Week 1 Flashcards
What is cybersecurity/types of threats/threat models/security controls
C in CIA triad
confidentiality
I in CIA triad
integrity
A in CIA triad
availability
confidentiality
ensuring that data which should be confidential is confidential
integrity
ensuring that data is only changed in authorized ways
availability
ensuring that data can be accessed when it is needed
McCumber cube [1991]
expansion of CIA triad that tries 2 show how CIA is applied to info processing and what controls are used to 2 enforce them
organizational policy
outlines an organization’s security rules, regulations and strategies 4 maintaining the CIA of critical data
vulnerability
a flaw, bug or misconfiguration in the system that permits the CIA triad 2 be attacked [often accidentally created and attacked]
threat actor
a person or a group that might attack a system [i.e. hacker]
threat
something bad a threat actor could do after a successful attack
risk
a measurement based on the damage inflicted by a TA carrying out a threat and the likelihood of the threat being realized
exploit
a way 2 make use of a vulnerability 2 attack the system’s CIA
payload
what the attacker uses the exploit 2 do, such as install malware
M in MICE [attacker motivation]
money
I in MICE [attacker motivation]
ideology
C in MICE [attacker motivation]
coercion