Overview of Security Objs Flashcards

1
Q

3 A’s of security

A

Authentication Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

When a persons identity is established with proof and confirmed by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting

A

Tracking of data, computer usage, and network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unauthorized Access

A

Occurs when access to computer resources and data happens without the consent of the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System Failure

A

When a computer crashes or a application fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

A

Act of manipulating users into revealing confidential information or preforming other detrimental actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Controls

A

Alarm systems, Locks, Surveillance cameras, ID Cards, security guards ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technical Controls

A

Smart cards, Encryption, access control lists (ACLs), intrusion detection systems, and network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Administrative controls

A

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

White Hat Hacker

A

Non-Malicious Hackers who attempt to break into a company’s system at their request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Black Hat Hacker

A

Malicious Hackers who break into computer systems and networks without authorization or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Gray Hat Hacker

A

Hackers with no affiliation to a company that attempts to break into a company’s network and risks breaking the law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Script Kiddies

A

Hackers with little to no skill who only use the tools and exploits written by others (Bottom of threat actors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacktivists

A

Hackers who are driven by a cause like social change, political agendas or terrorism
(2nd to bottom of threat actors)

13
Q

Organized Crime

A

Hackers who are part of a crime group that is well-funded and highly sophisticated
(2nd to top of threat actors)

13
Q

Blue hat hacker

A

Hackers who attempt to hack into a network with permission of the company but are not employed by the company

13
Q

Elite Hackers

A

Hackers who find and exploit vulnerabilities before anyone else does

14
Q

Advanced Persistent Threats (APT)

A

Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal

14
Q

Timeliness

A

Property of an intelligence source that ensures it is up-to-date

15
Q

Relevancy

A

Property of an intelligence source that ensures it matches the use cases intended for it

16
Q

Accuracy

A

Property of an intelligence source that ensures it produces effective results

17
Q

Confidence Levels

A

Property of an intelligence source that ensures it produces qualified statements about reliability

18
Proprietary Intelligence
Threat intelligence is very widely provided as a commercial service offering, where access to updates and research is subject to a subscription fee
19
Closed-Source Data
Data that is derived from the provider's own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers' systems, suitably anonymized
20
Open-Source Data
Data that is available to use without subscription, which may include threat feeds similar to the commercial providers, and may contain reputation lists and malware signature databases
21
Open-Source Intelligence (OSINT)
Methods of obtaining information about a person or organization through public records, websites, and social media
21
Kill Chain
A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion
22
Threat Hunting
A cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring
23
MITRE ATT&CK Framework
A knowledge base maintained by the MITRE corporation for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures (attack.mitre.org)
24
Diamond Model of Intrusion analysis
A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim