Week 1 Flashcards

What is cybersecurity/types of threats/threat models/security controls

1
Q

C in CIA triad

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

I in CIA triad

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A in CIA triad

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

confidentiality

A

ensuring that data which should be confidential is confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

integrity

A

ensuring that data is only changed in authorized ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

availability

A

ensuring that data can be accessed when it is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

McCumber cube [1991]

A

expansion of CIA triad that tries 2 show how CIA is applied to info processing and what controls are used to 2 enforce them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

organizational policy

A

outlines an organization’s security rules, regulations and strategies 4 maintaining the CIA of critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

vulnerability

A

a flaw, bug or misconfiguration in the system that permits the CIA triad 2 be attacked [often accidentally created and attacked]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

threat actor

A

a person or a group that might attack a system [i.e. hacker]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

threat

A

something bad a threat actor could do after a successful attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

risk

A

a measurement based on the damage inflicted by a TA carrying out a threat and the likelihood of the threat being realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

exploit

A

a way 2 make use of a vulnerability 2 attack the system’s CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

payload

A

what the attacker uses the exploit 2 do, such as install malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

M in MICE [attacker motivation]

A

money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

I in MICE [attacker motivation]

A

ideology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

C in MICE [attacker motivation]

A

coercion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

E in MICE [attacker motivation]

A

ego

19
Q

R in RASCLS [attacker motivation]

A

reciprocation

20
Q

1st S in RASCLS [attacker motivation]

A

scarcity

21
Q

A in RASCLS [attacker motivation]

A

authority

22
Q

C in RASCLS [attacker motivation]

A

commitment

23
Q

L in RASCLS [attacker motivation]

A

liking

24
Q

2nd S in RASCLS [attacker motivation]

A

social proof

25
Q

threat models

A

a formal framework for group threats into discrete categories

26
Q

what are threat models used for

A

planning security controls

27
Q

S in STRIDE [threat models]

A

spoofing

28
Q

spoofing

A

pretending to be someone else [authentication]

29
Q

T in STRIDE [threat models]

A

tampering

30
Q

tampering

A

changing data to be inaccurate [integrity]

31
Q

R in STRIDE [threat models]

A

repudiation

32
Q

repudiation

A

denying that you did a thing you did [accountability]

33
Q

I in STRIDE [threat models]

A

information disclosure

34
Q

information disclosure

A

revealing information that shouldn’t be otherwise disclosed [confidentiality]

35
Q

D in STRIDE

A

denial of service

36
Q

denial of service

A

trying to stop someone else from using a system controls [availability]

37
Q

E in STRIDE

A

elevation of privilege

38
Q

elevation of privilege

A

trying to get a higher level of access than you are currently assigned [authorization]

39
Q

ISC^2 control categorization

A

security controls –> 2 dimensions –> function and mechanism

40
Q

ISC^2 function

A

directive, deterrent, penetrative, detective, corrective, recovery compensating

41
Q

ISC^2 mechanism

A

technical, administrative, physical

42
Q

NIST cybersecurity framework

A

recover, identify, protect, respond, recover

43
Q

what does ISC^2 do that NIST doesn’t

A

distinguishes function and mechanism

44
Q

“defense in depth”

A

all controls [multiple layers] keep our “castle” safe