SYO 701 - Jason Dion Flashcards
Information Security
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction.
*Securing the Data, not the Systems
Information Systems Security
Act of protecting the system that hold and process the critical data
CIA Triad
Confidentiality - ensures that information is only accessible to those with the appropriate authorization.
Integrity - ensured that data remains accurate and unaltered unless modification is required.
Availability - ensures that information and resources are accessible and functional when needed by authorized users
Non Repudiation
Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved
AAA of Security
Authentication - Process of verifying the identity of a user or system
Authorization - defines what actions or resources a User can access
Accounting - act of tracking user activities and resource usage, typically for audit or billing purposes
Security Controls
Technical -
Managerial (Administrative) -
Operational -
Physical -
Zero Trust
New Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.
Vulnerability
Any weakness in the system design or implementation
Risk Management
Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes
Confidentiality
Refers to the protection of information from unauthorized access and disclosure
- Protect personal privacy
- Maintain a business advantage
- Achieve regulatory compliance
Encryption
Process of converting data into code to prevent unauthorized access. Data is scrambled, aka Cypher Text, and can only be viewed using the correct decryption key.
Access Controls
Ensure only authorized personal can access certain types of data
Data Masking
Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data authenticity and use for authorized users
Physical Security Measures
Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.
Training and Awareness
Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data
Integrity
Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual. Verifies the accuracy and trustworthiness of data over the entire lifecycle.
*Ensure Data Accuracy
*Maintain Trust
*Ensure System Operability
In order to maintain Integrity, we utilize the following:
1 - Hashing
2 - Digital Signatures
3 - Checksums
4 - Access Controls
5 - Regular Audits
Hashing
The process of converting data into a fixed-size value
*Hash Digest
Digital Signatures
Use Encryption to ensure integrity and authenticity
*Hash > Hash Digest > Encrypted with Private Key > Digital Signature
Checksums
Method to verify the integrity of data during transmission
Access Controls
Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.
Regular Audits
Involve reviewing logs and operations to ensure that only authorized changes havce been made and any discrepancies are addressed.
Authentication
Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
*Something you know (Username/ PW)
*Something you have (VPN token)
*Something you are (Bio-metric)
*Something you do
*Somewhere you are (geographic location)
2FA - Two Factor Authentication
MFA - Multifactor Authentication
Authorization
Permissions and privileges granted to Users or Entities after they have been Authenticated
Zero Trust
“Trust nothing and verify everything”
Demands Verification for every device, user, and transaction within the Network, regardless of its origin.
Cybersecurity approach that assumes no User or system is trusted by default and requires continuous verification for access to organizational resources
Threat Actor Motivation
Data Exfiltration
Blackmail
Philosophical / Political beliefs
Ethical Reasons
Espionage
Revenge
Service Disruption
Disruption or Chaos
Financial Gain
War
Threat Actor Attributes
Internal vs External
Resources and Funding
Level of Sophistication & Capability
Script Kiddie
An Unskilled Attacker. An individual who lacks the technical knowledge to develop their own hacking tools or exploits.
*Fueled by Recognition or Thrill of causing Disruption
*Low level skills
Hacktivists
Individuals or groups that use their technical skills to promote a cause (ideologies) or drive Social (political) Change instead of for personal gain
*website defacement (electronic graffiti)
*DDOS attacks
*Doxing (release of private information to Public)
*Leak sensitive data
Organized Crime
Sophisticated and well-structured entities that leverage resources and technical skills for illicit gains
*Operates within political sector
*Hired by Gov entities to conduct attacks on their behalf
*generate financial gains for their group
Nation State Actors
Groups that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals. Highly sophisticated and capable.
*creating custom malware
*using Zero-day exploits
*becoming advanced persistent threat (long term persistence and stealth)
*funded by Gov
*motivated by long term strategic goals
Insider Threats
Cybersecurity threats that originate from within the Organization
*Data Theft
*Sabotage
*Misuse of access privileges
*Financial Gain
*Revenge
Shadow IT
Use of Information Technology systems, devices, software, applications, and services without explicit organizational approval. When the security posture of an Org is too restrictive.
*Use of personal Devices for Work Purposes
*Installation of Unapproved Software
*Use of Cloud Services that have not been approved by the Org
Threat Vector
The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.
*The “How” of an Attack
*Messages - Email, SMS, Text
*Images - embedded malicious code
*Files - malicious files hosted on malicious sites
*Voice Calls - aka Vishing
*Removable Devices - threats delivered via USB drives
*Unsecure Networks - Wireless/ Wired/ BT (Evil Twin / Rogue Access Points)
Attack Surface
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment
*The “Where” of an Attack
*Restricting Access
*Removing Unnecessary Software
*Disabling Unused Protocols
Deceptive & Disruptive Technologies
Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.