Module 1 - 02-2 Flashcards
Navigate threats, risks, and vulnerabilities
Define Asset
An item perceived as having value to an organization
Define Threat
Any circumstance or event that can negatively impact assets
Define Social Engineering
A manipulation technique that exploits human error to gain private information, access, or valuables
Define Phishing
A technique that is used to acquire sensitive data, such as user names, passwords, or banking information
True or False?
Phishing exploits human error to acquire sensitive data and private information.
True
Phishing exploits human error to acquire sensitive data and private information. It is one method of social engineering.
Define Risk
Anything that can impact the confidentiality, integrity, or availability of an asset
A basic formula for determining the level of risk is that risk equals the likelihood of a threat.
How would an organization rate risks at different levels (3)?
- Low
- Medium
- High
depending on possible threats and the value of an asset
Define Low-Risk Asset
Information that would not harm the organization’s reputation or ongoing operations, and would not cause financial damage if compromised
What are examples of Low-Risk Asset (2)?
- Public information such as website content
- Published research data
Define Medium-Risk Asset
Information that’s not available to the public and may cause some damage to the organization’s finances, reputation, or ongoing operations
What is an example of Medium-Risk Asset?
The early release of a company’s quarterly earnings could impact the value of their stock
Define High-Risk Asset
Information protected by regulations or laws, which if compromised, would have a severe negative impact on an organization’s finances, ongoing operations, or reputation
What are examples of High-Risk Asset (3)?
This could include leaked assets with SPII, PII, or intellectual property
Define Vulnerability
A weakness that can be exploited by a threat
What two factors must be present for there to be a risk?
Both a Vulnerability and a Threat must be present for there to be a Risk
What are examples of Vulnerabilities (4)?
- An outdated firewall, software, or application
- Weak passwords
- Unprotected confidential data
- People
Define Ransomware
A malicious attack where threat actors encrypt an organization’s data then demand payment to restore access
What are the Layers of the Web (3)?
- Surface Web
- Deep Web
- Dark Web
What is the Top Layer of the Web?
Surface Web
What is the Middle Layer of the Web?
Deep Web
What is the Bottom Layer of the Web?
Dark Web
Define Surface Web
The surface web is the layer that most people use.
It contains content that can be accessed using a web browser.
Define Deep Web
The deep web generally requires authorization to access it.
An organization’s intranet is an example of the deep web, since it can only be accessed by employees or others who have been granted access.
Define Dark Web
Lastly, the dark web can only be accessed by using special software.
The dark web generally carries a negative connotation since it is the preferred web layer for criminals because of the secrecy that it provides.