1/242
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Preventive Controls
Objective: Prevent security incidents from occurring.
Examples: Firewalls, Access control mechanisms (e.g., passwords, biometrics), Intrusion prevention systems (IPS), Security policies and procedures
Deterrent Controls
Objective: Discourage potential attackers from attempting to compromise a system.
Examples: Warning signs, Security awareness training, Visible security measures (e.g., security guards, CCTV)
Detective Controls
Objective: Detect and alert on security incidents as they occur.
Examples: Intrusion detection systems (IDS), Security information and event management (SIEM) systems, Audit logs and monitoring, Surveillance cameras
Corrective Controls
Objective: Correct and mitigate the impact of security incidents.
Examples: Antivirus and anti-malware software, Backup and recovery procedures, Patch management systems, Incident response plans
Compensating Controls
Security measures implemented to provide an alternative method of protecting assets when standard controls are not feasible.
Examples: Temporary access restrictions, Alternative authentication mechanisms, Additional monitoring when primary controls are down
Directive Controls
Objective: Specify acceptable practices and expected behavior.
Examples: Security policies and guidelines, Employee handbooks, Standard operating procedures (SOPs), Codes of conduct
Five Core Principles of Information Security (CIANA)
Confidentiality, Integrity, Availability, Non-Repudiation, Authentication
Gap Analysis Steps
Define the scope, Gather data about the current infrastructure, Analyze the data and identify the gaps, Develop a plan to bridge the gap
Honeypot
A honeypot is a decoy system or resource designed to attract and deceive attackers. It appears to be a legitimate part of the network but is isolated and monitored to gather information about attackers' tactics, techniques, and motives.
Honeynet
A honeynet is a network of honeypots that are interconnected to simulate a larger and more realistic environment for attracting and monitoring attackers. It allows organizations to capture and analyze broader attack patterns and behaviors.
Honeyfile
A honeyfile is a file or document that is intentionally created and placed in a network to act as bait for attackers. It contains seemingly valuable information that, if accessed or modified, triggers alerts and provides insights into unauthorized access attempts.
Honeytoken
A honeytoken is a piece of data or credential that is intentionally placed within an information system to serve as a decoy or indicator of unauthorized access. If a honeytoken is accessed or used, it alerts security teams to potential security breaches.
Non-Repudiation
A security principle ensuring that a party in a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. This is typically achieved through the use of cryptographic methods, such as digital signatures and public key infrastructure (PKI).
Five Factors of Authentication
Knowledge Factor: Something You Know, Possession Factor: Something You Have, Inherence Factor: Something You Are, Behavioral Biometrics: Something You Do, Location Factor: Somewhere You Are
PTZ
Pan-Tilt-Zoom
FRR
False Rejection Rate - How often a biometric system fails to allow a user access who should have had access
Chiper Lock
A Mechanical locking mechanism that uses a mechanical keypad for entry
Infrared Sensor
IR sensors can be either active or passive. Active IR sensors emit infrared light and measure the reflection, while passive IR sensors detect the infrared light naturally emitted by objects. Used in: Motion Detection, Remote Controls, Thermal Cameras, Temperature sensors
Microwave Sensor
A microwave sensor uses microwave radar to detect objects and motion. These sensors emit microwaves and measure the time it takes for the waves to be reflected back after hitting an object. Used in: Automatic Doors, Speed Radars, Occupancy Sensing, Motion sensors
Ultrasonic Sensor
An ultrasonic sensor uses ultrasonic sound waves to detect objects and measure distances. The sensor emits sound waves at a high frequency and measures the time it takes for the echo to return after hitting an object. Used in: Parking Assistance, Robotics, Industrial Automation
Shadow IT
A type of threat actor that creates internal threats by use of systems, devices, software, applications, and services within an organization without approval or knowledge of the organization's IT department. Does not have malicious intent.
Security Controls
Detective, Compensating, Directive, Corrective
Social Proof
A psychological and social phenomenon where individuals copy the actions of others in an attempt to reflect correct behavior for a given situation. This concept is often exploited in social engineering attacks
Typosquatting
"Typosquatting" is a form of cyber-attack where malicious actors register domain names that are similar to legitimate websites, often differing by a small typo or misspelling. Example: Real: Facebook.com | Fake: Facebo0k.com
Watering Hole Attack
A "watering hole attack" is a type of cyber-attack in which attackers compromise a specific website or set of websites that are frequently visited by a particular group, organization, or industry. The goal is to infect the visitors of these sites with malware.
Phishing
Phishing is a cyber-attack where attackers send fraudulent emails or messages pretending to be from reputable sources to trick individuals into revealing sensitive information, such as usernames, passwords, and credit card details.
Spear Phishing
Spear phishing is a targeted phishing attack aimed at a specific individual or organization. Attackers gather personal information about their target to craft a highly personalized and convincing email or message to deceive them into revealing sensitive information.
Whaling
Whaling is a type of phishing attack that targets high-profile individuals, such as executives or senior management, within an organization. The attacker impersonates a trusted entity to deceive the target into divulging sensitive information or authorizing significant financial transactions.
Vishing
Vishing, or voice phishing, involves attackers using phone calls to impersonate legitimate organizations or individuals to trick victims into providing personal information, such as credit card numbers or social security numbers.
Smishing
Smishing, or SMS phishing, involves attackers sending fraudulent text messages that appear to come from reputable sources. These messages often contain links or phone numbers that lead to phishing websites or prompt the victim to provide personal information.
Business Email Compromise (BEC)
Business Email Compromise (BEC) is a sophisticated phishing attack where attackers spoof or compromise a legitimate business email account to deceive employees, partners, or customers into transferring money or sensitive information. BEC often targets employees with access to company finances or valuable data.
Invoice Scam
A type of social engineering attack where cybercriminals send fraudulent invoices to a business or individual, hoping to trick the recipient into making a payment to the attacker's account.
Baiting
"Baiting" is a type of social engineering attack where an attacker entices a victim with a lure, such as a seemingly harmless or appealing object, to trick them into compromising their security.
Piggybacking
Piggybacking occurs when an unauthorized person convinces an authorized person to allow them access into the facility.
Diversion Theft
Diversion Theft is a tactic used by criminals to distract or divert attention away from a target in order to carry out a theft or other criminal activity.
Threat Vector
A threat vector is the method or avenue by which a threat actor gains access to a target system or network in order to execute an attack.
Attack Vector
An attack vector is the specific technical method or process used by a threat actor to exploit a vulnerability or execute an attack once they have gained access via a threat vector.
Boot Sector Virus
A type of virus that infects the master boot record (MBR) of a hard drive, loaded into memory upon booting to take control of the computer before the operating system is loaded.
Macro Virus
A virus written in the same macro language used for software applications, typically embedded in documents and executed when the document is opened.
Program Virus
A virus that infects executable programs or applications, executing virus code when infected programs run.
Multipartite Virus
A sophisticated virus that can infect multiple parts of a system, making it challenging to remove.
All Classification Levels (Highest to Lowest)
Top Secret
Secret
Confidential
Sensitive but Unclassified
Unclassified
Key Stretching
A technique used in cryptography to enhance the security of passwords or cryptographic keys by increasing the time and computational effort required to derive the original plaintext from its hashed form. This process makes brute-force attacks and other password cracking techniques more difficult and time-consuming. Repeatedly hashing the password to make it more random and longer than it originally appeared