Midterm Flashcards
A weakness or potential weakness
Vulnerability
A person or thing that exploits a vulnerability
Threat
Fire, Flooding, hurricane, etc.
Natural threats
A.P.T
Advanced Persistent Threat
Advanced Persistent Threat (APT)
Cyber Kill Chain
Avoid unauthorized disclosure of private data
Confidentiality
Ensure that data has not been changed from its authentic state
Integrity
Ensure that when systems are required, they can be accessed
Availability
CIA Triad
Confidentiality
Integrity
Availability
likelihood * impact =
Risk
A single person should not be judge, jury, and executioner
Separation of duties
Only the minimum necessary rights should be assigned
Least privilege
A system should reject a request if it cannot fully process it
Fail closed
By default, an endpoint is untrusted until fully verified
Zero trust