Security for Software and Data Flashcards

1
Q

What is the NCSC?

A

Threat intelligence is the accumulation of data that is analysed and refined to help against cyber threats. They are usually the threats or risks that could pose a problem, sometimes including the threat actors (see section 4 for definition) if it helps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 4 Types of intelligence does the NCSC Group?

A

Tactical – different types of methods and tools used by attackers

Technical – details of the malware used in an attack
Operational – general details of an attack that can be used to combat future attacks

Strategic – changes in threats and risks as the environment is always dynamic with security and attackers adapting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Polyinstantiation?

A

the process used to prevent unauthorised access from users attempting determine changes made in databases. Records are stored using the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Polyinstantiation protect against?

A

interference attacks - an attack on databases that works by datamining confidential information which is like database aggregation. Both techniques use some form of SQL query to request information from the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does CWE stand for?

A

Common Weakness Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly