Session 01 : Intro to IS Flashcards
Elements of Information Security?
- Confidentiality : authorized to have access
- Integrity : trustworthiness of Data of resources
- Availability : available when required
- Authenticity : quality of being genuine
- Non-Repudiation : Guarantee or Assurance
What are Information Security Threats?
Potential events circumstances that can cause harm to an organziation information system.
Types of Cyber Security Threats?
- Malware attacks
- Phishing
- DOS attack
- Insider threats
- APTs (Advanced Presistent Threats)
an intruder gains access to a network and remains undetected for an extended period to steal data or distrupt operations.
What are vulnerabilities?
Weaknesses or flaws in a system whether in software, hardware, or organizational processes that can be exploited by attackers to compromise security.
Common Cybersecurity Vulnerabilities?
- Outdated SW
- Weak Credentials
- Misconfigurations
- Zero-Day Vulnerabilities
- Poor Input Sanitization
- Unsecured APIs
3 primary conditions must be existing for a successful attack?
Attack = Motive(goal) + Method + Vulnerability
Classification of attacks?
- Passive Attacks
- Active Attacks
- Close-in Attacks
- Insider Attacks
- Distribution Attacks
Information Security Risk Management?
The process of identifying, assessing, and managing risks that could threaten an organization’s information assets.
IS Risk Management Phases?
- Risk identification
- Risk assessment
- Risk treatment
- Risk monitoring and review
Methodologies for IS risk management?
- ISO/IEC 27001
- NIST SP 800-30