The Present Threat Landscape Flashcards

1
Q

Security Triad

A

global network security
Confidentiality
Integrity:
Availability: system and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

a weakness in the system or its design that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

threat:

A

anything that can act in a manor that results in harm

anything capable of acting against the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Countermeasures and Mitigation

A

Security controls: seen as an investment by corporations to secure their business assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are administrative controls?

A

policies and procedures, for instance security awareness training, written security policies and standards, change and configuration controls, security audits and testing, background checks of contractors and employees, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are technical congrols??

A

Technical controls are the ones that involve electronics and hardware and software and so on. For example, this is the deployment of our firewall system, intrusion prevention systems, the sensors, the VPN gateways, access controls, content security like web security appliances and e-mail security appliances, as well as biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are physical controls?

A

These are mostly mechanical or they protect the physical infrastructure. For example, tall fencing around your campus perimeter, maybe a security guard at the entry to your facility, UPSs, fire suppression systems, positive air flow systems, locks, and other protection mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are preventative controls?

A

These are aimed at preventing or stopping the threat from coming in contact with the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how are preventative controls effective?

A

In order for a control to be effective or even relevant, we must introduce a difficulty factor. We must make the threat agent’s job more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are Detective controls?

A

controls identify that the threats entered the network or the system. For example, log monitoring, global correlation with the cloud, next generation intrusion prevention systems, and surveillance cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are Corrective controls

A

Should contribute to continual improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a recovery control?

A

recovery control is aimed at putting a system back into production after an incident. This is where the disaster recovery, the business continuity planning, business impact analysis, and disaster recovery planning comes into play. A recovery control could also be an aspect of a database system that recovers a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deterrent control?

A

mere presence, stickers on windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Indicators of Compromise

A

Evidence of some action of a threat agent or actor
a forensic artifect
measurable event or stateful property, network or host based

IOCs for network traffic would include URLs or protocol elements that indicate malware command and control servers part of a DDoS attack or a botnet. The rapid distribution and adoption of IOCs over the cloud can improve security by reducing the time that organizations are vulnerable to the same exploit or the same attack.

To discover indicators of compromise, you want to use network-based and host-based analysis. There’s many tools available like next generation IPS, SIEM – Security Information and Event Management systems – NetFlow collectors and data mining tools. There’s the OpenIOC Framework, and proprietary solutions like the Cisco FireSIGHT Management Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a script kiddie?

A

novice hacker / cracker because they utilise script code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

most common script viruses?

A

sent through emails
using phishing and spear phishing attacks. They use scripts and modules from exploit kits. They can learn these techniques on YouTube and other social media sites. Many, but not all, script kiddies are hacktivists.