Section 1 : Overview Of Security Flashcards
Information Security :
Protecting data info from unauthorized access, unlawful modification, corruption, and destruction
Information systems security
Protecting the systems that holds and processes data
What do the three A’s stand for in “AAA of security”?
Authentication
Authorization
Accounting
Authentication
Persons identity established with proof
Authorization
Person is given access
Accounting
Tracking of data, computer usage, network resources
What does “CIA” triad stand for?
Confidentiality
Integrity
Availability
Non-repudiation
When a user cannot deny if the other persons has a proof of a breach
Malware
“Malicious software”
Ex : viruses, worms, spyware
Unauthorized access
Occurs when access to computer resources and data happens without consent
System failure
When a computer / app crashes or fails
Social engineering
Act of manipulating users into revealing confidential info or preforming other detrimental actions
What are 3 types of mitigating threats?
Physical
Technical
Administrative
White hats
Non malicious
Attempt to break in at their request
Usually works for the company/ do as a service
Usually ethical hacker / penetration hacker
Black hats
Malicious
Break into systems without permission
“Bad guys”
Gray hats
No affiliation with company
Still breaking the law
Not malicious
Can help patch vulnerabilities
Blue hats
Attempt to hack with premission of the company
Not employed by company
“Freelance ethical hacker”
Elite
Finds & exploits vulnerabilities first
Creates own rooms
Can be white/black hat
1 in 10,000 are elite
Script kiddies
Limited skill
“Baby hackers”
Only runs others exploits and tools
Hacktivists
Driven by a cause, social change, political agendas, terroism
Organized crime
Hackers who are part of a crime group
Well funded
Sophisticated
Advanced persistent threats (APT)
Highly trained
Often by nation states
Quiet and sneaky
What are 4 sources you must consider when thinking about threat intelligence?
Timeliness
Relevancy
Accuracy
Confidence
Where can you find info on the sources of threat intelligence?
Proprietary - commercial service offering
Closed source
Open source