SYO 701 - Andrew Flashcards

1
Q

Confidentiality

A

The measure taken to ensure that sensitive information is not disclosed to unauthorized individuals, entities, or processes.

Access Controls: use of Passwords, Bio-metric Verification, access cards.

Encryption: process of encoding information in such a way that only authorized parties can read it. Encryption Key is needed to decrypt and read information.

Secure Communications: Using Secure Protocols like SSL/ TLS for transmitting data to prevent interception by unauthorized entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Protecting data from unauthorized changes to ensure that it is reliable and correct. Refers to Trustworthiness and accuracy of data.

*Data Accuracy
*Data Consistency
*Data Trustworthiness

Methods used:
*Cryptographic Hash Functions
*Digital Signatures
*Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Refers to ensuring that Data, Systems, and Services are accessible to authorized users when needed

The How:
*Fault Tolerance - building systems that can continue operating properly even if some of their components fail
*Backup Systems - regularly backing up data and systems to enable recovery in case of data loss or corruption

The goal is to prevent service disruptions due to system failures, infrastructure problems, or malicious attacks like DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAD Triade

A

Opposite of the CIA:

1 - Disclosure - Refers to the unauthorized access and exposure of information
2 - Alteration - Loss of Integrity, where unauthorized changes are made to Data
3 - Denial - Direct attack to Availability. Involves attacks that will take data or systems offline resulting in no access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero Trust

A

Centers on the belief that Organizations should not automatically trust anything inside or outside their perimeter and instead must verify anything and everything trying to connect to its systems before granting access.

*Strict Identity verification
*Least Privilege Access
*Multi-Factor Authentication (MFA)
*Monitor and Log all Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Process of verifying the identity of a User, device, or other entity in a computer system. A prerequisite to granting access to resources in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non Repudiation

A

Ensures that a party in a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.

*can be implemented using digital signature
*digital signature binds a person to the digital data they send

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Once a User is Authenticated, the Authorization process determines what that user is permitted to do by matching user or system credentials against an access control list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accounting

A

(Also referred to as Auditing) is ensured by keeping a track of activities. Involves logging and monitoring of User actions.

How:
Activity Tracking - involves collecting data on user activities, such as Login times, duration of sessions, accessed resources, network services used, system changes made, and data transferred (stored in System Log).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accountability

A

Principle that ensures individuals or entities are held responsible for their actions within a system

Prerequisites:
Identification, Authentication, Authorization, Accounting > Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Control Categories - Technical

A

Technical Controls - (aka Logical Security Controls) are mechanisms implemented in hardware, software, or firmware that automate the process of preventing, detecting, and responding to security threats.

*Access Controls Mechanisms
*Firewalls
*IDS/ IPS
*Encryption
*Antivirus & Anti-malware Software
*Virtual Private Networks (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Gap Analysis

A

An assessment that company’s use to compare their current security posture with a set of standards, best practices, or regulatory requirements to identify areas that need improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Control Categories - Managerial (Administrative)

A

Policies, Procedures, and guidelines that govern the behavior of people within an Organization and the operation of IT systems

*Security Policies/ Procedures
*Risk Management
*Incident Response and Recovery Plans
*Business Continuity and Disaster Recovery Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Control Categories - Operational

A

Day to Day methods and procedures that are implemented by an organization to ensure and maintain the security of its information and assets.

Performed by People:
*Security Awareness training
*Physical Media Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control Categories - Physical

A

Measure taken to protect the actual Hardware and Facilities that house the systems, Networks, and Data.

*Lighting
*Signs
*Fences
*Security Guards
*Cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Control Types

A

Preventative - attempts to stop a security incident from occurring. Firewalls, IPS, Encryption, ACLs

Detective - attempts to detect events that resulted in a security incident. IDS, SIEM, Video Surveillance, Motion Detection

Corrective - attempts to remediate an incident that has occurred. UPS, Restoring Backups, Incident Response procedures.

Deterrent - attempts to discourage a threat. Guard Dogs, Cameras, Barbed Wire

Directive - provides direction on how to systems. Policies / Procedures. Instructional “manuals”

Compensating - provides alternate controls when the Primary control may not be sufficient. Segregation of Duties.

16
Q

Defense in Depth

A

Layered Security. Information assurance concept where MULTIPLE LAYERS of security controls (defense mechanisms) are placed throughout an I.T. systems.

Data > Firewall > Procedures/ Policies > Physical Protection

17
Q

Threat Motivations

A

1 - Data Exfiltration: Stealing data from a Target, often for selling or leverage
2 - Espionage: Spying on entities to gather sensitive information, common with Nation States
3 - Service Disruption: Disabling or disturbing a service, often seen with hacktivists protesting against specific services or companies
4 - Blackmail: Threatening to release sensitive data unless a demand (usually monetary) is met.
5 - Financial gain: stealing data or directly siphoning money, a common motivation for organized crime
6 - Philosophical / Political beliefs: Acting based on personal or group beliefs, commonly seen with Hacktivist
7 - Ethical: Acting on perceived ethical obligations, sometimes seen with whistleblowers or “white hat” hackers identifying vulnerabilities
8 - Revenge: Targeting en entity out of vengeance for a perceived wrong
9 - Disruption/ Chaos: Motivated purely by the desire to create disorder, sometimes without specific political or financial goals
10 War: Cyber-operations that are a component of larger warfare, typically driven by Nation-States

18
Q

Threat Actors

A

Nation State
Unskilled attacker
Hacktivist
Insider Threat
Organized Crime
Shadow IT

19
Q

Attributes of Actors

A

Internal/ External: whether or not the threat actor originates from within or outside of the Organization

Resources/ Funding: The amount of money and resources available to the threat actor.

Level of Sophistication / Capability: The technical skill level of the threat actor. Nation states and organized crime have high sophistication

20
Q

Nation State

A

A country’s Government which can engage in or sponsor cyber activities. Well funded and sophisticated.

*espionage
*Cyber warfare
*political / economic/ military advantage

21
Q

Hacktivist

A

Someone who uses hacking techniques and digital tools to promote a political agenda, social change, or ideological beliefs.

22
Q

Shadow I.T.

A

Refers to information technology systems and solutions
built and used inside organizations without explicit
organizational approval.

23
Q

Vulnerabilities

A

A weakness or a “hole in our system” that can be exploited by a threat actor or Hacker to gain unauthorized access to or perform unauthorized actions on a computer system.

24
Q

Memory Injection

A

Inserting malicious code into a program’s memory.

25
Q

Race Conditions

A

Vulnerability that occurs when the timing of actions affects a systems state and outcome.

TOCTOU - Time of Check to Time of Use

*Code applications correctly
*Follow good secure Programming practices

26
Q

SQL Injections

A

SQL - Structured Query (ask questions) Language. Used to talk with Database.

Front End - User Interface (Web page)
Back End - Database holds all information (SQL).