Security for Software and Data Flashcards
What is the NCSC?
Threat intelligence is the accumulation of data that is analysed and refined to help against cyber threats. They are usually the threats or risks that could pose a problem, sometimes including the threat actors (see section 4 for definition) if it helps
What 4 Types of intelligence does the NCSC Group?
Tactical – different types of methods and tools used by attackers
Technical – details of the malware used in an attack
Operational – general details of an attack that can be used to combat future attacks
Strategic – changes in threats and risks as the environment is always dynamic with security and attackers adapting
What is Polyinstantiation?
the process used to prevent unauthorised access from users attempting determine changes made in databases. Records are stored using the same key
What does Polyinstantiation protect against?
interference attacks - an attack on databases that works by datamining confidential information which is like database aggregation. Both techniques use some form of SQL query to request information from the database.
What does CWE stand for?
Common Weakness Enumeration