SYO 701 - Jason Dion Flashcards

1
Q

Information Security

A

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction.

*Securing the Data, not the Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems Security

A

Act of protecting the system that hold and process the critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

Confidentiality - ensures that information is only accessible to those with the appropriate authorization.

Integrity - ensured that data remains accurate and unaltered unless modification is required.

Availability - ensures that information and resources are accessible and functional when needed by authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non Repudiation

A

Guaranteeing that a specific action or event has taken place and cannot be denied by the parties involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA of Security

A

Authentication - Process of verifying the identity of a user or system

Authorization - defines what actions or resources a User can access

Accounting - act of tracking user activities and resource usage, typically for audit or billing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Controls

A

Technical -

Managerial (Administrative) -

Operational -

Physical -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zero Trust

A

New Security model that operates on the principle that no one, whether inside or outside the organization, should be trusted by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability

A

Any weakness in the system design or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Management

A

Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Refers to the protection of information from unauthorized access and disclosure

  • Protect personal privacy
  • Maintain a business advantage
  • Achieve regulatory compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption

A

Process of converting data into code to prevent unauthorized access. Data is scrambled, aka Cypher Text, and can only be viewed using the correct decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Controls

A

Ensure only authorized personal can access certain types of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Masking

A

Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data authenticity and use for authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical Security Measures

A

Used to ensure confidentiality for physical types of data and for digital information contained on servers and workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Training and Awareness

A

Conducting regular training on the security awareness best practices that employees can use to protect the organization’s sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity

A

Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual. Verifies the accuracy and trustworthiness of data over the entire lifecycle.

*Ensure Data Accuracy
*Maintain Trust
*Ensure System Operability

In order to maintain Integrity, we utilize the following:
1 - Hashing
2 - Digital Signatures
3 - Checksums
4 - Access Controls
5 - Regular Audits

17
Q

Hashing

A

The process of converting data into a fixed-size value

*Hash Digest

18
Q

Digital Signatures

A

Use Encryption to ensure integrity and authenticity

*Hash > Hash Digest > Encrypted with Private Key > Digital Signature

19
Q

Checksums

A

Method to verify the integrity of data during transmission

20
Q

Access Controls

A

Ensure that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations.

21
Q

Regular Audits

A

Involve reviewing logs and operations to ensure that only authorized changes havce been made and any discrepancies are addressed.

22
Q

Authentication

A

Security measure that ensures individuals or entities are who they claim to be during a communication or transaction

*Something you know (Username/ PW)
*Something you have (VPN token)
*Something you are (Bio-metric)
*Something you do
*Somewhere you are (geographic location)

2FA - Two Factor Authentication

MFA - Multifactor Authentication

23
Q

Authorization

A

Permissions and privileges granted to Users or Entities after they have been Authenticated

24
Q

Zero Trust

A

“Trust nothing and verify everything”

Demands Verification for every device, user, and transaction within the Network, regardless of its origin.

Cybersecurity approach that assumes no User or system is trusted by default and requires continuous verification for access to organizational resources

25
Q

Threat Actor Motivation

A

Data Exfiltration
Blackmail
Philosophical / Political beliefs
Ethical Reasons
Espionage
Revenge
Service Disruption
Disruption or Chaos
Financial Gain
War

26
Q

Threat Actor Attributes

A

Internal vs External
Resources and Funding
Level of Sophistication & Capability

27
Q

Script Kiddie

A

An Unskilled Attacker. An individual who lacks the technical knowledge to develop their own hacking tools or exploits.

*Fueled by Recognition or Thrill of causing Disruption
*Low level skills

28
Q

Hacktivists

A

Individuals or groups that use their technical skills to promote a cause (ideologies) or drive Social (political) Change instead of for personal gain

*website defacement (electronic graffiti)
*DDOS attacks
*Doxing (release of private information to Public)
*Leak sensitive data

29
Q

Organized Crime

A

Sophisticated and well-structured entities that leverage resources and technical skills for illicit gains

*Operates within political sector
*Hired by Gov entities to conduct attacks on their behalf
*generate financial gains for their group

30
Q

Nation State Actors

A

Groups that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals. Highly sophisticated and capable.

*creating custom malware
*using Zero-day exploits
*becoming advanced persistent threat (long term persistence and stealth)
*funded by Gov
*motivated by long term strategic goals

31
Q

Insider Threats

A

Cybersecurity threats that originate from within the Organization

*Data Theft
*Sabotage
*Misuse of access privileges
*Financial Gain
*Revenge

32
Q

Shadow IT

A

Use of Information Technology systems, devices, software, applications, and services without explicit organizational approval. When the security posture of an Org is too restrictive.

*Use of personal Devices for Work Purposes
*Installation of Unapproved Software
*Use of Cloud Services that have not been approved by the Org

33
Q

Threat Vector

A

The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.

*The “How” of an Attack

*Messages - Email, SMS, Text
*Images - embedded malicious code
*Files - malicious files hosted on malicious sites
*Voice Calls - aka Vishing
*Removable Devices - threats delivered via USB drives
*Unsecure Networks - Wireless/ Wired/ BT (Evil Twin / Rogue Access Points)

34
Q

Attack Surface

A

Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment

*The “Where” of an Attack

*Restricting Access
*Removing Unnecessary Software
*Disabling Unused Protocols

35
Q

Deceptive & Disruptive Technologies

A

Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.

36
Q
A