Module 1 - Introduction to Security Flashcards
What are the 3 reasons that a legacy platform has not been updated?
1) limited hardware capacity
2) an application only operates on a specific OS version
3) neglect
What category of threat actors use advanced persistent threats (APTs)?
state actors
typically governments are increasingly employing their own state-sponsored attackers for launching cyber attacks against their foes, state actors are often involved in multiyear intrusion campaigns targeting highly sensitive economic, proprietary, or national security information
What category of threat actors have the lowest level of technical knowledge?
script kiddies
are individuals who want to perform attacks yet lack the technical knowledge to carry them out; they do their work by downloading freely available automated attack software (scripts) and use it to perform malicious acts
Complete this definition of information security: that which protects the integrity, confientiality, and availability of information….
through products, people and procedures on the devices that store, manipulate, and transmit the information
information security is first protection; secondly information security is intended to protect information that provides value to people and enterprises; thirdly information security is to protect the integrity, confidentiality, and availability of information on devices that store, manipulate, and transmit information
Which type of attacker will probe a system for weaknesses and then privately provide that information back to the organization?
white hat hackers
Which component of the CIA triad ensures that only authorized parties can view protected information?
availability
information has value if the authorized parties who are assured of its integrity can access the information; availability ensures that data is accessible to only authorized users and not to unapproved individuals
The first cyber attacks were mainly performed for what purpose?
Fame
the very first cyber attacks were mainly for the threat actors to show off their technology skills; however that soon gave way to threat actors with the focused goal of financial gain (fortune)
What is NOT true regarding the goal/outcome of security?
security is a war that must be won at all costs
the goal is not achieving complete victory but instead maintaining equilibrium as attackers take advantage of a weakness in a defense; defenders must respond with an improved defense; information security is an endless cycle between attacker and defender
What term is not used to describe those who attack computer systems?
hacker
in the past, hacker referred to a person who used advanced computer skills to attack computers; because that title often carried a negative connotation, it has been qualified in an attempt to distinguish between different types of attackers
Which component of the CIA triad ensures that information is correct and no unauthorized person has altered it?
integrity
integrity ensures that the information is correct and no unauthorized person or malicious software has altered the data
What is true regarding the relationship between security and convenience?
security and convenience are inversely proportional
the more secure something is, the less convenient something may become to use
After Bella earned her security certification, she was offered a promotion. She saw that in this position she will report to the CISO and supervise a group of security technicians. Which security position has she been offered?
security manager
the security manager reports to the CISO and supervises techs, admins, and security staff; typically a security manager works on tasks identified by the CISO and resolves issues identified by technicians; this position requires an understanding of configuration and operation but not necessarily technical mastery
What is the term used to describe the connectivity between an organization and a third party?
system integration
typically part of third party where a company needs to connect with a separate company’s network in order to perform business functions/transactions; some of the time the two company’s networks do not integrate seamlessly and require “work-arounds” which can lead to vulnerabilities
How do vendors decide which should be the default settings on a system?
those settings that provide the means by which the user can immediately begin to use the product
What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?
brokers
individuals who uncover weaknesses do not report it to the software company but instead sell the vulnerability to the highest bidder
List some recognized attack vectors.
1) email - 94% of all malware is delivered via email
2) wireless - can be intercepted
3) removable media - plugging in random thumb drive embedded with malware
4) direct access
5) social media
6) supply chain - very difficult to defend given the nature of the global economy
What is typically not an issue with patching?
patches addressing zero-day vulnerabilities
1) firmware is difficult to patch, if at all
2) outside of major OS updates, patches for apps are uncommon
3) delays in patching - when an update is available the update may cause an app to not run properly so a business delays updating until it can tweak the business app to work with the new update
What are vulnerabilities associated with legacy platforms?
a legacy platform is no longer in widespread use, often because it has been replaced by a updated version of the earlier technology; although legacy hardware introduces some vulnerabilities, more often vulnerabilities result from legacy software, such as an OS or program
for a variety of reasons - limited hardware capacity, an application that only operates on a specific OS version or even neglect - an OS may not be updated, thus depriving it of these security fixes
What are vulnerabilities associated with improper or weak patch management?
as important as patches are they can create vulnerabilities
- difficulty patching firmware (software embedded into hardware); updating firmware can often be difficult and requires specialized steps
- few patches for application software outside of major OS updates apps are not updated after
- delays in patching OS - companies with system apps will delay deploying a patch if the patch causes the app to not function properly
What are vulnerabilities associated with data storage?
data storage can be considered a 3rd party vulnerability because many organizations rely on 3rd party data storage; this helps to reduce the capital expenditures associated with purchasing, installing and managing new storage hardware and software but also can provide remote access to employees from almost any location
What are vulnerabilities associated with outsourced code?
outsourced code development serves as a 3rd party vulnerability because organization who outsource code development cannot closely monitor the code development and/or do not have the required technical knowledge to identify potential malware in the delivered code
What are some vulnerabilities associated with supply chain?
supply chains serves as 3rd party vulnerabilities; the fact that products move through many steps in the supply chain while some steps are not closely supervised, this has opened the door for malware to be injected into products during their manufacturing or storage ie. supply chain infections