Section 1 : Overview Of Security Flashcards

1
Q

Information Security :

A

Protecting data info from unauthorized access, unlawful modification, corruption, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information systems security

A

Protecting the systems that holds and processes data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do the three A’s stand for in “AAA of security”?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

Persons identity established with proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

Person is given access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accounting

A

Tracking of data, computer usage, network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does “CIA” triad stand for?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non-repudiation

A

When a user cannot deny if the other persons has a proof of a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

A

“Malicious software”
Ex : viruses, worms, spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unauthorized access

A

Occurs when access to computer resources and data happens without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System failure

A

When a computer / app crashes or fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social engineering

A

Act of manipulating users into revealing confidential info or preforming other detrimental actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 3 types of mitigating threats?

A

Physical
Technical
Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

White hats

A

Non malicious
Attempt to break in at their request
Usually works for the company/ do as a service
Usually ethical hacker / penetration hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Black hats

A

Malicious
Break into systems without permission
“Bad guys”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gray hats

A

No affiliation with company
Still breaking the law
Not malicious
Can help patch vulnerabilities

17
Q

Blue hats

A

Attempt to hack with premission of the company
Not employed by company
“Freelance ethical hacker”

18
Q

Elite

A

Finds & exploits vulnerabilities first
Creates own rooms
Can be white/black hat
1 in 10,000 are elite

19
Q

Script kiddies

A

Limited skill
“Baby hackers”
Only runs others exploits and tools

20
Q

Hacktivists

A

Driven by a cause, social change, political agendas, terroism

21
Q

Organized crime

A

Hackers who are part of a crime group
Well funded
Sophisticated

22
Q

Advanced persistent threats (APT)

A

Highly trained
Often by nation states
Quiet and sneaky

23
Q

What are 4 sources you must consider when thinking about threat intelligence?

A

Timeliness
Relevancy
Accuracy
Confidence

24
Q

Where can you find info on the sources of threat intelligence?

A

Proprietary - commercial service offering
Closed source
Open source

25
Q

Implicit knowledge

A

Only from experienced practioners in the field
Based on experience