Section 2 Flashcards
Explain the difference between a vulnerability and a threat
a vulnerability is something that a threat can exploit, while a threat is something that can cause damage
What is “security”
means protecting your assets, whether from attackers invading your networks, natural disasters, vandalism, loss, or misuse
What are logical assets
assets that exist as data or intellectual property
What is information security
protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
What happens when you increase the level of security
you usually decrease the level of productivity
What usually determines the level of security something has
how it relates to the value of the item being secured. The cost of the security you put in place should never outstrip the value of what it’s protecting
What are some examples of when you would not be secure
Not applying security patches or application updates to your systems
Using weak passwords
Downloading programs from the internet
Opening email attachments from unknown senders
Using wireless networks without encryption
What does confidentiality in the CIA triad mean
refers to our ability to protect our data from those who are not authorized to view it.
What does integrity in the CIA triad mean
the ability to prevent people from changing your data in an unauthorized or undesirable manner but also reversing unwanted authorized changes
What does availability in the CIA triad mean
refers to the ability to access our data when we need it
What is the Parkerian Hexad model
a more complex model that includes the components of the CIA triad but also possession, authenticity, and utility
What does possession (control) refer to in the Parkerian Hexad model
to the physical disposition of the media on which the data is stored
What does authenticity refer to in the Parkerian Hexad model
allows you to say whether you’ve attributed the data in question to the proper owner or creator
What does utility refer to in the Parkerian Hexad model
how useful the data is to you
What are the 4 categories of types of attacks
interception, interruption, modification, and fabrication
What type of attack affects confidentiality in the CIA triad
interception
What type of attack affects integrity in the CIA triad
interruption, modification, and fabrication
What type of attack affects availability in the CIA triad
interruption, modification, and fabrication
What is an interception attack
allow unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality
What is an interception attack
allow unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality. can be conducted against data at rest or in motion
What is an interruption attack
make your assets unusable or unavailable to you on a temporary or permanent basis
What is an interruption attack
make your assets unusable or unavailable to you on a temporary or permanent basis. mostly affect availability but can affect integrity as well
What is a modification attack
involves tampering with an asset or altering data. mostly attacks on integrity but also availability
What is a fabrication attack
involve generating data, processes, communications, or other similar material with a system. primarily affect integrity but could affect availability
What is a “threat”
something that has the potential to cause harm
What are “vulnerabilities”
weaknesses, or holes, that threats can exploit to cause harm
What is “risk”
the likelihood that something bad will happen
What is “impact”
takes into account the value of the asset being threatened and uses it to calculate risk
What are the steps of risk management
identify assets, identify threats, assess vulnerabilities, assess risks, mitigate risks
What are “controls”
putting measures into place to mitigate risk
What are “controls” and what are the different types
putting measures into place to mitigate risk. physical, logical, and administrative
What are physical controls
protect the physical environment in which your systems sit, or where you data is stored
What are logical controls
sometimes called technical controls, protect the systems, networks, and environments that process, transmit, and store data
What are administrative controls
based on rules, laws, policies, procedures, guidelines, and other items that are “paper” in nature
What does the incident response process consist of
preparation, detection and analysis, containment, eradication, recovery, and post incident activity
What is the preparation phase in the incident response process
consists of all the activities you can perform ahead of time to better handle an incident.