attacks a system aims to safeguard agains.

Helps understand and prepare for various security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some threat actor types and their motivation

A

(6)
Cybercriminals - profit
Nation States - geopolitical
Terrorist groups - ideology violence
Thrill seekers - satisfaction
Insider Threats - discontent
Hackers - variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is CVD?

A

Coordinated Vulnerability Disclosure

ethical practice where security researchers/individuals discover vulnerabilities and report them to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does Eggshell defense refer to?

A

Defense on diff layers (cybersecurity, physical security…)

17
Q

What are the phases of the Cyber Kill Chain?

A

(7)
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on Objects

18
Q

Why is the Cyber Kill Chain useful?

A

It balances the playing field
Attackers only need to be detected once

19
Q

What are the levels of the Pyramid of Pain?

A

TTPs (Tactics, Techniques, Procedures)
Tools
Network/Host Artifacts
Domain Names
IP Addresses
Hash Values

20
Q

What does the Pyramid of Pain refer to?

A

You can detect an attack on multiple levels. The higher the level of detection, the harder it is for attackers to circumvent the measure

21
Q

What does security by design entail? What are the pros?

A

approach that integrates cybersecurity measures in the design & development phases of a system

pros:
- more secure
- cost-effective

22
Q

What is Defense in Depth?

A

strategy that involved multiple layers of security controls against various types of threats

pros:
- reduces the risk of one failure bringing down the whole system

23
Q

What is Usable Security? Why is it useful?

A

approach that seeks to integrate sec. measures in a positive and user-friendly experience

if not usable, users will find a way around them => more security risks