Introduction to IT Security Flashcards
1
Q
What is IT Security ?
A
- All activities and product deployment to prevent unauthorized access, modification and deletion of information.
- Protecting the company’s most valuable assets from attack, malicious behavior, and human error, both internal and external
2
Q
What is Functional reliability (safety) vs What is Information security (security)
A
- A system works without technical failure
- Data security - Protection of data from unauthorised use and misuse by humans as well as disturbing environmental influences
- Data protection - protecting people from the unwanted use or misuse of their personal data
3
Q
What are the 3 most basic protection goals?
A
- Confidentiality - Characteristic that information is not made available to unauthorised persons, entities or processes.
- Integrity - Property of correctness and completeness
- Availability - property of being accessible and usable when an authorised entity has a need to do so.
4
Q
Name the 3 areas for the protection of data and systems.
A
- Physical security - Threats and measures regarding access control, power supply, protection against fire and water damage, etc.
- Technical security - Protection of actual systems, malware prevention, encryption, network protection, policies.
- Organisational security - Organizational measures for secure procedures, processes, definition of responsibilities, policies
5
Q
5 pillars of a successful cybersecurity program (NIST)
A
- Identify - Data, people, processes, and systems that enable the organization to achieve its business objectives are identified and evaluated according to their relative importance to the business objectives.
- Protect - Develop and implement appropriate safeguards to protect identified assets.
- Detect - Develop and implement appropriate activities to identify cybersecurity events that have occurred as quickly as possible
- Respond - Activities to take appropriate action in relation to an identified security incident are defined and appropriate processes implemented (incident response).
- Recover - Plans to maintain and restore standard operations are developed and reviewed regularly.
6
Q
Terms of Information Security:
- Attack
- Countermeasure
- Risk
- Vulnerability
- Threat
- Security policy
A
- Attack - An attack on system security. A distinction is made between different attacks, an attack is always directed at one or more protection targets
- Countermeasure - activities or systems that reduce or even prevent the risk of an attack or the effects of such an attack.
- Risk - Probability of occurrence and expected level of damage from such an attack
- Vulnerability - occur in hardware, software, network, processes - lack of protective measures that could be exploited by an attacker.
- Threat - the general risk that a vulnerability could be exploited.
- Security policy - Rules and procedures to reduce risk.
7
Q
Cyber kill chain - What are the phases of a cyber attack?
A
- Reconnaissance - Attackers try to get as much information as possible about their target (2 types - Passive Reconnaissance or Open Source Intelligence Gathering (OSINT)
• Attacker uses all possible public sources to obtain information • e.g. search engines, domain information, job portals, etc.
• Active Reconnaissance
• Attackers resort to active methods such as port scanning, website scanning, social engineering attacks to elicit employee information, - Weaponisation - Attacks are prepared for the attack vectors that appear most likely successful
- Delivery - The planned attacks of the Weaponise Phase are carried out
- Exploitation - • After delivering the payload, the malicious code is executed to give the attacker an initial foothold in the target network.
• An initial foothold means the attacker usually still has underprivileged access to the system and can execute commands there. - Installation - The attacker increases his privileges to system rights, downloads malware e.g. Remote Access Tool (RAT) or rootkits
- Command and control - The affected system connects itself to a Command & Control (C&C) server and receives commands from the server.
- Actions on objectives - From the C&C phase, the system is completely in the hands of the attacker, he can read out information and attack other systems via the the infected system