Total Comp TIA - Online class Flashcards
(131 cards)
What is risk management
risk is the likelihood of a threat actor taking advantage of a vulnerability by using a threat against an IT asset
What is an asset
any part of an IT infrasture that has value
what is likelihood
the probability of an asset being damaged over time
what are threat actors
anyeone or anything with with the motive and resourcees to attach anothers IT infrastructure
what are nine the different threat actor groups
- Hacker - ppl trying to crack into IT inf.
- Hacktivist- someone with an activist attitude- ex. greenpeace
- script kitties- someone who uses known scrips and trying stuff ( premade attacks)
- insiders - somebody that has access to internal structure
- Competitors
- shadow IT - any form of IT inf that is being put in in an unofficial or illegal way
- criminal syndicates - denial of service attacks
- state actors - ex. - state sponser, long term type of actors
- advanced persistent threat(APT) - long term hacking of something to get information over time
what is a vulnerability
a weakness inherit in the protection of an asset . ex. firewalls that have holes in them
what is a threat
an action (attack or exploit) by a malicious threat actor that they can use against an vulnerability to preform harm to an asset
how can you get rid of threats
you go through remediation - lets look at all threat actors, threats , infrustructure, at their vulnerability and based on likelyhood elts make decision on hat we are going to do to remediate these threats
what does the CIA triad stand for
C- CONFIDENTIALITY
I-INTEGRITY
A- AVAILABILITY
what is an example of a script kitty
Kali linux
what are attack vectors
pathways to gain access to infrastructure
-example- open firewall ports
-weak configurations
-lack of security awareness
-missing patches
-infected USB thumb drive
-supply chain attacks
threat intelligence sources
-facilitate risk management
hardening can reduce incident response time
-provide cyber security insight - ex.threat maps
what are the threat intelligent sources
- closed/ proprietary- pay
-OSINT- Open source intelligent ex. goverment reports ex. NSA
-CVE- Common vulnerability and exposures
-dark web- anonymous connections ( TOR Network)
-AIS- Automated indicator sharing- exchange of cyber security intelligence between entities ( ex. STIX)
what is STIX
Structred threat information Expression - special format to package information that is understood between similar systems
what is TAXII
trusted automates exchange of intelligence iformation : ex- real time threat indicator feeds
describe OSINT
open sourced intelligence
-rferes to publis cybersecurity intelligence resources
* ex: CVE- Common vulenabilities and exposures database
what is the dark web
an encypted and anonymized inter access mechanism allowing access to unindexed contect
what could be some attack vectors
ex- mISSION CRITICAL it SYSTEMS - PAYMENT PROCESSING
-Third party access- software components
what are physical risk vector
ex- access control vestibules - mantraps
-Server room access
how can you manage risk vectors
with a risk management framework (RMF)
-ex. CIS- center for internet security
-NIST- national institute of risk management
what are some financial RMF’S
SSAE SOC 2
what is NIST
national institute of standards and technology
-It is a guide for conduction risk assessment
what is a GDPR
general data protection regulation
-protect EU citizens private data
ex. in the US- HIPPA ( health insurance portability and accountability act ) - protect health insurance info
-PCI DSS- Payment card industry data security standards
what are types of security policies
AUP- Acceptable use policy
-ex. email, account policies, web browsing , Data retention