Section 1 - Cybersecurity Flashcards
What are 3 Core Security Objectives that focuses on Protecting Systems and Data?
Confidentiality, Integrity, Availability Confidentiality, Risk, Authentication Vulnerability, Exploit, Threat Non-Repudiation, Integrity Access Confidentiality, Risk, Availability
Confidentiality, Integrity, Availability
What is an expected capability of the GRC Function? (Select All that Apply)
Security Ops Compliance and Audit Incident Response Pen Testing Risk Analysis
Compliance and Audit
Risk Analysis
What technology allows computers to communicate with each other?
Endpoints
Servers
Exploitation
Networking
Networking
What threats must a GRC Analyst consider? (Select All that Apply)
Human-Based
Environmental
Natural
Thought
Human-Based
Environmental
Natural
What is the typical motivation for a Hactivist based Threat Actor?
Financial
Espionage
Political/Ideological
Curiosity
Political/Ideological
What is the CIA Triad?
Confidentiality, Risk, Authentication Vulnerability, Exploit, Threat Confidentiality, Integrity, Availability Non-Repudiation, Integrity Access Confidentiality, Risk, Availability
Confidentiality, Integrity, Availability
Only the people who should have access, do have access. No one else. - Is What?
Confidentiality
Data/Systems/Apps are exactly what it should be - Is what?
Integrity
The System is there when you need it - Is what?
Availability
What are the 5 Layers of NIST Framework?
Identify Protect Detect Respond Recover
Weakness in a Person, Process, Technology.
Not all _________ are Exploitable, but they are still Weaknesses.
What is this?
Vulnerability
An attack on a Vulnerability is what?
Exploit
How likely and how bad an Exploited Vulnerability is.
All Exploits are BAD, but some could be Low _____, while others are High.
How bad is the Impact?
You can’t close all the ______, you have to calculate the _______ and prioritize High/Med/Low.
What is this?
Risk
An actively Exploited Vulnerability is?
Incident
Malicious Software, bad guys write the Software, intended to Exploit Vulnerabilities, resulting in an Incident.
What is this?
Malware
3 Key Areas for Protecting/Securing Data/Systems/Info - what are they?
People (Staff, Vendors, Maintenance Workers, Guests interacting with the Business, it’s not just Staff that work at the Company, but anyone interacting with the Company.)
Process (All businesses have Processes that are Executed by People.)
Technology (Systems, Apps, Mobile Devices, Cloud, Interconnections - Client Server, B2B, etc..)
What does the term “Left of Boom” Mean?
Cybersecurity activities that occur before an Incident.
How many Layers are there in the OSI Model?
7
What Two Network Layers are related to TCP/IP?
Network Layer & Transport Layer
What does DNS do?
DNS Translates Domain Names to IP Addresses.
In general, what does a GRC do?
Bolsters defenses, react and handle bad situations.
Limit negative consequences and impact from bad situations.
Can be both Operational and Administrative.
Identify and Protect
Name 5 Key Activities of a GRC?
Compliance and Audit - Are we Compliant, can we Demonstrate?
Security Awareness - Mitigating Risk from People
Assess Risk - Are we at Risk? Should we invest in Security?
Install Governance - Policy, Procedures, Standards
Speak “Security” for the Business
Know the Enemy - 3 Categories of Threats?
Natural - Nature, Earthquakes, Tsunami, Wildfires, Tornados, etc. etc.. that threaten Protected Assets
Environmental - Air Conditioning, Sprinkler Systems, Water Main Breaks, things in the environment that can threaten Protected Assets.
Human Threats - Cyber Criminals, Hackers, etc..
Name 5 Categories of Human Threats?
APT - Advanced Persistent Threats: Well-Funded, Targeted/Tailored Attacks, Nation States, lots of Resources, Experts.
Cyber Criminals - Financial Motivations, Ransomware, Malware, attack Supply Chains, Dark Web Hosting Services. N-Day, they exploit 0-Day Vulnerabilities. Persistent Attacks.
Hacktivists - Political/Ideological Motivations, Denial of Service, Disclosure/Revelation Leaks.
Script Kiddies - Financial, Revenge, Curiosity Motivated. Point and Click, Automated Attacks.
Insider Threats - Financial, can be Good Intentioned, Curiosity. Access and Collection of Data, Exploit of Interconnected Systems. Detailed Understanding of Business Opts. Social Engineering Attacks.