Security Concepts Flashcards
1
Q
CIA Triad
A
Confidentiality: Certain information only known by certain people
Integrity: Data is stored and transferred was intended without modification
Availabilty: Information is accessible to those authorized to access it
2
Q
Vulnerability
A
- Weakness that could be accidentally triggered or intentionally exploited to cause security breach
3
Q
Threat
A
- Potential for vulnerability to be exploited and security breached
- Intentional or unintentional
- Thing posing threat is threat actor or agent
- Pather or tool used is attack vector
4
Q
Risk
A
Likelihood and impace of threat actor exercising vulnerability
5
Q
Risk Management
A
- Process for identifying, assessing and mitigating vulnerabilities and threats.
- ERM: Enterprise Risk Managment policies based on published frameworks
6
Q
Security Controls
A
- Procedures, activities and tools designed to give a system or data asset the CIA properties
- Aim is to mitigate risk factors to affordable level
7
Q
Risk Posture
A
- Overall status of risk management
- Shows which risk response options can be identified and prioritized
8
Q
Posture Assessment
A
- Used ot assess organizations maturity level in its use of security policies and contols
9
Q
MEF
A
Mission Essential Function
- Function org must be able to perform as close to continually as possible
- If there is disruption, must be restored with priority
10
Q
BIA
A
Business Impact Analysis
- Process of assessing what losses might occur from a range of threat scenarios
- Gives context for making decisions on what security controls are worth investment
11
Q
Exploit
A
- Specific code or method of using vulnerability to gain control of or damage system
12
Q
Zero-Day
A
- Vulnerability that is exploited before it is patched or known
- Can be extremely destructive
13
Q
Vulnerability Assessment
A
- Evaluation of a system’s security and ability to meet compliance requirements based on configuration state of the system.
- How close it is to ideal configuration.
14
Q
CVE
A
Common Vulnerabilities and Exposures
- Dictionary of vulnerabilities that is published
15
Q
TTP
A
Tactics, Techniques and Procedures of threat actors