Information Security Midterm

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/97

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards

Threat

objects, persons or other entities representing potential dangers to assets

2
New cards

something with the potential to do harm

3
New cards

Vulnerability

A weakness that may be exploited by a Threat

4
New cards

a weakness or fault which decreases security

5
New cards

Attack

An act that attempts to exploit a vulnerability, the “realization” of a threat; any unauthorized cyber act aimed at violating the security policy of a cyber-asset and causing damage, disruption or disruption of the services or access to the information of the said national cyber asset

6
New cards

Information Security

Protection of the confidentiality, integrity, and availability

7
New cards

Confidentiality

Controlling and preventing unauthorized access and/or disclosure of company data; the principle that only authorized sources can access sensitive information and functions

8
New cards

Integrity

Data which has not been tampered with; the principles that only authorized individuals and resources may add, modify, or delete sensitive information and features

9
New cards

Availability

Timely and reliable access to data; the principles that systems, functions, and data must be available on demand upon agreed parameters based on SLA service level

10
New cards

DoS (Denial of Service)

An attack which attempts to overload a target host so that it cannot respond to legitimate requests, thus effectively taking the provided service off-line

11
New cards

DDoS (Distributed Denial of Services)

A DoS attack which coordinates multiple attackers (often distributed systems) to provide a greater attack volume simultaneously

12
New cards

Smurf Attack

When a computer sends a broadcast message to a bunch of computers in a network spoofing to be the victim computer, resulting in all those computers responding to the victim computer

13
New cards

Verification of Web User Input

An effective countermeasure against attacks like Command Injection

14
New cards

Backdoor

Writing in additional code which allows access bypassing authentication

15
New cards

Sniffer

A program that eavesdrops on routed information and looks for specific information such as passwords by examining each packet in the data stream

16
New cards

Cyber Kill Chain

Phases of an attack, where stopping any phase will interrupt the attack

17
New cards

Ransomware

An attack method where information is stolen/encrypted and compensation is demanded for its return or to not disclose it

18
New cards

Intellectual Property (IP)

Creations of the mind, such as inventions literary and artistic works;  designs and symbols, names and images used in commerce

19
New cards

Quality of Service Deviations

Products or services not delivered as expected, which can be inbound from suppliers or outbound to customers

20
New cards

Deprecated

A feature that may be left in a system temporarily, may have known exploits, may disappear in future releases, and has no support (maintenance discontinued)

21
New cards

Verizon DBIR (Data Breach Investigations Report)

A report that provides summaries of findings on known initial access vectors, human involvement in breaches, DDOS by industry/organization, and patterns over time in educational services breaches

22
New cards

Tempest Attack

A side-channel attack that passively monitors acoustic, electrical, or other emissions to gain confidential information

23
New cards

Zero Day

A vulnerability of an app or system where the vendor does not have a fix

24
New cards

Spoofing

Masquerading as another person or IP address

25
New cards

Man-in-the-Middle (MitM)

An attacker inserting themselves between the victim and the victim’s intended destination, relaying communications

26
New cards

Brute Force Attack

Attempting every possible combination of characters to crack a password

27
New cards

TCP (Transmission Control Protocol)

A network protocol that ensures reliable, in-order delivery, handles congestion/flow control, and requires connection setup ensures your data arrives at its destination

28
New cards

UDP (User Datagram Protocol)

A network protocol that provides unreliable, unordered delivery  known as a fire and forget protocol

29
New cards

DMZ (Demilitarized Zone)

A network area that isolates a LAN from an untrusted network data should not be stored in the DMZ of the network

30
New cards

Port

A service used in networking to tie communications to a service

31
New cards

DHCP Required Information

IP Address, Subnet Mask, Router IP, and DNS IP

32
New cards

DNS (Domain Name System)

The service that converts a web address to an IP Address

33
New cards

Rubber Ducky

Appears to be a drive but the computer thinks it is a keyboard  typically executes a "reverse" shell when plugged in

34
New cards

McCumber Cube States of Data

Store, Process, and Transmit

35
New cards

McCumber Cube Countermeasures (Categories)

Policy, Education / Awareness, and Technology

36
New cards

Software Development Tradeoff

Fast, good, or cheap - pick two

37
New cards

Policy (Information Security)

Defines authority and the rules by which organizations will manage risk like a company’s laws

38
New cards

Standard (Information Security)

Defines the minimum requirements to comply; minimum specifications for compliance

39
New cards

Guideline (Information Security)

Defines recommended steps to comply; recommendations for compliance

40
New cards

Employee Risk/Asset

Employees simultaneously represent an organization’s most valuable resource and its greatest risk

41
New cards

RAID (Redundant Arrays of Inexpensive Disks)

A method of implementing storage mostly intended to improve redundancy

42
New cards

Security by Design

The process of building in security before developing and implementing a product

43
New cards

ARPANET

Developed by the Advanced Research Projects Agency (ARPA) Network in the 1960s

44
New cards

The Internet

Created based on the ARPANet

45
New cards

CIO (Chief Information Officer)

Accountable for the management, implementation, and usability of information and computer technologies

46
New cards

CISO (Chief Information Security Officer)

Accountable for an organization's information, data, and system security

47
New cards

Industrial Standard Framework Creators

NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), and CIS (Center for Internet Security)

48
New cards

Training (Security)

Formal and job specific education

49
New cards

Awareness (Security)

Focusing attention on security; provides a basic understanding of the need for security

50
New cards

Data Steward

Accountable for the security and use of a set of information; appointed by the data trustee to oversee the management of a particular set of information

51
New cards

Data Custodian

Responsible for implementation of security of information and systems that process, transmit, and store it

52
New cards

Framework (Information Security)

Provides a common language and describes an org's security posture

53
New cards

Exploit

A technique used to compromise an information system

54
New cards

Countermeasure (Control/Safeguard)

An implementation or policy intended to improve security against a threat

55
New cards

Access

The ability to interact with a resource, legitimately or not

56
New cards

Enigma Machine

Had the purpose of encrypting/decrypting data

57
New cards

Data Classification Purpose

To identify the type of data and where it is

58
New cards

Ethics

Rules and practices, enforced by society and personal interaction, which define socially acceptable behavior; they are not enforced by the government

59
New cards

Policies vs Laws (Hierarchy)

Policies are a business’s “laws,” but they can never supersede actual laws

60
New cards

Right to Work

Means you are not forced to join a union

61
New cards

At Will Employment

If no contract exists, either party may sever a relationship for any reason

62
New cards

Due Diligence

Taking steps to ensure compliance with a law, regulation, or other requirement for the systems and data you have in an organization

63
New cards

Due Care

Ensuring the continued compliance; ongoing efforts to keep data and systems secure

64
New cards

FOIA (Freedom of Information Act of 1966)

Allows citizens to request public records from federal agencies

65
New cards

Ohio Sunshine Laws (Ohio Public Record Act)

Provides citizens steps to request public records from Ohio government

66
New cards

FERPA (Family Educational Rights and Privacy Act)

A regulation for the protection of student data

67
New cards

HIPAA (Health Insurance Portability and Accountability Act of 1996)

A regulation for the protection of medical data

68
New cards

Information Aggregation

Information assembled from multiple sources to gather a greater understanding

69
New cards

Intellectual Property

Creations of the mind, such as inventions; literary and artistic works. Designs and symbols, names and images used in commerce

70
New cards

Identity Theft

Occurs when someone steals a victim’s personally identifiable information (PII) and poses as the victim to conduct actions/make purchases

71
New cards

USA PATRIOT Act of 2001

Gave broader latitude in order to combat terrorism-related activities

72
New cards

PCI DSS (Payment Card Industry Data Security Standards)

A standard of performance (not a law) developed by major credit card providers (Visa, MC, Discover, etc.) to which organizations processing payment cards must comply

73
New cards

Responding to Identity Theft (FTC initial step)

Place an initial fraud alert

74
New cards

CISA (Cybersecurity and Infrastructure Security Agency)

Offers services to government, industry, and the private sector; part of the DHS

75
New cards

NSA (National Security Agency)

The nation’s cryptologic organization; responsible for signal intelligence and information assurance (security)

76
New cards

FBI (Federal Bureau of Investigation)

Primary law enforcement agency that investigates traditional crimes and cybercrimes

77
New cards

Risk Identification

Identifying risk and assessing the magnitude

78
New cards

Four Methods of Risk Control (Treatment)

Accept, Avoid, Mitigate, and Transfer

79
New cards

Risk Formula

Likelihood * Impact

80
New cards

Risk Appetite

The amount of risk a company is willing to accept

81
New cards

Risk Tolerance

The assessment of the amount of risk an organization is willing to accept for a particular information asset; how much variation you can allow for a specific need

82
New cards

Residual Risk

The amount of risk remaining after risk control measures are taken; the risk to information assets that remains even after current controls have been applied

83
New cards

Risk Treatment: Accept

The decision to do nothing beyond the current level of protection

84
New cards

Risk Treatment: Avoid

The intentional choice not to do what is causing the risk

85
New cards

Risk Treatment: Mitigate

Reduces the risk by improving security

86
New cards

Risk Treatment: Transfer

Letting another party handle the risk

87
New cards

Cost-Benefit Analysis (CBA)

Evaluating the value of assets to be protected compared with the expense of the protection

88
New cards

SLA (Service Level Agreement)

An effective agreement needed when transferring risk to another party

89
New cards

ALE (Annual Loss Expectancy)

The acronym for measuring the amount of loss in a year

90
New cards

ALE Formula

SLE * ARO (Single Loss Expectancy * Annual Rate of Occurrence)

91
New cards

SLE Formula (Single Loss Expectancy)

Asset Value (AV) * Exposure Factor (EF)

92
New cards

Calculation Example (AV=$50k, EF=100%, ARO=0.5)

An annual loss expectancy of $25,000 ($50,000 * 100% * 0.5)

93
New cards

CIA Triad Component (5-9s)

Focused on the Availability component

94
New cards

Risk Management Responsibility (Upper Management)

Responsible to oversee, enable, and support risk management efforts of an organization

95
New cards

Analysis Paralysis

Becoming so concerned about every risk that you do not move forward

96
New cards

Third Party Risk Assessment

Evaluating a vendor’s security posture to ensure it is meeting your organization’s minimum security standards

97
New cards

Open-Source Intelligence (OSInt)

Overt data collection using publicly available resources; collecting and analyzing publicly available sources to ascertain information about a target

98
New cards

Attack Tree

Diagrams that model how attackers might try to access a system or network