Module 2 Flashcards
What is a computer virus?
Malicious code written to interfere with computer operations and cause damage to data and software.
What is Social Engineering?
A manipulation technique that exploits human error to gain private information, access, or valuables.
What is Phishing?
The use of digital communications to trick people into revealing sensitive data or deploying malicious software.
What is BEC?
“Business Email Compromise”
A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain financial advantage.
What is Spearphishing?
A malicious email attack that targets a specific group of users. The email seems to originate from a trusted source.
What is Whaling?
A form of spear phishing. Threat actors target company executives to gain access to sensitive data.
What is Vishing?
The exploitation of voice communication to obtain sensitive information or to impersonate a known source.
Explain the Security and Risk Management domain
Defines security goals and objectives, risk mitigation, compliance, business continuity, and the law
Which domain defines security goals and objectives, risk mitigation, compliance, business continuity, and the law
Security and Risk Management
Explain the Asset Security domain
Secures digital and physical assets. It is also related to the storage, maintenance, retention, and destruction of data
Which security domain secures digital and physical assets. It is also related to the storage, maintenance, retention, and destruction of data
Asset Security
Explain the security architecture and engineering domain
Optimizes data security by ensuring effective tools, systems, and processes are in place
Which security domain Optimizes data security by ensuring effective tools, systems, and processes are in place
Security Architecture and Engineering
Explain the Communication and Network Security domain
Manages and secures physical networks and wireless communications
Which security domain Manages and secures physical networks and wireless communications
Communication and Network Security
Explain the Identity and Access Management domain
Keeps data secure by ensuring users follow established policies to control and manage physical assets, like office spaces and logical assets, such as network applications
Which security domain keeps data secure by ensuring users follow established policies to control and manage physical assets, like office spaces and logical assets, such as network applications
Identity and Access Management
Explain the Security Assessment and Testing domain
Responsible for:
- conducting security control testing
- collecting and analysing data
- conducting security audits
to monitor for risks, threats, and vulnerabilities
Which security domain is responsible for conducting security control testing, collecting and analysing data, and conducting security audits to monitor for risks, threats and vulnerabilities
Security Assessment and Testing
Explain the Security Operations domain
Responsible for conducting investigations and implementing preventative measures
Which security domain is responsible for conducting investigations and implementing preventative measures
Security Operations
Explain the Software Development Security domain
Uses secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services
Which security domain Uses secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services
Software Devopment Security
What are the 8 CISSP security domains
- Security and Risk Management
- Asset Security
- Security and Architecture Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
What is a “password attack”?
An attempt to access password-secured devices, systems, networks, or data.
What are some forms of Password Attack?
Brute force
Rainbow Table
What security domain do Password attacks fall under?
Communication and Network Security
What are some forms of Social Engineering attack?
- Phishing
- Smishing
- Vishing
- Spear fishing
- Whaling
- Social media fishing
- Business Email Compromise (BEC)
- Watering hole attack
- USB (Universal Serial Bus) baiting
- Physical social engineering
What security domain do social engineering attacks fall under?
Security and Risk Management
What is a Physical Attack?
A security incident that affects not only digital but also physical environments where the incident is deployed.
What are some forms of Physical Attack?
- Malicious USB cable
- Malicious flash drive
- Card cloning and skimming
What security domain do physical attacks fall under?
Communication and Network Security
What is Adversarial Artificial Intelligence?
A technique that manipulates AI and machine learning technology to conduct attacks more efficiently.
Which security domain do Adversarial AI Attacks fall under?
Both the Communication and Network Security and the Identity and Access Management domains.
What is a Supply-Chain Attack?
Targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.
Why can Supply-Chain Attacks be costly?
Security breaches can occur at any point of the supply-chain so they can affect multiple organisations and individuals.
What is a Cryptographic Attack?
Affects secure forms of communication between sender and intended recipient.
What are some forms of Cryptographic Attack?
- Birthday
- Collision
- Downgrade
Which security domain do Cryptographic Attacks fall under?
Communication and Network Security
What are “APTs”?
Advanced Persistent Threats
What are some characteristics of Advanced Persistent Threats?
- Have significant expertise accessing an organisation’s network without authorisation.
- Tend to research their targets in advance and can remain undetected for an extended period of time.
What are some motivations and intentions of APTs?
- Damaging critical infrastructure, such as the power grid and natural resources
- Gaining access to intellectual property
What are Insider Threats?
Individuals abuse their authorised access to obtain data that may harm an organisation.
What are some motivations and intentions of Insider Threats?
- Sabotage
- Corruption
- Espionage
- Unauthorised data access or leaks
What is a Hacker?
Any person who uses computers to gain access to computer systems, networks, or data.
What are the three main categories of Hackers?
- Authorised Hackers (Ethical Hackers)
- Semi-authorised Hackers
- Unauthorised Hackers (Unethical Hackers)
What is an Ethical Hacker (Authorised Hacker)?
They follow a code of ethics and adhere to the law to conduct organisational risk evaluations. Motivated to safeguard people and organisations from malicious threat actors.
What is a Semi-Authorised Hacker?
Considered researchers. Search for vulnerabilities, but don’t take advantage of the ones they find.
What is an Unauthorised Hacker (Unethical Hacker)?
Malicious threat actors who do not follow or respect the law. Their goal is to collect and sell confidential data for financial gain.