S3 - Security and Confidentiality

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/56

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

Information is compromised and utilized without the authorization of the owner

Data Breach

2
New cards

Unplanned Events that cause a general system or major application to be inoperable for an unacceptable length of time

Service Disruption

3
New cards

The failure of an organization to comply with regulations that may result in fines and penalties

Compliance risk

4
New cards

Attacker, threat actor, hacker, adversary, government sponsored actors, hacktivists, insiders, external threats

Threat agents

5
New cards

Attacks target the infrastructure of a network, including switches, routers, servers, and cabling, with the intent to gain unauthorized access or disrupt operations for users (ex. buffer overflows, spoofing, backdoors/trapdoors)

Network-based attacks

6
New cards

SQL Injection, Cross-Site Scripting, Race Conditions, Mobile Code (virus)

Application Based Attacks

7
New cards

Attacks target a single host, such as a laptop, mobile device, or server, to disrupt functionality or obtain unauthorized access. (ex. brute force attacks, keystroke logging, malware, rogue mobile apps

Host-Based Attacks

8
New cards

Phishing, spear phishing, business email compromise, pretexting, catfishing, pharming, vishing

Social engineering attacks

9
New cards

Intercepting discarded equipment, piggybacking, infrastructure targeted by attackers, tampering, theft

Physical Attacks

10
New cards

Embedded software code, foreing-sourced attacks, pre-installed malware on hardware, venor attacks, watering hole attacks

Supply Chain Attacks

11
New cards

Reconnaissance, gaining access, escalation of privileges, maintaining access, network exploitation and exfiltration, covering tracks

Stages of cyberattacks

12
New cards

Additional industry exposures, cloud malware injection attacks, compliance violations, loss of control, loss of data loss of visibility, multi-cloud and hybrid management issues, theft or loss of intellectual property

Risks to Cloud Computing

13
New cards

Application malware, lack of updates, lack of encryption, physical threats, unsecured wifi networks, location tracking

Risks to mobile technology

14
New cards

Device mismanagement, device spoofing, escalated cyberattacks, expanded footprint, information theft, outdated firmware, malware, network attacks

Risks to the Internet of Things

15
New cards

Identify assets, identify threats, perform reduction analysis, analyze the impact of an attack, develop countermeasures and controls, review and evaluate

Phases of Threat Modeling

16
New cards

Process for Attack Simulation and Threat Analysis (PASTA), Visual, Agile, and Simple Threat (VAST), Spoofing, Tampering, Repudiation, Information Disclosures, Denial-of-service attack, and Elevation of privilege (STRIDE)

Methodologies for Threat Models

17
New cards

Three Internal Control Objective Groups in the COSO Framework

Operational objectives, reporting objectives, compliance objectives

18
New cards

Five Components of the COSO Internal Control Framework

Control Environment, Risk Assessment, Information and Communication, Controls Activities (Existing), Monitoring

19
New cards

Comprehensive guide for the implementation of an organization’s security framework. The document outlines the extent to which security measures are applied to various company resources

Security Policies

20
New cards

Control document that is created by an organization to regulate and protect technology resources by assigning varying levels of responsibilities to job roles, listing acceptable behaviors, and specifying consequences for those who violate the document

Acceptable Use Policy

21
New cards

Policy allows employees to use their personal devices for work-related activities and for connecting to a company’s network

Bring-your-own-device policy

22
New cards

Process of controlling network traffic so that it is either inaccessible or separated from the outside communications or otherA segments within an organization’s own network

Network segmentation/isolation

23
New cards

A virtual network built on top of existing physical networks that provides a means of secure communications using encryption protocols such as tunneling or Internal Protocol Security

Virtual Private Network

24
New cards

A multipronged, comprehensive security approach that reduces risk by minimizing the number of access points through which a company can be attacked. Ex:

  • database hardening

  • endpoint hardening

  • network hardening

  • server hardening

System hardening

25
New cards

Zero trust, Least privilege, Need-to-know, allow listing and denylisting

Authorization and Authentication Practices

26
New cards

Context aware authentication, digital signatures, single sign-on, multi factor authentication, personal identification numbers, smart cards, token, biometrics

Authentication technologies

27
New cards

Proactive security practice designed to prevent the exploitation of IT vulnerabilities that could potentially harm a system to organization. It involves identifying, classifying, mitigating, and fixing known vulnerabilities within a system

Vulnerability management

28
New cards

A multilayered security approach that combines people, policies, technology, and physical/logical access controls

Defense in depth, Layered Solutions

29
New cards

Safeguarding practices, education and training, regular security updates, encryption, firewalls, physical barriers, device and software hardening, Intrusion prevention systems

Preventive Controls

30
New cards

Designed to detect a threat while it is occurring and provide assistance during investigations and audits after the event has occurred

Detective Controls

31
New cards

Intended to fix known vulnerabilities as a result of recent security incidents, security self-assessments, or changes in industry practices

Corrective Controls

32
New cards

Identify four components to manage risk under the NIST Special Publication 800-39

Risk Framework, Assess Risk, Respond to risk, Monitor risk

33
New cards

Key items generally included in a Security Assessment Report (SAR)

Summary of findings, system overview, assessment methodology, security assessment findings, recommendations, action plan

34
New cards

Results help the org:

  • Identify potential deficiencies in their risk management processes

  • Identify security and privacy related deficiencies in the security system’s environment

  • Prioritize the responses to risks

  • Support the monitoring activities and system authorization decisions

  • Inform budgeting and investment decision makers

SAR

35
New cards

Regarding security awareness, what are the three generally relevant categories of personnel in terms of responsibility?

Management, Specialized IT Personnel, all other employees

36
New cards

Components of a successful security awareness program

Phishing simulations security program champions, employee engagement

37
New cards

Click rate, re-click rate, report rate, nonresponder rate, reply rate

Metrics to measure phishing simulations

38
New cards

Protects unauthorized access to information gathered by the organization

Confidentiality

39
New cards

Protects the rights of an individual and gives the individual control over what information they are willing to share with others

Privacy

40
New cards

Three most common data obfuscation applications to help protect confidential data

Encryption, tokenization, masking

41
New cards

Involves a single shared or private key for encryption and decryption within a group

Symmetric encryption

42
New cards

Uses two keys, a public key and a private key, where the public key encrypts the message and the private key decrypts the message

Asymmetric Encryption

43
New cards

Identify two of the most common cipher techniques that encode unencrypted messages into encrypted form

Substitution ciphers, transposing ciphers

44
New cards

Five safeguards that should be in place to protect data-at-rest

Physical security, digital security controls, authorization and user access controls, change management controls, backup and recovery mechanisms

45
New cards
  1. Plan and prep

  2. obtain an understanding

  3. perform the walk-through

  4. create documentation

  5. test controls

  6. evaluate and report

Walk-through steps

46
New cards

The documentation of a set of procedures, people, adn infromation to detect, respond to, and limit the consequences of a cyberattack against an organization

Incident Response Plan

47
New cards

Models recommended by NIST to base the Incident Response Team, this depends on an entity’s size and business model

Centralized incident response team, distributed incident response teams, coordinating team

48
New cards

Factors that organizations should consider when selecting the appropriate structure and staffing models for incident response teams

24/7 Availability, Full time vs. part time, employee morale, cost, staff expertise

49
New cards

Observable occurence in a system or network

Event

50
New cards

A cybersecurity change that may have an impact on organizational operations (including mission, capabilities, or reputation)

Cybersecurity Event

51
New cards

Any event with a negative consequnce

Adverse event

52
New cards

An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information that the system processes, stoes, or transmits. May constitute a violation or imminent threat of violation of security policies, procedures, or acceptable use policies

Incident

53
New cards

A type of adverse event that is computer-security related and caused by malicious human intent

Computer security incident

54
New cards

A cybersecurity event that has been determiend

Cybersecurity incident

55
New cards

Seven widely recognized steps in responding to incidents

Preparation, Detection, Containment, Eradication, Reporting, Recovery, Learning

56
New cards

Common methods of testing when orgs periodically test whether IRP plans repond as expected to boht hypothetical and actual cybersecurity threats

Simulations, IRP metrics, post-incidnet review, periodic audits, continuous monitoring

57
New cards

Business interruption losses, cyber extortion losses, incident response costs, replacement costs for IS, litigation and attorney fees, reputational damage, information or identity theft

Common losses covered by cyber insurance