Section 1: Overview of Security Flashcards
CIA Triad
Confidentiality, Integrity, Availability
What is Confidentiality
Information has not been disclosed to unauthorised people
Information is only disclosed to authorised people
What is Integrity
Information has not been modified or altered without proper authorisation
What is availability
Information is able to be stored, accessed, or protected at all times
What are the AAA of Security
Authentication, Authorisation, Accounting
What is Authentication in AAA
Something you
- have
- are
- know
- do
- somewhere you are.
Think HAKDA
What is Authorisation in AAA
When a user is given access to a certain piece of data or certain areas of a building
What is Accounting in AAA
Tracking of data, computer usage, and network resources.
In case of data breach or an insider threat, you can go back and look at all the data in the log files to figure out who did what and when.
Non-repudiation
When you have proof that someone did something.
Sending an email to someone is signed with a digital signature, you are the only person in the world with that signature. That’s proof that you indeed sent that email.
Information Systems Security
The security of the systems that hold and process critical data
Information Security
Act of protecting data and information from unauthorised access, unlawful modification and disruption, disclosure, corruption, and destruction.
Malware
Short-hand term for malicious software
When does Unauthorised Access occur?
Occurs when access to computer resources and data happens without the consent of the owner
System Failure
When a computer crashes or an individual application fails (Blue Screen of Death / BSOD)
Social Engineering
Act of manipulating users into revealing confidential information or performing other detrimental actions (could be through email phishing or pretending to be someone you are not (i.e delivery person to gain access to premises)
What are the 3 controlls of Mitigating Threats?
- Physical Controls
- Technical Controls
- Administrative (or Managerial) Controls
What are Physical Controls?
Alarm systems, locks, surveillance cameras, identification cards, and security guards
What are Technical Controls?
Smart cards, encryption, access control lists (ACL’s) intrusion detection systems, and network authentication
What are Administrative Controls?
Policies, procedures, security awareness training, contingency planning, and disaster recovery plans
Most cost effective security control?
User Training!
What are the 5 types of Hackers?
- White Hats
- Gray Hats
- Black Hats
- Blue Hats
- Elite Hats
White Hats
Non-malicious hackers who attempt to break into a company’s system at their request
- Ethical Hackers / Pen testers
- They use open source tools
Gray Hats
Hackers without any affiliation to a company. They attempt to break into a company’s network and risk breaking the law
Difference between Black & Gray hats?
Black hats:
- have malicious intent
Grey hats:
- Just want to see if they can break into a company, don’t necessarily want to cause harm (still breaking the law)
- They some times break into a company and then inform them that “hey, this is how we did it, you need to patch it”
Black Hats
Malicious hackers who break into a computer systems and networks without authorisation or permission
Blue Hats
Hackers who attempt to hack into a network with permission of the company but are not employed by the company.
- Freelance ethical hackers / pen testers
- Could be doing this as part of bug bounty program (hackerone)
Elite Hats
Hackers who find and exploit vulnerabilities before anyone else does.
- create their own tools
- do their own programming
- develop tools that everyone else ends up using
- Can have 2 categories:
- Black Hat Elite Hackers
- White Hat Elite Hackers
Script Kiddies
Limited skill and only run other peoples exploits and tools
Organised Crime
Hackers who are part of a crime group that is well-funded and highly sophisticated
- well funded
- highly sophisticated
Hacktivists
Hackers who are driven by a cause like social change, political agendas, terrorism
Advanced Persistent Threats (APT)
Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal
- Russia trying to hack US elections
- China trying to hack into US companies to steal their intellectual properties