Sec+601 Flashcards
3 key objectives of cybersecurity programs
confidentiality, integrity, and availability
Confidentiality
ensures that unauthorized individuals are not able to gain access to sensitive information. Cybersecurity professionals develop and implement security controls, including firewalls, access control lists, and encryption, to prevent unauthorized access to information.
Integrity
ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally. Integrity controls, such as hashing and integrity monitoring solutions, seek to enforce this requirement. Integrity threats may come from attackers seeking the alteration of information without authorization or non-malicious sources, such as a power spike causing the corruption of information.
Availability
ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them. Availability controls, such as fault tolerance, clustering, and backups, seek to ensure that legitimate users may gain access as needed. Similar to integrity threats, availability threats may come either from attackers seeking the disruption of access or non-malicious sources, such as a fire destroying a datacenter that contains valuable information or services.
Security incidents
occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.
3 key threats to cybersecurity efforts:
DAD Triad - Disclosure, Alteration and Denial
Disclosure is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss. Disclosure is a violation of the principle of confidentiality. Attackers who gain access to sensitive information and remove it from the organization are said to be performing data exfiltration. Disclosure may also occur accidentally, such as when an administrator misconfigures access controls or an employee loses a device.
Alteration is the unauthorized modification of information and is a violation of the principle of integrity. Attackers may seek to modify records contained in a system for financial gain, such as adding fraudulent transactions to a financial account. Alteration may occur as the result of natural activity, such as a power surge causing a “bit flip” that modifies stored data. Accidental alteration is also a possibility, if users unintentionally modify information stored in a critical system as the result of a typo or other unintended activity.
Denial is the unintended disruption of an authorized user’s legitimate access to information. Denial events violate the principle of availability. This availability loss may be intentional, such as when an attacker launches a distributed denial-of-service (DDoS) attack against a website. Denial may also occur as the result of accidental activity, such as the failure of a critical server, or as the result of natural activity, such as a natural disaster impacting a communications circuit.
Attackers who gain access to sensitive information and remove it from the organization are said to be performing:
data exfiltration
We can categorize the potential impact of a security incident using the same categories that businesses generally use to describe any type of risk:
financial, reputational, strategic, operational, and compliance.
(Breach impact risk) as the name implies, the risk of monetary damage to the organization as the result of a data breach. This may be very direct financial damage, such as the costs of rebuilding a datacenter after it is physically destroyed or the costs of contracting experts for incident response and forensic analysis services.
Financial Risk
(Breach impact risk) occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders. It is often difficult to quantify reputational damage, as these stakeholders may not come out and directly say that they will reduce or eliminate their volume of business with the organization as a result of the security breach. However, the breach may still have an impact on their future decisions about doing business with the organization.
Reputational risk
(Breach impact risk) is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.
Strategic risk
(Breach impact risk) occurs when a security breach causes an organization to run afoul of legal or regulatory requirements. For example, the Health Insurance Portability and Accountability Act (HIPAA) requires that health-care providers and other covered entities protect the confidentiality, integrity, and availability of protected health information (PHI). If an organization loses patient medical records, they violate HIPAA requirements and are subject to sanctions and fines from the U.S. Department of Health and Human Services. That’s an example of compliance risk.
Compliance risk
As an organization analyzes its risk environment, technical and business leaders determine the level of protection required to preserve the confidentiality, integrity, and availability of their information and systems. They express these requirements by writing the () that the organization wishes to achieve. These () are statements of a desired security state, but they do not, by themselves, actually carry out security activities.
control objectives
are specific measures that fulfill the security objectives of an organization.
Security controls
Security Control Categories
Technical, Operational, and Managerial
enforce confidentiality, integrity, and availability in the digital space. Examples of ()l security controls include firewall rules, access control lists, intrusion prevention systems, and enc
Technical controls
include the processes that we put in place to manage technology in a secure manner. These include user access reviews, log monitoring, and vulnerability management. (Under security controls)
Operational controls
are procedural mechanisms that focus on the mechanics of the risk management process. Examples of administrative controls include periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices. (Under security controls)
Managerial control
intend to stop a security issue before it occurs. Firewalls and encryption are examples of () controls. (CompTIA version of security control types)
Preventive
identify security events that have already occurred. Intrusion detection systems are () controls. (CompTIA version of security control types)
Detective
remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example of a () control. (CompTIA version of security control types)
Corrective
seek to prevent an attacker from attempting to violate security policies. Vicious guard dogs and barbed wire fences are examples of deterrent controls. (CompTIA version of security control types)
Deterrent
are security controls that impact the physical world. Examples of physical security controls include fences, perimeter lighting, locks, fire suppression systems, and burglar alarms. (CompTIA version of security control types)
Physical
are controls designed to mitigate the risk associated with exceptions made to a security policy. (CompTIA version of security control types)
Compensating
three states where data might exist.
data at rest, data in motion and data in processing
is stored data that resides on hard drives, tapes, in the cloud, or on other storage media. This data is prone to pilfering by insiders or external attackers who gain access to systems and are able to browse through their contents.
data at rest
is data that is in transit over a network. When data travels on an untrusted network, it is open to eavesdropping attacks by anyone with access to those networks.
data in motion
is data that is actively in use by a computer system. This includes the data stored in memory while processing takes place. An attacker with control of the system may be able to read the contents of memory and steal sensitive information.
Data in processing
technology uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems.
Encryption
technology uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems.
Data loss prevention (DLP)
DLP systems work in two different environments:
Host-based DLP
Network DLP
This DLP uses software agents installed on systems that search those systems for the presence of sensitive information. These searches often turn up Social Security numbers, credit card numbers, and other sensitive information in the most unlikely places!
Host-based
This DLP systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information. They can then block those transmissions, preventing the unsecured loss of sensitive information.
DLP systems may simply block traffic that violates the organization’s policy, or in some cases, they may automatically apply encryption to the content. This automatic encryption is commonly used with DLP systems that focus on email.
Network-based
DLP systems also have two mechanisms of action:
Pattern matching, where they watch for the telltale signs of sensitive information. For example, if they see a number that is formatted like a credit card or Social Security number, they can automatically trigger on that. Similarly, they may contain a database of sensitive terms, such as “Top Secret” or “Business Confidential,” and trigger when they see those terms in a transmission.
Watermarking, where systems or administrators apply electronic tags to sensitive documents and then the DLP system can monitor systems and networks for unencrypted content containing those tags. Watermarking technology is also commonly used in digital rights management (DRM) solutions that enforce copyright and data ownership restrictions.
techniques seek to reduce risk by reducing the amount of sensitive information that we maintain on a regular basis. The best way to achieve () () is to simply destroy data when it is no longer necessary to meet our original business purpose.
minimization
If we can’t completely remove data from a dataset, we can often transform it into a format where the original sensitive information is (). The () process removes the ability to link data back to an individual, reducing its sensitivity.
de-identified
An alternative to de-identifying data is transforming it into a format where the original information can’t be retrieved.
data obfuscation
replaces sensitive values with a unique identifier using a lookup table. For example, we might replace a widely known value, such as a student ID, with a randomly generated 10-digit number. We’d then maintain a lookup table that allows us to convert those back to student IDs if we need to determine someone’s identity. Of course, if you use this approach, you need to keep the lookup table secure!
tokenization
uses a hash function to transform a value in our dataset to a corresponding hash value. If we apply a strong hash function to a data element, we may replace the value in our file with the hashed value.
hashing
partially redacts sensitive information by replacing some or all sensitive fields with blank characters. For example, we might replace all but the last four digits of a credit card number with X’s or *’s to render the card number unreadable.
Masking
In this attack, the attacker computes the hashes of those candidate values and then checks to see if those hashes exist in our data file.
For example, imagine that we have a file listing all the students at our college who have failed courses but we hash their student IDs. If an attacker has a list of all students, they can compute the hash values of all student IDs and then check to see which hash values are on the list. For this reason, hashing should only be used with caution.
Rainbow Table attack
Chris is responding to a security incident that compromised one of his organization’s web servers. He believes that the attackers defaced one or more pages on the website. What cybersecurity objective did this attack violate?
a- Confidentiality
b- Nonrepudiation
c- Integrity
d- Availability
c- integrity
Tonya is concerned about the risk that an attacker will attempt to gain access to her organization’s database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement?
A-Preventive
B-Detective
C-Corrective
D-Deterrent
D-Deterrent
Greg recently conducted an assessment of his organization’s security controls and discovered a potential gap: the organization does not use full-disk encryption on laptops. What type of control gap exists in this case?
A-Detective
B-Corrective
C-Deterrent
D-Preventive
D-Preventive
Which one of the following data protection techniques is reversible when conducted properly?
A-Tokenization
B-Masking
C-Hashing
D-Shredding
A. Tokenization techniques use a lookup table and are designed to be reversible. Masking and hashing techniques replace the data with values that can’t be reversed back to the original data if performed properly. Shredding, when conducted properly, physically destroys data so that it may not be recovered.
also known as authorized attackers, are those who act with authorization and seek to discover security vulnerabilities with the intent of correcting them. White-hat attackers may either be employees of the organization or contractors hired to engage in penetration testing.
White-hat hackers
also known as unauthorized attackers, are those with malicious intent. They seek to defeat security controls and compromise the confidentiality, integrity, or availability of information and systems for their own, unauthorized, purposes.
Black-hat hackers
also known as semi-authorized attackers, are those who fall somewhere between white- and black-hat hackers. They act without proper authorization, but they do so with the intent of informing their targets of any security vulnerabilities.
Gray-hat hacker
is a derogatory term for people who use hacking techniques but have limited skills. Often such attackers may rely almost entirely on automated tools they download from the Internet. These attackers often have little knowledge of how their attacks actually work, and they are simply seeking out convenient targets of opportunity.
Script Kiddies
use hacking techniques to accomplish some activist goal. They might deface the website of a company whose policies they disagree with. Or a () might attack a network due to some political issue. The defining characteristic of () is that they believe they are motivated by the greater good, even if their activity violates the law.
Hacktivists
do not normally embrace political issues or causes, and they are not trying to demonstrate their skills. In fact, they would often prefer to remain in the shadows, drawing as little attention to themselves as possible. They simply want to generate as much illegal profit as they possibly can.
Organized criminal syndicates
attacks that Mandiant reported are emblematic of nation-state attacks. They tend to be characterized by highly skilled attackers with significant resources. A nation has the labor force, time, and money to finance ongoing, sophisticated attacks.
The motive can be political or economic. In some cases, the attack is done for traditional espionage goals: to gather information about the target’s defense capabilities. In other cases, the attack might be targeting intellectual property or other economic assets.
Advanced Persistent Threats (APTs)
attacks occur when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack against the organization. These attacks are often aimed at disclosing confidential information, but insiders may also seek to alter information or disrupt business processes.
Insiders
attacks are particularly dangerous because they are unknown to product vendors, and therefore, no patches are available to correct them. APT actors who exploit () vulnerabilities are often able to easily compromise their targets.
Zero-Day Attacks
Behavioral assessments are a powerful tool in identifying insider attacks.
Remember
Dedicated employees often seek to achieve their goals and objectives through whatever means allows them to do so. Sometimes, this involves purchasing technology services that aren’t approved by the organization. For example, when file sharing and synchronization services first came on the market, many employees turned to personal Dropbox accounts to sync work content between their business and personal devices. They did not do this with any malicious intent. On the contrary, they were trying to benefit the business by being more productive.
This situation, where individuals and groups seek out their own technology solutions, is a phenomenon known as
Shadow IT
may engage in corporate espionage designed to steal sensitive information from your organization and use it to their own business advantage.
Competitors
Threat actors targeting an organization need some means to gain access to that organization’s information or systems. _______________ are the means that threat actors use to obtain that access.
Threat vectors
Bold attackers may seek to gain ______________ to an organization’s network by physically entering the organization’s facilities. One of the most common ways they do this is by entering public areas of a facility, such as a lobby, customer store, or other easily accessible location and sitting and working on their laptops, which are surreptitiously connected to unsecured network jacks on the wall.
Direct Access
Besides wireless networks and removable media, Cloud services can also be used as an attack vector. Attackers routinely scan popular cloud services for files with improper access controls, systems that have security flaws, or accidentally published API keys and passwords.
Remember this
Sophisticated attackers may attempt to interfere with an organization’s IT supply chain, gaining access to devices at the manufacturer or while the devices are in transit from the manufacturer to the end user. Tampering with a device before the end user receives it allows attackers to insert backdoors that grant them control of the device once the customer installs it on their network. This type of third-party risk is difficult to anticipate and address.
Remember this
Examples of Threat Vectors
Direct access
Wireless
Email
Supply chain
Social media
Removable media
Cloud