Untitled Deck Flashcards
Information Security
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
Information Systems Security
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
CIA Triad
Confidentiality, Integrity, Availability
Confidentiality
Ensures information is accessible only to authorized personnel (e.g., encryption)
Integrity
Ensures data remains accurate and unaltered (e.g., checksums)
Availability
Ensures information and resources are accessible when needed (e.g., redundancy measures)
Non-Repudiation
Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)
CIANA Pentagon
An extension of the CIA triad with the addition of non-repudiation and authentication
Triple A’s of Security
Authentication, Authorization, Accounting
Authentication
Verifying the identity of a user or system (e.g., password checks)
Authorization
Determining actions or resources an authenticated user can access (e.g., permissions)
Accounting
Tracking user activities and resource usage for audit or billing purposes
Security Control Categories
Technical, Managerial, Operational, Physical
Security Control Types
Preventative, Deterrent, Detective, Corrective, Compensating, Directive
Zero Trust Model
Operates on the principle that no one should be trusted by default
Control Plane (Zero Trust)
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
Data Plane (Zero Trust)
Subject/system, policy engine, policy administrator, and establishing policy enforcement points
Threat
Anything that could cause harm, loss, damage, or compromise to our information technology systems
Threat Sources
Natural disasters, Cyber-attacks, Data integrity breaches, Disclosure of confidential information
Vulnerability
Any weakness in the system design or implementation
Vulnerability Sources
Software bugs, Misconfigured software, Improperly protected network devices, Missing security patches, Lack of physical security
Risk
The intersection of a threat and a vulnerability
Reasons Confidentiality is important
To protect personal privacy, To maintain a business advantage, To achieve regulatory compliance
Methods to ensure Confidentiality
Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness
Encryption
Process of converting data into a code to prevent unauthorized access
Access Controls (Confidentiality)
Setting up strong user permissions to ensure only authorized personnel can access certain data
Data Masking
Obscuring specific data within a database for unauthorized users while retaining its use for authorized users
Physical Security Measures (Confidentiality)
Ensuring confidentiality for both physical and digital information
Training and Awareness (Confidentiality)
Regular training on security awareness best practices
Reasons Integrity is important
To ensure data accuracy, To maintain trust, To ensure system operability
Methods to maintain Integrity
Hashing, Digital Signatures, Checksums, Access Controls, Regular Audits
Hashing
Process of converting data into a fixed-size value
Digital Signatures
Ensure both integrity and authenticity
Checksums
Method to verify the integrity of data during transmission
Access Controls (Integrity)
Ensure only authorized individuals can modify data
Regular Audits
Systematically reviewing logs and operations to ensure only authorized changes have been made
Reasons Availability is important
Ensuring Business Continuity, Maintaining Customer Trust, Upholding an Organization’s Reputation
How to maintain Availability
Using redundancy in systems and network designs
Redundancy
Duplication of critical components or functions of a system to enhance reliability
Server Redundancy
Using multiple servers in a load-balanced or failover configuration
Data Redundancy
Storing data in multiple places
Network Redundancy
Ensures that if one network path fails, the data can travel through another route
Power Redundancy
Using backup power sources, like generators and UPS systems
Reasons Non-repudiation is important
To confirm the authenticity of digital transactions, To ensure the integrity of critical communications, To provide accountability in digital processes
5 Commonly used Authentication Methods
Something you know (Knowledge Factor), Something you have (Possession Factor), Something you are (Inherence Factor), Something you do (Action Factor), Somewhere you are (Location Factor)
Something you know (Authentication)
Relies on information a user can recall
Something you have (Authentication)
Relies on the user presenting a physical item
Something you are (Authentication)
Relies on a unique physical or behavioral characteristic
Something you do (Authentication)
Relies on a unique action
Somewhere you are (Authentication)
Relies on the user being in a certain geographic location
Multi-Factor Authentication (MFA)
Requires multiple methods of identification
Reasons Authentication is critical
To prevent unauthorized access, To protect user data and privacy, To ensure resources are accessed by valid users only
Authorization
Permissions and privileges granted after authentication
Reasons Authorization mechanisms are important?
To protect sensitive data, To maintain system integrity, To create a streamlined user experience
Accounting
Ensures all user activities are tracked and recorded
Reasons a robust Accounting system is important?
Create an audit trail, Maintain regulatory compliance, Conduct forensic analysis, Perform resource optimization, Achieve user accountability
Technologies used for Accounting
Syslog Servers, Network Analysis Tools, SIEM Systems
Syslog Servers
Aggregate logs from various devices for analysis
Network Analysis Tools
Capture and analyze network traffic
SIEM Systems
Real-time analysis of security alerts
Security Control Categories (4)
Technical, Managerial, Operational, Physical
Technical Controls
Technologies, hardware, and software to manage and reduce risks
Managerial Controls
Strategic planning and governance of security
Operational Controls
Procedures and measures for day-to-day data protection
Physical Controls
Tangible measures to protect assets
Security Control Types (6)
Preventive, Deterrent, Detective, Corrective, Compensating, Directive
Preventive Controls
Proactive measures to thwart threats
Deterrent Controls
Discourage attackers by making attacks less appealing
Detective Controls
Monitor and alert to malicious activities
Corrective Controls
Mitigate damage and restore systems
Compensating Controls
Alternative measures when primary controls are not feasible
Directive Controls
Guide, inform, or mandate actions (often policy-based)
Gap Analysis
Evaluating the differences between current and desired performance
Steps in Conducting a Gap Analysis
Define the scope, Gather data on the current state, Analyze the data, Develop a plan to bridge the gap
Types of Gap Analysis
Technical Gap Analysis, Business Gap Analysis
Technical Gap Analysis
Evaluating technical infrastructure
Business Gap Analysis
Evaluating business processes
Plan of Action and Milestones (POA&M)
Outlines measures to address vulnerabilities, allocate resources, and set timelines
Zero Trust
Demands verification for every device, user, and transaction
Two Planes of Zero Trust
Control Plane, Data Plane
Control Plane (Zero Trust)
Framework for defining, managing, and enforcing access policies
Elements of Control Plane (Zero Trust)
Adaptive Identity, Threat Scope Reduction, Policy-Driven Access Control, Secured Zones
Adaptive Identity (Zero Trust)
Real-time validation based on user behavior, device, location, etc.
Threat Scope Reduction (Zero Trust)
Limits user access to reduce the attack surface
Policy-Driven Access Control (Zero Trust)
Managing access based on roles and responsibilities
Secured Zones (Zero Trust)
Isolated environments for sensitive data
Components used by Control Plane (Zero Trust)
Policy Engine, Policy Administrator
Policy Engine (Zero Trust)
Cross-references access requests with predefined policies
Policy Administrator (Zero Trust)
Establishes and manages access policies
Data Plane (Zero Trust)
Consists of the Subject/System and Policy Enforcement Point
Subject/System (Zero Trust)
The entity attempting to gain access
Policy Enforcement Point (Zero Trust)
Where access decisions are executed
Threat Actor Objectives
Summarize security concepts, Compare threat actors and motivations, Explain threat vectors and attack surfaces
Threat Actor Motivations
Data Exfiltration, Blackmail, Espionage, Service Disruption, Financial Gain, Philosophical/Political Beliefs, Ethical Reasons, Revenge, Disruption/Chaos, War
Threat Actor Attributes
Internal vs. External, Differences in resources and funding, Level of sophistication
Types of Threat Actors
Unskilled Attackers, Hacktivists, Organized Crime, Nation-state Actors, Insider Threats
Unskilled Attackers (Script Kiddies)
Individuals with limited technical expertise who use readily available tools
Hacktivists
Individuals or groups driven by political, social, or environmental ideologies
Organized Crime
Groups that execute cyberattacks for financial gain (e.g., ransomware, identity theft)
Nation-state Actors
Highly skilled attackers sponsored by governments for cyber espionage or warfare
Insider Threats
Security threats originating from within the organization
Shadow IT
IT systems, devices, software, or services managed without explicit organizational approval
Threat Vector
The means or pathway by which an attacker gains unauthorized access
Shadow IT
Use of information technology systems, devices, software, applications, and services without explicit organizational approval; IT-related projects managed outside of the IT department.
Why does Shadow IT exist?
An organization’s security posture is set too high or too complex, negatively affecting business operations.
Bring Your Own Devices (BYOD)
Involves the use of personal devices for work purposes.
Threat Vector
The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload.
Attack Surface
Encompasses all the various points where an unauthorized user can try to enter or extract data from an environment. Can be minimized by restricting access, removing unnecessary software, and disabling unused protocols.
Message-based Threat Vectors
Threats delivered via email, SMS text messaging, or other forms of instant messaging.
Phishing campaigns are commonly used.
Phishing Campaigns (Message-based)
When an attacker impersonates a trusted entity to trick victims into revealing sensitive information.
Image-based Threat Vectors
Embedding malicious code inside an image file.
File-based Threat Vectors
Files, often disguised as legitimate documents or software, transferred as email attachments, through file-sharing services, or hosted on malicious websites.
Voice Calls (Threat Vector)
Vhishing: Use of voice calls to trick victims into revealing sensitive information.
Vhishing
Use of voice calls to trick victims into revealing sensitive information.
Removable Devices (Threat Vector)
One common technique is baiting: leaving a malware-infected USB drive in a public location.
Baiting (Removable Devices)
An attacker leaves a malware-infected USB drive in a location where a target might find it.
Unsecure Networks (Threat Vector)
Wireless, wired, and Bluetooth networks that lack appropriate security measures. Unauthorized access can intercept communications or gain network access.
MAC Address Cloning
An attack that can occur with physical access to network infrastructure.
VLAN Hopping
An attack that can occur with physical access to network infrastructure.
BlueBorne
A set of vulnerabilities in Bluetooth technology that allows attackers to take over devices, spread malware, or establish on-path attacks.
BlueSmack
A type of Denial of Service attack targeting Bluetooth devices by sending a specially crafted packet.
Deception and Disruption Technologies
Technologies designed to mislead, confuse, and divert attackers while detecting and neutralizing threats.
Tactics, Techniques, and Procedures (TTPs)
Specific methods and patterns of activities associated with a particular threat actor.
Honeypots
Decoy systems or networks set up to attract potential hackers.
Honeynets
A network of honeypots designed to mimic an entire network of systems (servers, routers, switches).