1/11
Foundational security principles (Confidentiality, Integrity, Availability) and the four main attack vectors (Remote, Adjacent, Local, Physical) that classify how attackers approach their targets based on proximity and access.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
CIA triad
The foundational security framework consisting of Confidentiality, Integrity, and Availability.
Confidentiality
Keeping sensitive information private and preventing unauthorized access to data.
Integrity
Ensuring that data is not improperly modified or tampered with during storage or transmission.
Availability
Ensuring systems, services, and data are accessible to authorized users when needed.
Attack Vector
The method or pathway an attacker uses to gain unauthorized access to a network or system.
Remote (External) Attack Vector
Attacks executed from anywhere on the internet with no prior access required, targeting public-facing infrastructure.
Adjacent (Internal) Attack Vector
Attacks requiring the attacker to be on the same local network segment (LAN, Wi-Fi, VLAN) as the target.
Local Attack Vector
Attacks requiring some level of prior access to the target system, either via credentials or through user interaction.
Physical Attack Vector
Attacks requiring direct physical access to hardware components of a system.
DDoS (Distributed Denial of Service)
A remote attack that overwhelms services with traffic from many sources to make them unavailable.
Man-in-the-Middle (MITM)
An attack where the attacker secretly intercepts and possibly alters communications between two parties.
Multi-staged Intrusion
An attack that progresses through multiple phases: initial access, lateral movement, and privilege escalation.