1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
True or False: Threats can be eliminated
False
What are unintentional threats
Threats that do not have a perpetrator such as natural disaster, human error, simple accidents
What are intentional threats
Acts that are hostile to an organization performed by a person or a group of people
What is the principle of least privilege
Granting someone the rights to do their job and no more
What is the principle of need to know
Giving someone only the access to stuff required to complete their job and no more
What is a threat/vulnerability pair
When a threat exploits a vulnerability
What if the difference between vulnerability and mitigation
A vulnerability is the weakness and the mitigation is the actions to reduce the impact and likelihood of a vulnerability.
When exploring new mitigation techniques what elements should be kept in mind
Effectiveness of the technique and the initial and ongoing cost of it
What is the difference between a vulnerability and an exploit
An exploit is the act of taking advantage of a vulnerability
What is a DMZ
Demilitarized Zone is a buffer area between 2 firewalls that some servers may rest on
What is a script kiddie
Attackers with little to no knowledge that run scripts to see what they do
What are some steps involved in hardening a server
Changing defaults, Reducing attack surface, Update systems, Enable firewalls
What is the term where job responsibilities are divided evenly to reduce fraud
Separation of duties
What are the two main types of firewalls
Host based and network based
What US Agency regularly publishes alerts and bulletins related to security threats
US-CERT
Who is the CVE list maintained by
MITRE Corporation
What is the standard used to create information system security names
CVE
What is a security policy
A high level overview of security goals
_____ damage for the sake of doing damage and they often choose targets of oppurtunity
vandals
What is a SIEM
Security Information and Event Management platform; logs security events from across the network and analyzes it in real time
When does the threat/vulnerability pair occur
When a threat exploits a vulnerability
What can you control about threat/vulnerability pairs
The vulnerability only
______ threats are threats that are hostile to an organization
Intentional
_____ threats are threats that are not intentional to an organization
Unintentional
True or False: An IDS is meant to prevent threats from happening
False; an Intrusion Detection System only logs when someone gets in it wont prevent them