Overview of Security Objs Flashcards
3 A’s of security
Authentication Authorization
Accounting
Authentication
When a persons identity is established with proof and confirmed by a system
Authorization
Occurs when a user is given access to a certain piece of data or certain areas of a building
Accounting
Tracking of data, computer usage, and network resources
Malware
Malicious Software
Unauthorized Access
Occurs when access to computer resources and data happens without the consent of the owner
System Failure
When a computer crashes or a application fails
Social Engineering
Act of manipulating users into revealing confidential information or preforming other detrimental actions
Physical Controls
Alarm systems, Locks, Surveillance cameras, ID Cards, security guards ect.
Technical Controls
Smart cards, Encryption, access control lists (ACLs), intrusion detection systems, and network authentication
Administrative controls
Policies, procedures, security awareness training, contingency planning, and disaster recovery plans
White Hat Hacker
Non-Malicious Hackers who attempt to break into a company’s system at their request
Black Hat Hacker
Malicious Hackers who break into computer systems and networks without authorization or permission
Gray Hat Hacker
Hackers with no affiliation to a company that attempts to break into a company’s network and risks breaking the law
Script Kiddies
Hackers with little to no skill who only use the tools and exploits written by others (Bottom of threat actors)
Hacktivists
Hackers who are driven by a cause like social change, political agendas or terrorism
(2nd to bottom of threat actors)
Organized Crime
Hackers who are part of a crime group that is well-funded and highly sophisticated
(2nd to top of threat actors)
Blue hat hacker
Hackers who attempt to hack into a network with permission of the company but are not employed by the company
Elite Hackers
Hackers who find and exploit vulnerabilities before anyone else does
Advanced Persistent Threats (APT)
Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal
Timeliness
Property of an intelligence source that ensures it is up-to-date
Relevancy
Property of an intelligence source that ensures it matches the use cases intended for it
Accuracy
Property of an intelligence source that ensures it produces effective results
Confidence Levels
Property of an intelligence source that ensures it produces qualified statements about reliability