the basics of security Flashcards

1
Q

As security is increased, what is decreased?

A

Convenience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of security?

A

Security is to be free from danger and the process that achieves such freedom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three types of information protection (often called the CIA triad)?

A

Confidentiality: Only approved individuals may access information.

Integrity: Ensures information is correct and unaltered.

Availability: Ensures information is accessible to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat actor?

A

Is an individual or entity responsible for cyber incidents against the technology equipment of enterprises and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Financial crime is often divided into three categories based on what targets?

A

Individual users, enterprises, governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of hackers?

A

Black hat hackers, white hat hackers and gray hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are script kiddies?

A

Individuals who want to perform attacks, yet lack the technical knowledge to do so.

They often download freely available automated attack software and use it to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are hacktivists?

A

Individuals that are strongly motivated by an ideology (for the sake of their principles or beliefs).

The types of attacks they tend to do often involve breaking into a website and changing its contents as a means of a political statement.

Other attacks were retaliatory: hacktivists have disabled a bank’s website that didn’t allow online payments to be deposited into accounts belonging to groups supported by them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are state actors?

A

State-sponsored attackers employed by the government to launch cyberattacks against their foes.

Many believe them to be the deadliest of any attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Advanced persistent threat (APT)?

A

It is most commonly associated with state actors and it is multiyear intrusion campaigns targeting highly sensitive economic, proprietary, or national security information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Insiders?

A

Employees, contractors and/or business partners that pose an inside threat of manipulating data from the position of a trusted employee.

These attacks can be more difficult to recognize as they come from within the enterprise.

Six out of 10 enterprises recorded being a victim of at least one enterprise in 2019.
The focus of the insiders was:
Intellectual property (IP) theft – 43%
Sabotage – 41%
Espionage – 32%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering?

A

One of the most successful types of attacks, Social engineering is a means of eliciting information (gathering data) by relying on the weaknesses of individuals.

It does not even exploit technology vulnerabilities and a successful attack has serious ramifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a vulnerability?

A

The state of being exposed to the possibility of being attacked or harmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some platforms for serious vulnerabilities?

A

Legacy platforms, on-premises platforms, cloud platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do Third party vulnerabilities include?

A
  • Almost all business use external entities (aka third parties).
  • Examples include: outsourced code development, data storage facilities
    Vendor management is the process organizations use to monitor and manage the interactions with all of their external third parties.
  • Connectivity between the organization and the third party is known as system integration
    One of the major risks of third-party system integration involves the principle of the weakest link.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some Third Party patches?

A

Patches include:
- As important as patches are, they can create vulnerabilities:
- Difficulty patching firmware
– Few patches for application software
- Delays in patching OS’s

17
Q

What is a zero-day vulnerability?

A
  • Vulnerabilities can be exploited by attackers before anyone else even knows it exists.
  • This type of vulnerability is called a zero day because it provides zero days of warning
  • Considered extremely serious.
18
Q

What is an attack vector?

A

Is a pathway or avenue used by a threat actor to penetrate a system.

19
Q

What are some of the groupings for attack vectors?

A

Attack vectors can be grouped into the following categories: email, wireless, removable media, direct access, social media, supply chain, cloud.

20
Q

Social engineering psychological approaches often involve which two things:

A

Impersonation or Phishing (claiming to be from a legitimate enterprise in an attempt to gain private information or take action).

21
Q

What is redirection?

A

Redirection is when an attacker directs a user to a fake lookalike site filled with ads for which the attacker receives money for traffic generated to the site.

22
Q

What is Spam?

A

Unsolicited communication that is sent to a large number of recipients.

23
Q

What are hoaxes?

A

False warnings that are claimed to be from the IT department.

24
Q

What is a watering hole attack?

A

An attack directed to a smaller group of specific individuals.

25
Q

What are physical procedures?

A

Physical procedures take advantage of user actions that can result in compromised security), three of the most common are dumpster diving, tailgating and shoulder surfing,

26
Q

What is dumpster diving?

A

Dumpster diving involves digging through trash receptacles to find information that can be useful in an attack.

An electronic variation of physical dumpster diving is to use the google search engine to look for documents and data posted online that can be used in an attack (called Google dorking)

27
Q

What is tailgating?

A

Occurs when an authorized person opens an entry door, one or more individuals can follow behind and enter.

28
Q

What is shoulder surfing?

A

Shoulder surfing allows an attacker to casually observe someone entering secret information, such as the security codes on a door keypad.