Threat Consequences

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

threat consequences

violations of the CIA triad resulting from threats

2
New cards

what are the 4 primary threat consequences, and what are they a threat to?

  • unauthorized disclosure - confidentiality

  • deception - integrity

  • disruption - availability, integrity

  • usurpation - integrity

3
New cards

unauthorized disclosure

exposing of confidential information

4
New cards

exposure, interception, inference, and intrusion are all examples of ____

unauthorized disclosure

5
New cards

exposure

release of sensitive data

6
New cards

interception

directly obtaining sensitive data through vulnerabilities

7
New cards

inference

using adjacent data to lead to finding specific data

8
New cards

intrusion

obtaining unauthorized access through bypassing protocols

9
New cards

Having your login credentials exposed through a hacker using an non-secure wi-fi network is an example of ___

interception

10
New cards

Hacking into a customer database is an example of ___

intrusion

11
New cards

deception

sending false data such that an authorized entity believes it is true

12
New cards

masquerade, falsification, and repudiation are all examples of ____

deception

13
New cards

masquerade

posing as an authorized entity

14
New cards

falsification

modifying data into being false

15
New cards

repudiation

framing or denying responsibility of changing data

16
New cards

A student hacker hacking into Canvas to change their grades is an example of ____

falsification

17
New cards

Trojan horse programs are an example of

masquerade

18
New cards

usurpation

shift in control in an unauthorized entity

19
New cards

misappropriation and misuse are both examples of ____

usurpation

20
New cards

misuse

dubiously using a system’s function

21
New cards

misappropriation

obtaining unauthorized control over a resource

22
New cards

A tech employee stealing a computer is an example of

misappropriation

23
New cards

differentiate passive and active communication attacks

  • passive attacks seek information, but don’t affect the communication system

  • active attacks alter the communication system

24
New cards

release of message contents and traffic analysis are both examples of ____ communication attacks

passive

25
New cards

release of message contents

wiretapping to obtain sensitive information

26
New cards

traffic analysis

inferencing how/why/where information is being exchanged

27
New cards

replay, masquerade, modification, and denial of services are all examples of ____ communication arracks

active

28
New cards

replay

maliciously looping a function

29
New cards

A hacker has repeating the relay of a telegram to the bank for withdrawal is an example of ____

replay

30
New cards

A hacker changing the names on a guest-list email is an example of ____

modification of messages

31
New cards

A foreign government discreetly cutting of a country’s ability to relay messages is an example of ____

denial of service

32
New cards

human attack surface

human error vulnerability

33
New cards

A complicated password system that forces employees to write their passwords on a piece of paper is an example of ____

human attack surface