Introduction Flashcards

1
Q

Define assets

A

An item of value to stakeholders. An asset may be tangible (e.g., a physical item such as hardware, firmware, computing platform, network device, or other technology component) or intangible (e.g., humans, data, information, software, capability, function, service, trademark, copyright, patent, intellectual property, image, or reputation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define a threat

A

Any circumstance or event with the potential to adversely impact organizational operations, organizational assets, individuals, other organizations, or the Nation through a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a vulnerability

A

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define an attack

A

Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define risk

A

The probability of exposure or loss resulting from a cyber attack or data breach on an organization and the potential adverse impacts to organizational operations (i.e., mission, functions, image, or reputation) and assets, individuals, other organizations, and the Nation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discuss each of the AAA triad

A

Authentication, authorization, and accounting (AAA) is a security framework that controls access to computer resources, enforces policies, and audits usage.

-Authentication provides a way of identifying a user, typically by having the user enter a valid user name and valid password before access is granted.
-Authorization is the process of enforcing policies: determining what types or qualities of activities, resources, or services a user is permitted.
-Accounting measures the resources a user consumes during access. This can include the amount of system time or the amount of data a user has sent and/or received during a session. Accounting is carried out by logging of session statistics and usage information and is used for authorization control, billing, trend analysis, resource utilization, and capacity planning activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provide the definition of confidentiality in the CIA triad, giving possible attacks that affect it and possible countermeasures

A

Confidentiality means that only authorized individuals/systems can view sensitive or classified information.

ATTACKS
Interception attacks allow unauthorized users to access our data
data breaches and leaks
escalation of system privileges
network reconnaissance
electronic eavesdropping
man-in-the-middle attacks
Phishing Attacks

COUNTERMEASURES
cryptography
Employee Training- Train employees to recognize phishing attempts, use multi-factor authentication, and verify sender authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provide the definition of integrity in the CIA triad, giving possible attacks that affect it and possible countermeasures

A

Integrity means data is trustworthy, complete, and has not been accidentally or intentionally altered or modified by both authorized and unauthorized users in unauthorized ways.

ATTACKS
-Defacement attack, in which hackers alter a website’s HTML to vandalize it for fun or ideological reasons.
-Data Tampering
-Insider Threats
- SQL Injection

COUNTERMEASURES
-Digital Signatures and Hashing- Implement digital signatures to verify data integrity and use cryptographic hashing to detect data tampering
-Access Controls and Monitoring
-Input Validation and Parameterized Queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provide the definition of availability in the CIA triad, giving possible attacks that affect it and possible countermeasures

A

Availability means information should be consistently and readily accessible for authorized parties in accordance to the service level agreement

ATTACKS
denial-of-service (DoD) or DDoS attack
Ransomware
Physical Destruction or Damage

COUNTERMEASURES
Redundancy
rate limiting
data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly