Week 1 Flashcards

What is cybersecurity/types of threats/threat models/security controls

1
Q

C in CIA triad

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

I in CIA triad

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A in CIA triad

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

confidentiality

A

ensuring that data which should be confidential is confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

integrity

A

ensuring that data is only changed in authorized ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

availability

A

ensuring that data can be accessed when it is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

McCumber cube [1991]

A

expansion of CIA triad that tries 2 show how CIA is applied to info processing and what controls are used to 2 enforce them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

organizational policy

A

outlines an organization’s security rules, regulations and strategies 4 maintaining the CIA of critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

vulnerability

A

a flaw, bug or misconfiguration in the system that permits the CIA triad 2 be attacked [often accidentally created and attacked]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

threat actor

A

a person or a group that might attack a system [i.e. hacker]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

threat

A

something bad a threat actor could do after a successful attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

risk

A

a measurement based on the damage inflicted by a TA carrying out a threat and the likelihood of the threat being realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

exploit

A

a way 2 make use of a vulnerability 2 attack the system’s CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

payload

A

what the attacker uses the exploit 2 do, such as install malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

M in MICE [attacker motivation]

A

money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

I in MICE [attacker motivation]

A

ideology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

C in MICE [attacker motivation]

A

coercion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

E in MICE [attacker motivation]

19
Q

R in RASCLS [attacker motivation]

A

reciprocation

20
Q

1st S in RASCLS [attacker motivation]

21
Q

A in RASCLS [attacker motivation]

22
Q

C in RASCLS [attacker motivation]

A

commitment

23
Q

L in RASCLS [attacker motivation]

24
Q

2nd S in RASCLS [attacker motivation]

A

social proof

25
threat models
a formal framework for group threats into discrete categories
26
what are threat models used for
planning security controls
27
S in STRIDE [threat models]
spoofing
28
spoofing
pretending to be someone else [authentication]
29
T in STRIDE [threat models]
tampering
30
tampering
changing data to be inaccurate [integrity]
31
R in STRIDE [threat models]
repudiation
32
repudiation
denying that you did a thing you did [accountability]
33
I in STRIDE [threat models]
information disclosure
34
information disclosure
revealing information that shouldn't be otherwise disclosed [confidentiality]
35
D in STRIDE
denial of service
36
denial of service
trying to stop someone else from using a system controls [availability]
37
E in STRIDE
elevation of privilege
38
elevation of privilege
trying to get a higher level of access than you are currently assigned [authorization]
39
ISC^2 control categorization
security controls --> 2 dimensions --> function and mechanism
40
ISC^2 function
directive, deterrent, penetrative, detective, corrective, recovery compensating
41
ISC^2 mechanism
technical, administrative, physical
42
NIST cybersecurity framework
recover, identify, protect, respond, recover
43
what does ISC^2 do that NIST doesn't
distinguishes function and mechanism
44
"defense in depth"
all controls [multiple layers] keep our "castle" safe