Misc Flashcards
CIAAN: C?
Confidentiality, only authorized users
CIAAN: I?
Integrity, the message is not manipulated, unchanged, no MITM
CIAAN: AA?
Availability: If the message is not available, it can’t be read.
EX. servers need to be up.
Authenticity: A genuine message.
CIAAN: N?
Non-repudiation: The sent message can’t be denied at a later stage.
Hacker role: Red Team?
Attackers
Hacker role: Blue Team?
Defenders
Hacker role: Purple team?
A mix of attackers and defenders
Name 2 attack types?
Targeted attack / planned attack
Opportunistic attack
What is a supply chain attack?
Attack on a customer to a customer to reach the final goal.
Domino effect hack
Hacker value?
Political power, money, information
Digital warfare?
Espionage, vote manipulation, behaviour modification of people online, spreading misinformation, attack infrastructure
Defense in depth?
Holistic security. Secure the least secure first then moving to the next least secure and so on.
Zero trust?
Minimize security holes though thinking that everything is unsecure. EX. Do not give access levels to those who do not explicitly needed.
Triangle of security?
Security, Function and user experience. The sweet spot is very situational.
Ethics and moral?
Thou shall only do: What is legal. What you have permission to do. With a good cause. Without destroying anything.