Security Concepts Flashcards
CIA Triad
Confidentiality: Certain information only known by certain people
Integrity: Data is stored and transferred was intended without modification
Availabilty: Information is accessible to those authorized to access it
Vulnerability
- Weakness that could be accidentally triggered or intentionally exploited to cause security breach
Threat
- Potential for vulnerability to be exploited and security breached
- Intentional or unintentional
- Thing posing threat is threat actor or agent
- Pather or tool used is attack vector
Risk
Likelihood and impace of threat actor exercising vulnerability
Risk Management
- Process for identifying, assessing and mitigating vulnerabilities and threats.
- ERM: Enterprise Risk Managment policies based on published frameworks
Security Controls
- Procedures, activities and tools designed to give a system or data asset the CIA properties
- Aim is to mitigate risk factors to affordable level
Risk Posture
- Overall status of risk management
- Shows which risk response options can be identified and prioritized
Posture Assessment
- Used ot assess organizations maturity level in its use of security policies and contols
MEF
Mission Essential Function
- Function org must be able to perform as close to continually as possible
- If there is disruption, must be restored with priority
BIA
Business Impact Analysis
- Process of assessing what losses might occur from a range of threat scenarios
- Gives context for making decisions on what security controls are worth investment
Exploit
- Specific code or method of using vulnerability to gain control of or damage system
Zero-Day
- Vulnerability that is exploited before it is patched or known
- Can be extremely destructive
Vulnerability Assessment
- Evaluation of a system’s security and ability to meet compliance requirements based on configuration state of the system.
- How close it is to ideal configuration.
CVE
Common Vulnerabilities and Exposures
- Dictionary of vulnerabilities that is published
TTP
Tactics, Techniques and Procedures of threat actors
Behavioral threat research
- Narrative commentary describing examples of attacks and TTPs
Reputational threat intelligence
- Lists of IP addresses and domains associated with malicious behavior
- signature of file based malware
Threat Data
- Computer data that can correlate events observed on customers own networks and logs with known TTP indicators
SIEM
Security Information and Event Management
- Security Control designed to integrate assessment efforts with automated collection and analysis
- Links events or data points to indicators of risk or compromise
- Can drive an alert system based on findings
Penetration Testing
- Authorized hacking techniques to discover exploitable weaknesses
- Active test of security controls
Vendor Management
- Process of selecting supplier companies and evaluating risks inherent in relying on third party products or services.
- Risk cannot be fully transferred to vendors
ACL
Access Control List
- List of subjects and rights or permissions they have access to
Local Authentication provider
Software architecture and code that underpins the mechanism by which the user is authenticated before starting a shell.
- Microsoft or Linux sign in
Hash
- Function that converts any string to a unique, fixed-length code
- Cannot be converted back to plaintext string
- Passwords are stored in the credential database as hash
- One-way cryptographic function