Threat & Vulnerabilities Flashcards
Person or event with the potential to have an impact on a valuable resource
Threat
Flaw or weakness within a system that can be exploited. Quality within a resource or its environment that might allow a threat to be realized
Vulnerability
The likelihood of a threat exploiting a vulnerability
Risk
Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction
Information Security
Threat that originates within the organization
Internal / Insider Threat
The act of protecting the systems that hold and process critical data, the device holding the data
Information System Security
CIA Triad
Confidentiality
Integrity
Availability
Threats that are external to an organization
External Threat
List of publicly disclosed computer security weaknesses
CVE (Common Vulnerabilities and Exposure)
Vulnerability that is discovered or exploited before the vendor can issue a patch to fix it
Zero-day vulnerability
Software code that takes advantage of a security flaw or vulnerability
Exploit
Confidentiality protections such as looked doors, fences, security guards, security cameras, and safes are examples of what type of protection?
Physical protections
Confidentiality protections such as encryption, passwords, firewalls, and MFA are examples of what type of protection?
Electronic protections
2 best methods for integrity
1) Hashing
2) Checksums
A file goes through a one way encryption algorithm that gives a unique digital fingerprint to the file
Hashing
Occurs when the data is modified during storage, at rest, or transit.
Failure of integrity
Having good backup strategies and disaster recovery plans ensure which one of the CIA triad?
Availability
3 main things to remember when regarding CIA triad
Confidentiality – Encryption (like WPA2)
Integrity – Hashing (like MD5, SHA-1)
Accessibility – Redundancy & reliability
System that is not on the baseline of what is approved by the organization.
(Configuration baseline is a set of recommendations for deploying a computer in a hardened configuration)
System that is not compliant in the configuration baseline.
Non-compliant System
5 main vulnerabilities to network and systems
1) Non-compliant systems
2) Unpatched systems
3) Unprotected systems
4) EOL (End-of-Life) OSs
5) BYOD (Bring your own device)
An attack that attempts to make a computer or server’s resources unavailable
Denial of Service (DoS)
Specialized type of DoS attack that attempts to send more packets to a server or host
Flood attack
Type of flood DoS attack that happens when too many pings (IMCP echo) are being sent
Ping Flood
Type of flood DoS attack where the attacker initiates multiple TCP sessions but never completes the three-way handshake
SYN Flood
3 ways to prevent DoS attacks
1) Flood Guards
2) Time Outs
3) Intrusion Prevention
Type of DoS attack that exploits a security flaw to permanently break a networking device by reflashing its firmware
Permanent Denial of Service (PDoS)
Attack that creates a large number of processes to use up the available processing power of a computer
Fork Bomb
Uses lots of machines to attack a server to create a DoS
Distributed Denial of Service (DDoS)
Type of DDoS attack that allows an attacker to send packets to flood the victim’s website to initiate DNS requests
DNS Amplification
A way to prevent a DoS attack that identifies attacking IP addresses and routes them to a non-existent server through the null interface
Blackhole/Sinkhole