Intro to InfoSec - Introduction/Overview

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/74

flashcard set

Earn XP

Description and Tags

Hack The Box - Introduction to Information Security

Last updated 7:56 PM on 4/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

75 Terms

1
New cards

Client

The node (PC/laptop/computer/phone) through which one can access resources and services via “The Internet”

2
New cards

Internet

a term for the vast Interconnected Network of servers that offer resources, services, and applications (i.e., your banking website, Hack The Box, Facebook)

3
New cards

Server

a specialized type of computer which manages, stores, and processes data, providing services and applications to other computers or devices (known as clients) over a network

4
New cards

Web Server

A server that hosts websites and serves web pages to clients over the Internet, handling requests via HTTP or HTTPS protocols.

5
New cards

Database Server

A server which manages and provides access to databases, ensuring data integrity and availability of data for applications and users

6
New cards

DNS (Domain Name System) Servers

Servers which translate domain names into IP addresses, which enables a user to access websites and its services (services which are provided by other Server types)

7
New cards

CIA Triad is comprised of:

confidentiality, integrity, availability

8
New cards

Confidentiality

  • Ensures that information is accessible only to those authorized to have access to it

  • Protects against unauthorized disclosure of information

9
New cards

How is confidentiality implemented?

  • encryption

  • access controls

  • secure communication channels

10
New cards

Integrity

  • Maintains and assures the accuracy, trustworthiness, and completeness of data over its entire lifecycle

  • Protects against unauthorized modification of information

11
New cards

How is integrity implemented?

Through measures like:

  • hashing/checksums and digital signatures

  • data validation processes

  • regular data audits to check for data accuracy

12
New cards

Availability

  • Ensures that information is accessible to authorized users and processes when needed

  • Protects against the disruption of access to information

13
New cards

How is availability implemented?

  • redundant storage

  • backups

  • disaster recovery planning

  • protective strategies against denial-of-service (DOS) attacks

14
New cards

Network

When multiple servers or computers are connected and communicate with each other, it’s called a Network

15
New cards

Cloud

Refers to data centers (typically owned by an outside company such as AWS, Azure, or Google Cloud) that offer interconnected Servers for companies and individuals to use. Useful because they allow users to quickly scale based on their real-time needs.

16
New cards

Blue Team

The team responsible for the internal security of the company; defends against cyber attacks

17
New cards

Red Team

Made up of Ethical Hackers/Pen Testers; this team simulates an actual attack on the company's systems in order to find its weaknesses.

18
New cards

Purple Team

This team consists of both Blue Team and Red Team members working together to enhance the organization's security.

19
New cards

Digital Transformation

The term used to refer to organizations/businesses bringing more services, systems, and data online

20
New cards

Castle Analogy - The Treasure

Your valuable data and info that needs protection from cyber criminals

21
New cards

Castle Analogy - The Castle Walls

Firewalls, defensive mechanisms, and encryption; anything to keep outsiders from getting in.

22
New cards

Castle Analogy - The Guards

Security protocols and access controls; measures that monitor who enters and leaves the castle.

23
New cards

Castle Analogy - The Knights

Penetration testers who simulate attacks against the "castle" (the system) in order to test the castle's defenses

24
New cards

Castle Analogy - Treasure Expansion

Digital transformation which "expands" the "castle's treasure" (aka expansion of data and info connected to the network, or the addition of new services with more zero-day vulnerabilities) which attracts more theives (i.e., the addition of an AI chatbot to a company's website)

25
New cards

Castle Analogy - The Thieves

Cyber criminals/threats who are constantly looking for ways to breach the castle's defenses.

26
New cards

Just like a castle must strengthen its defenses as it and its treasures grow, businesses/orgs must ___

Enhance their InfoSec measures as they move more services online

27
New cards

In the digital age, information/data is more valuable than ___.

oil

28
New cards

Possible Consequences of a Security Breach (list 4)

Financial Loss, Reputational Damage, Legal Ramifications, and National Security Threats

29
New cards

Generalized List of InfoSec Assets (list 8 assets)

Network Security, Application Security, Operational Security, Disaster Recovery and Business Continuity, Cloud Security, Physical Security, Mobile Security, Internet of Things (IoT) Security

30
New cards

Risk

Refers to the potential for a malicious event to occur and the amount of damage it could cause.

31
New cards

How is risk typically quantified?

In terms of how likely it is to happen and the severity of its impact.

32
New cards

Risk encapsulates both ___ and ____.

threats; vulnerabilities

33
New cards

Threat

A potential cause of an incident that could result in harm to a system or its organization

34
New cards

____ exploit the _____ of a system.

Threats; vulnerabilities

35
New cards

Vulnerability

A weakness in the system that could be exploited by a threat

36
New cards

What two factors must be present in addition to a vulnerability in order for a system to actually be compromised?

  1. A threat capable of exploiting the vulnerability

  2. The damage that results from the exploited vulnerability is significant enough for an organization to be concerned about it

37
New cards

List three potential forms that vulnerabilities can come in (not comprehensive list)

Possible options:


1. Software bugs

  1. Misconfigurations

  2. Weak security protocols and processes (i.e. protocols that allow for weak passwords)

  3. Physical (i.e., server in a room with an unlocked door, server resides in a building that is within a flood plain)

38
New cards

How are risk, threat, and vulnerability all interconnected?

  • A risk represents the potential for damage when both a threat and a vulnerability exist together

  • A threat is what could cause that damage if it exploits the vulnerability

  • A vulnerability is the weakness in the system that allows the threat to cause damage.

39
New cards

InfoSec Roles - Chief Information Security Officer (CISO)

  • Oversees the entire information security program

  • Sets overall security strategy that pen testers evaluate

40
New cards

InfoSec Roles - Security Architect

  • Designs secure systems and networks

  • Creates the systems that pen testers attempt to breach

41
New cards

InfoSec Roles - Penetration Tester

  • Identifies vulnerabilities through simulated attacks

  • Actively looks for exploits and vulnerabilities within a system, legally and ethically

42
New cards

InfoSec Roles - Incident Response Specialist

  • Manages and responds to security incidents

  • Often works in tandem with pen testers by responding to their attacks, and sharing/collaborating with them afterwards to discuss lessons learned

43
New cards

InfoSec Roles - Security Analyst

  • Monitors systems for threats and analyzes security data

  • May use pen test results to improve monitoring

44
New cards

InfoSec Roles - Compliance Specialist

  • Ensures adherance to security standards and regulations

    • i.e., Health Insurance Portability and Accountability Act (HIPAA), Anti-Money Laundering (AML), Know Your Customer (KYC), and General Data Protection Regulations (GDPR)

45
New cards

Non-repudiation

  • Ensures a party cannot deny the authenticity of their digital signature on a document or the sending of a message that they originated

  • Important in e-commerce and legal contexts

46
New cards

How is non-repudiation implemented?

  • digital signatures

  • audit logs

47
New cards

Authentication

  • Verifies the identity of a user, process, or device

  • Crucial for ensuring Confidentiality

48
New cards

How is authentication implemented?

  • passwords

  • biometrics

  • multi-factor authentication (MFA)

49
New cards

Privacy

  • Focuses on proper handling of sensitive personal information (i.e., personally identifiable information or PII)

  • Ensures compliance with data protection regulations (i.e. HIPAA or GDPR)

50
New cards

How do organizations implement privacy measures?

  • data minimization (or, only collecting data you absolutely need to for the functionality of your app or service)

  • consent management

51
New cards

List the seven Key InfoSec Processes:

  1. Risk Assessment

  2. Security Planning

  3. Implementation of Security Controls

  4. Monitoring and Detection

  5. Incident Response

  6. Disaster Recovery

  7. Continuous Improvement

52
New cards

InfoSec Processes - Risk Assessment

  • Identifies and evaluates potential threats and vulnerabilities

  • Determines the potential impact of security breaches (threats which exploit vulnerabilities)

  • Helps prioritize security efforts based on the likelihood of the threat and the impact of it on an organization

53
New cards

InfoSec Processes - Security Planning

  • Develops strategies to address identified risks

  • Creates policies and procedures to guide security efforts

  • Allocates resources for security initiatives

54
New cards

InfoSec Processes - Implementation of Security Controls

  • Puts security plans into action

  • Involves deploying technical solutions and enforcing policies

  • Includes both preventative and detective controls

55
New cards

InfoSec Processes - Monitoring and Detection

  • Aims to identify security incidents as quickly as possible

  • Continuously watches for security events and anomalies (things outside of the ordinary)

  • Uses tools like SIEM (Security Information and Event Management) systems and intrusion detection systems

56
New cards

InfoSec Processes - Incident Response

  • Reacts to detected security incidents

  • Follows established procedures to contain and mitigate threats

  • Includes steps like isolation, eradication, and recovery

57
New cards

InfoSec Processes - Disaster Recovery

  • Focuses on restoring systems and data after a major security incident

  • Involves implementing backup and redundancy measures

  • Aims to minimize downtime and data loss

58
New cards

InfoSec Processes - Continuous Improvement

  • Reviews and learns from security incidents and near-misses

  • Updates security measures based on new threats and technologies

  • Involves regular security assessments and audits

59
New cards

List the primary purposes of InfoSec that HTB describes (name only):

  1. Protecting sensitive data from unauthorized access

  2. Ensuring business continuity

  3. Maintaining regulatory compliance

  4. Preserving brand reputation

  5. Safeguarding intellectual property

  6. Enabling secure digital transformation

60
New cards

List the 8 common categories of InfoSec tools described by HTB:

  1. Firewalls

  2. Intrusion Detection/Prevention Systems (IDS/IPS)

  3. Security Information and Event Management (SIEM) systems

  4. Vulnerability scanners

  5. Penetration testing tools

  6. Encryption tools

  7. Access control systems

  8. Security awareness training platforms

61
New cards

InfoSec Tools - Firewalls

Control incoming and outgoing network traffic

62
New cards

InfoSec Tools - Intrusion Detection/Prevention Systems (IDS/IPS)

Monitor for and block suspicious activities

63
New cards

InfoSec Tools - Security Information and Event Management (SIEM) systems

Collect and analyze security event data

64
New cards

InfoSec Tools - Vulnerability scanners

Identify potential weaknesses in systems and applications

65
New cards

InfoSec Tools - Penetration testing tools

Tools used to simulate attacks in order to find vulnerabilities (i.e., Metasploit, Burp Suite, John the Ripper)

66
New cards

InfoSec Tools - Encryption tools

  • Tools which transform readable data (plaintext) into an unreadable format (ciphertext) to protect it from unauthorized access

  • Protects data confidentiality and integrity

67
New cards

InfoSec Tools - Access control systems

Tools to manage user permissions (access levels) and user authentication

68
New cards

InfoSec Tools - Security awareness training platforms

Platforms used to educate users within an organization/business about security best practices as well as the org/business’s specific security protocols and procedures

69
New cards

Technology/Applications all Pen Testers should be familiar with:

  • Linux, Windows, MacOS

  • Nmap

  • Wireshark

  • Metasploit

  • Burp Suite

  • John the Ripper

70
New cards

Nmap

A network scanning and discovery tool used in pen testing

71
New cards

Wireshark

A tool used for network protocol analysis

72
New cards

Metasploit

An exploitation framework used by pen testers

73
New cards

Burp Suite

A suite of tools used by pen testers when testing web application security

74
New cards

John the Ripper

Password cracking tool used by pen testers

75
New cards

As a pen tester, you must always ensure you have ___ _____ before conducting any security tests.

Proper authorization