Module 1 - Introduction to Security Flashcards
Introduction to Security
What is Security?
To be free from danger & the process that achieves that freedom
As security is increased, what happens to convenience?
Decreases
How is digital information secured?
1) Manipulated by a microprocessor
2) Preserved on a storage device
3) Transmitted over a network
What are the 3 types of information protecting, & what is the acronym?
CIA Triad:
1) Confidentiality
2) Integrity
3) Availability
Define Confidentiality
Only approved individuals may access information
Define Integrity
Ensures information is correct & unaltered
Define Availability
Ensures information is accessible to authorized users
What is a Threat Actor?
An individual or entity responsible for cyber incidents against the technology equipment of enterprises & users; aka “attacker” or “hacker”
What 3 categories is Financial Crime divided into based on targets?
1) Individual Users
2) Enterprises
3) Governments
What are the 3 types of hackers?
1) Black hat hackers
2) White hat hackers
3) Gray hat hackers
What are Black Hat Hackers?
Threat actors who violate computer security for personal gain or to inflict malicious damage (ex: corrupt a hard drive)
What do White Hat Hackers do?
Attempt to probe a system (with an organization’s permission) for weaknesses & then privately provide that information; aka “ethical hackers”
What are Gray Hat Hackers?
Attackers’ who attempt to break into a computer system without the organization’s permission (illegal) but not for their own advantage; instead, they publicly disclose the attack in order to shame the organization into taking action
What are the 5 distinct categories of hackers?
1) Script kiddies
2) Hacktivists
3) State actors
4) Insiders
5) Others (Competitors, Criminal Syndicates, Shadow IT, Brokers, Cyberterrorists)
What are Script Kiddies?
Individuals who want to perform attacks, yet lack technical knowledge to carry them out. They download freely available automated attack software & use it to attack
What are Hacktivists?
Individuals strongly motivated by ideology (for the sake of their principles or beliefs);
Often involved breaking into a website & changing its contents as means of a political statement
What are State Actors?
Launches cyberattacks on their foes (instead of an army walking in); directed towards businesses in foreign countries with the goal of causing financial harm or damage to the enterprise’s reputation;deadliest of any threat actors
Which type of threat actor is the deadliest?
State Actors
What is APT, what does it stand for, & who does it?
A class of attacks that use innovative attack tools to infect & silently extract data over an extended period of time;
Advanced Persistent Threat (APT)
Most commonly associated w/ state actors
What are Insiders?
Employers, contractors, & business partners can pose an insider threat of manipulating data from the position of a trusted employee; harder to recognize because they come from within the enterprise
What are the “Other” threat actors?
1) Competitors
2) Criminal Syndicates
3) Shadow IT
4) Brokers
5) Cyberterrorists
What are Competitors?
Launch attacks against an opponent’s system to steal classified information; may steal new product research or a list of current customers to gain a competitive advantage
What are Criminal Syndicates?
Move from traditional criminal activities to more rewarding and less risky online attacks
What are Shadow ITs?
Employees become frustrated with the slow pace of acquiring technology, so they purchase and install their own equipment or resources in violation of company policies;
What are the 3 focuses of Insiders?
1) Intellectual Property (IP)
2) Sabotage
3) Espionage
What are Brokers?
Sell their knowledge of a weakness to other attackers or governments; sell weaknesses to the highest bidder
What are Cyberterrorists?
Attack a nation’s network & computer infrastructure to cause disruption & panic among citizens
Define Vulnerability
The state of being exposed to the possibility of being attacked or harmed
What are the 5 categories of Vulnerabilities?
1) Platforms
2) Configurations
3) Third parties
4) Patches
5) Zero-day vulnerability
What is a Legacy platform?
For a variety of reasons (limited hardware capacity, an application that only operates on a specific OS version, or neglect), an OS may not be updated, thus depriving it of these security fixes; just asking to be attacked; think Windows XP
What is an On-premises platform?
Software & technology located within the physical confines of an enterprise
What are Cloud platforms?
Servers, storage, & the supporting networking infrastructure are shared by multiple enterprises over a remote network connection that has been contracted for a specific period of time
What are the 3 types of platforms?
1) Legacy platform
2) On-premises platform
3) Cloud platform
What is a Weak Configuration?
Features & security settings that are not properly configured to repel attacks
What are 7 types of weak configurations?
1) Default setting
2) Open port & services
3) Unsecured root accounts
4) Open permission
5) Unsecured protocols
6) Weak encryption
7) Errors
What are Default Settings as a weak configuration?
Predetermined by the vendor for usability & ease of use (not for security) so the user can immediately begin using the product; ex: a router comes with a default password that is widely known
What are Open Ports & Services as a weak configuration?
Devices & services are often configured to allow the most access so that the user can close ports that are specific to that organization; ex: a firewall comes with FTP ports 20 & 21 open
What are Unsecured Root Accounts?
Can give a user unfettered access to all resources; ex: a misconfigured cloud storage repository cloud give any user access to all data
What are Open Permissions as a weak configuration?
User access over files that should be restricted; ex: a user could be given Read, Write, and Execute privileges when she should have only Read privileges
What are Unsecured Protocols as a weak configuration?
Aka insecure protocols; this configuration uses protocols for telecommunications that do not provide adequate protections; ex: an employee could use devices that run services with unsecure protocols such as Telnet or SNMPv1
What is Weak Encryption as a weak configuration?
Users choosing a known vulnerable encryption mechanism; ex: a user could select an encryption scheme that has a known weakness or a key value that is too short
What are Errors as a weak configuration?
Human mistakes in selecting one setting over another without considering the security implications; ex: an employee could use deprecated settings instead of current configurations
What are Third Parties?
External entities used by almost all businesses;
One of the major risks of a third-party system integration involves the principle of the “weakest link”
What is Outsourced Code Development as it relates to Third Parties?
Contracting with third parties to assist the organization in the development & writing of a software program or app
What is Data Storage as it relates to Third Parties?
Third-party facilities used for storing important data
What is Vendor Management as it relates to Third Parties?
Process organizations use to monitor & manage the interactions with all of their external third parties