Udemy Sections 1-3: Overview, Malware, and Malware Infections Flashcards
The act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction
Information security
The act of protecting the systems that hold and process critical data
Information systems security
CIA stands for
Confidentiality, Integrity, Availability
Information has not been disclosed to unauthorized people
Confidentiality
Information has not been modified or altered w/out proper authorization
Integrity
Information is able to be stored, accessed, or protected at all times
Availability
When a person’s identity is established w/ proof and confirmed by a system
Authentication
AAA stands for
Authentication, Authorization, Accounting
5 methods of authentication
Something you know
Something you have
Something you are
Something you do
Somewhere you are
Occurs when a user is given access to a certain piece of data or certain areas of a building
Authorization
Tracking of data, computer usage, and network resources
Accounting
The most cost effective security control to use
User training
Hackers who find and exploit vulnerabilities before anyone else does
Elite hackers
Hackers with little to no skill who only use the tools and exploits written by others
Script kiddies
Hackers who are driven by a cause like social change, political agendas, or terrorism
Hacktivists
Hackers who are a part of a crime group that is well-funded and highly sophisticated
Organized crime
Highly trained and funded groups of hackers (often by nation states) w/ covert and open-source intelligence at their disposal
APT (Advanced Persistent Threats)
Property of an intelligence source that ensures it is up-to-date
Timeliness
Property of an intelligence source that ensures it matches the use cases intended for it
Relevancy
Property of an intelligence source that ensures it produces effective results
Accuracy
Property of an intelligence source that ensures it produces qualified statements about reliability
Confidence levels
Threat intelligence that comes as a commercial service offering, where access to updates and research is subject to a subscription fee
Proprietary
Data that is derived from the provider’s own research and analysis efforts, such as data from honeynets that they operate, plus information mined from its customers’ systems, suitably anonymized
Closed-source
Data that is available to use w/out a subscription, which may include threat feeds similar to the commercial providers, and may contain reputation lists and malware signature databases
Open-source