Untitled Deck Flashcards

1
Q

What are assets in cybersecurity?

A

Assets are valuable things in a computer system that need protection, such as data and money.

Example: My data and money with ADCB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does vulnerability mean?

A

A vulnerability means a weakness that could be exploited by an attacker, often due to outdated software or bugs in code.

Example: Wattpad being breached allows access to user data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is a threat actor?

A

A threat actor refers to anyone who wants to attack a system, such as a cybercriminal.

Example: A cybercriminal attacking a bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat?

A

A threat is potential harm that an attacker could inflict, such as extortion or data exposure.

Example: ‘I will expose your data if you don’t pay me a ransom.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define risk in cybersecurity.

A

Risk refers to the chance that an attacker will successfully exploit a vulnerability and cause harm.

Example: A threat actor guessing a weak password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does it mean to exploit a vulnerability?

A

To exploit means to take advantage of a vulnerability.

Example: A threat actor exploiting outdated software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a payload in cybersecurity?

A

A payload refers to the demands made by a hacker after successfully exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a countermeasure?

A

A countermeasure is a security measure taken to prevent attacks on a computer system.

Examples: Firewalls, antivirus software, Multi-factor authentication, encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the CIA triad stand for?

A

The CIA triad stands for:
* Confidentiality
* Integrity
* Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is non-repudiation?

A

Non-repudiation ensures that a person cannot deny having sent a message or made a transaction.

Examples: Digital signatures, message authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define access control.

A

Access control is a security service that prevents unauthorized access to data, systems, and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the AAA model represent?

A

The AAA model manages user access and tracks their activities, consisting of:
* Authentication
* Authorization
* Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of authentication?

A

Authentication verifies that a user is who they claim to be.

Example: Logging into an account using a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does authorization determine?

A

Authorization determines what resources and actions a user is allowed to access after authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does accounting track?

A

Accounting tracks and logs a user’s activities, including resources accessed and session duration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cyberspace?

A

Cyberspace refers to the digital world where computers, networks, and the internet interact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the ‘weakest link’ in cybersecurity?

A

The weakest link refers to the human factor, as even the best security technologies can be compromised by human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the four classes of cybersecurity threats?

A

The four classes are:
* Disclosure
* Deception
* Disruption
* Usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is threat modeling?

A

Threat modeling is a process used to identify risks, analyze them, and find ways to reduce or eliminate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a data breach?

A

A data breach occurs when sensitive data is accessed, stolen, or exposed without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Who are hackers?

A

Hackers are skilled individuals in computer systems who can be ethical or malicious.

Examples include white hat hackers (ethical) and black hat hackers (malicious).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is defense in depth?

A

Defense in depth is a security strategy that involves multiple layers of protection.

Examples: Perimeter security, network security, host security, application security, data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an attack surface?

A

An attack surface is the total number of vulnerabilities and entry points in a system that an attacker can exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an attack tree?

A

An attack tree is a hierarchical diagram that analyzes different ways an attacker can exploit a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the goal of prevention in security implementation?
The goal of prevention is to stop attacks before they happen.
26
What is the purpose of detection in security?
Detection aims to identify when an attack is occurring or has occurred.
27
What does response in security implementation involve?
Response involves mitigating the effects of an attack once it is detected.
28
What is recovery in the context of cybersecurity?
Recovery aims to return the system to normal operations after an attack or breach.
29
What are dictionary attacks?
Dictionary attacks are a method of cracking passwords using a list of common words or phrases.
30
What is multi-factor authentication (MFA)?
MFA is a security method that requires more than just a password to access a system.
31
What are the three ways to authenticate in MFA?
The three ways are: * Something You Know * Something You Have * Something You Are
32
What is the principle of least privilege?
The principle of least privilege restricts user access to only what is necessary for their role.
33
What is the principle of separation of privilege?
The principle of separation of privilege requires multiple conditions or individuals to complete a sensitive action.
34
What is the principle of complete mediation?
The principle of complete mediation checks every action or request against security rules.
35
What is access control in cybersecurity?
Access control limits one's access to resources on a system using secure environments called sandboxes.
36
What is the primary function of a reference monitor?
Ensures all operations are safe and secure ## Footnote This check happens each time the user tries to perform an action.
37
What is access control?
Limiting access to resources on a system using sandboxes
38
Define Access Control List (ACL).
A security mechanism that manages and controls access to a system resource
39
What is the Confused Deputy Problem?
Occurs when a trusted process with high permissions is tricked into performing unauthorized actions
40
What is clickjacking?
A cyber attack that tricks a user into clicking on something different from what they think
41
What does Discretionary Access Control (DAC) allow?
The resource owner has full control over who can access it and what actions they can perform
42
In Mandatory Access Control (MAC), who defines access to resources?
A system-enforced policy, not the resource owner
43
What is Role-Based Access Control (RBAC)?
Users are assigned to specific roles based on job functions, inheriting permissions of those roles
44
Define Attribute-Based Access Control (ABAC).
Access decisions based on attributes of users, resources, and the environment
45
What does the Bell-LaPadula Model focus on?
Preventing unauthorized access to sensitive data
46
What is the primary goal of the Biba Model?
Protecting the integrity of data by governing user interactions with data
47
What is the Brewer and Nash Model (Chinese Wall Model) designed to do?
Prevent conflicts of interest in sensitive data handling
48
What does non-repudiation ensure?
That someone cannot deny the validity of something
49
What are the components of accountability?
* Authentication & Authorization * Logging * Monitoring and Auditing
50
What is the purpose of Intrusion Detection Systems (IDSs)?
To monitor network and system activities for unusual behavior
51
What must records maintain for admissibility as evidence?
Integrity and authenticity throughout the entire process
52
What is auditing?
The process of reviewing systems, processes, and controls to ensure compliance and security
53
What is logging?
The process of recording events or activities in a computing environment
54
What is the purpose of monitoring in security?
To track and watch what happens on a network to keep it secure
55
What does SIEM stand for?
Security Information and Event Management
56
What does SIEM do?
* Monitors everything in real-time * Detects security threats automatically * Provides a holistic view
57
What does a lock represent in access control?
The security on a file, system, or resource
58
What is the ORCON policy?
Originator Controlled; restricts sharing of information based on the originator's permissions
59
Define cryptography.
Making secret codes and hiding information
60
What is encryption?
The process of making information unreadable without a key
61
What is the difference between encoding and encryption?
* Encoding: Converts data for compatibility * Encryption: Protects data from unauthorized access
62
What is hashing?
Creates a unique fingerprint of data for security
63
What are the two types of encryption?
* Symmetric * Asymmetric
64
What does the Bell-LaPadula model prevent?
Unauthorized access to sensitive data
65
What type of cipher encrypts data one bit at a time?
Stream cipher
66
What is a digital certificate?
An electronic credential issued by a certificate authority that identifies the owner and includes their public key
67
What is risk in the context of security?
The chance that an attacker will successfully exploit a vulnerability
68
What are the steps for security risk analysis?
* Identify * Define * Calculate * Select
69
What is the difference between qualitative and quantitative risk analysis?
* Qualitative: Subjective judgment * Quantitative: Numeric values
70
What can organizations do with analyzed risks?
* Avoid * Mitigate * Transfer * Accept
71
What is the purpose of risk management frameworks?
Provide recommendations for protecting organizational assets
72
What is the baseline approach to risk identification?
Implementing industry’s best practices for systems
73
What does the detailed risk analysis approach involve?
Structured risk analysis with multiple stages, accounting for specific organizational risks
74
What is the risk assessment process?
* Prepare for assessment * Conduct risk analysis * Communicate results * Maintain assessment