Section 2: Cybersecurity Concepts Flashcards
The following are generally the approaches to implementing cybersecurity except:
a. Compliance-based
b. Risk-based
c. Ad hoc
d. Periodic
d. Periodic
In reality, most organizations with mature security programs use a combination of risk-based and compliance-based approaches.
Also known as standards-based security approach.
Compliance-based approach to implementing cybersecurity
This approach relies on regulations or standards to determine security implementations.
Compliance-based approach to implementing cybersecurity
This approach implements controls regardless of applicability or necessity and often leads to a “checklist” attitude toward security.
Compliance-based approach to implementing cybersecurity
This approach relies on identifying the unique risk the organization faces and designing and implementing security controls to address that risk.
Risk-based approach to implementing cybersecurity
This approach simply implements security with no particular rationale or criteria.
Ad-hoc approach to implementing cybersecurity
The combination of the probability of an event and its consequence.
Risk
Anything that is capable of acting against an asset in a manner that can result in harm.
Threat
A potential cause of an unwanted incident.
Threat (as defined by ISO/IEC 13335)
The actual process or agent attempting to cause harm.
Threat source
The result or outcome of a threat agent’s malicious activity.
Threat event
Something of either tangible or intangible value that is worth protecting, including people, information, infrastructure, finances and reputation.
Asset
A weakness in the design, implementation, operation or internal control of a process that could expose the system to adverse threats from threat events.
Vulnerability
The remaining risk after management has implemented a risk response.
Residual risk
The risk level or exposure without taking into account the actions that management has taken or might take.
Inherent risk
When assessing a threat, cybersecurity professionals often analyze the threat’s _____ and _____ in order to rank and prioritize it among other existing threats.
Likelihood and impact
To measure risk, the following criteria is considered except:
a. Risk tolerance
b. Size and scope of environment in question
c. Amount of data available
d. System tools used
d. System tools used is not one of the criteria in measuring risk.
A threat agent that is known to breach security boundaries and perform malicious acts to gain a competitive advantage.
Corporations
A threat agent that often targets government and private entities with a high level of sophistication to obtain intelligence or carry out other destructive activities.
Nation states
A threat agent that often acts independently and targets specific individuals or organizations to achieve various ideological ends
Hacktivist
A threat agent characterized by their willingness to use violence to achieve their goals and frequently target critical infrastructures and government groups
Cyberterrorists
A threat agent that is motivated by the desire for profit and involved in fraudulent financial transactions
Cybercriminals
A threat agent that is often likened to hacktivists
Cyberwarriors
A threat agent that is also referred to as cyberfighters
Cyberwarriors
A threat agent that are usually nationally motivated citizens who may act on behalf of a political party or against another political party that threatens them
Cyberwarriors
Young individuals who are learning how to hack
Script kiddies
A threat agent that is skilled in social engineering and is frequently involved in cyberbullying, identity theft, and collection of other confidential information or credentials.
Online social hackers
A threat agent that typically have fairly low-tech methods and tools
Employees
The actual occurrence of a threat
Attack
The activity by a threat agent (or adversary) against an asset
Attack
The path or route used to gain access to the target (asset)
Attack vector
What are the two types of attack vectors?
- Ingress (or intrusion)
2. Egress (or data exfiltration)