Overview of Security Objs Flashcards

1
Q

3 A’s of security

A

Authentication Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

When a persons identity is established with proof and confirmed by a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounting

A

Tracking of data, computer usage, and network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unauthorized Access

A

Occurs when access to computer resources and data happens without the consent of the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System Failure

A

When a computer crashes or a application fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

A

Act of manipulating users into revealing confidential information or preforming other detrimental actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Controls

A

Alarm systems, Locks, Surveillance cameras, ID Cards, security guards ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technical Controls

A

Smart cards, Encryption, access control lists (ACLs), intrusion detection systems, and network authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Administrative controls

A

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

White Hat Hacker

A

Non-Malicious Hackers who attempt to break into a company’s system at their request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Black Hat Hacker

A

Malicious Hackers who break into computer systems and networks without authorization or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Gray Hat Hacker

A

Hackers with no affiliation to a company that attempts to break into a company’s network and risks breaking the law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Script Kiddies

A

Hackers with little to no skill who only use the tools and exploits written by others (Bottom of threat actors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacktivists

A

Hackers who are driven by a cause like social change, political agendas or terrorism
(2nd to bottom of threat actors)

13
Q

Organized Crime

A

Hackers who are part of a crime group that is well-funded and highly sophisticated
(2nd to top of threat actors)

13
Q

Blue hat hacker

A

Hackers who attempt to hack into a network with permission of the company but are not employed by the company

13
Q

Elite Hackers

A

Hackers who find and exploit vulnerabilities before anyone else does

14
Q

Advanced Persistent Threats (APT)

A

Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal

14
Q

Timeliness

A

Property of an intelligence source that ensures it is up-to-date

15
Q

Relevancy

A

Property of an intelligence source that ensures it matches the use cases intended for it

16
Q

Accuracy

A

Property of an intelligence source that ensures it produces effective results

17
Q

Confidence Levels

A

Property of an intelligence source that ensures it produces qualified statements about reliability

18
Q

Proprietary Intelligence

A

Threat intelligence is very widely provided as a commercial service offering, where access to updates and research is subject to a subscription fee

19
Q

Closed-Source Data

A

Data that is derived from the provider’s own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers’ systems, suitably anonymized

20
Q

Open-Source Data

A

Data that is available to use without subscription, which may include threat feeds similar to the commercial providers, and may contain reputation lists and malware signature databases

21
Q

Open-Source Intelligence (OSINT)

A

Methods of obtaining information about a person or organization through public records, websites, and social media

21
Q

Kill Chain

A

A model developed by Lockheed Martin that describes the stages by which a threat actor progresses a network intrusion

22
Q

Threat Hunting

A

A cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring

23
Q

MITRE ATT&CK Framework

A

A knowledge base maintained by the MITRE corporation for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures (attack.mitre.org)

24
Q

Diamond Model of Intrusion analysis

A

A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure, and victim