1/68
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Accounting
To create and preserve a record of who accessed the enterprise network, what resources they accessed, and when they disconnected from the network.
agentless software
Software in which no additional processes are required to run in the background.
applications
Software programs.
attack surface (threat vector)
Digital platform that threat actors target for their exploits.
attributes of actors
Characteristic features of the different groups of threat actors.
authentication
Act of verifying that credentials are authentic and not fabricated.
authentication, authorization, and accounting (AAA)
Providing a framework to control access to computer resources.
authorization
Granting permission to take an action.
availability
Procedures that ensure data is accessible to only authorized users and not to unapproved individuals.
blackmail
Threat actor's motivation of extortion or coercion by threat.
client-based software
Software applications installed on a computer connected to a network.
compensating controls
Controls that provide an alternative to normal controls that for some reason cannot be used.
confidentiality
Procedures that ensure only authorized parties can view the information.
confidentiality, integrity, and availability (CIA)
Three basic security protections that must be extended over the information.
control
Safeguard employed within an enterprise to protect the CIA of information. Also called a countermeasure.
corrective controls
Controls intended to mitigate or lessen the damage caused by the incident.
data exfiltration
Threat actor's motivation of unauthorized copying of data.
default credentials
Preselected options for authentication.
detective controls
Controls designed to identify any threat that has reached the system.
deterrent controls
Controls that attempt to discourage security violations before they occur.
directive controls
Controls designed to ensure that a particular outcome is achieved.
disruption/chaos
Threat actor's motivation to produce extreme confusion.
end-of-life (EOL)
End of a product's manufacturing lifespan.
espionage
Threat actor's motivation of spying.
ethical
Threat actor's motivation of sound moral principles.
file-based
Attacks that focus on infecting individual files on a computer.
financial gain
Threat actor's motivation of earning revenue.
firmware
Software embedded into hardware
hacktivists
Threat actors who are strongly motivated by philosophical or political beliefs.
hardware provider
Type of supply chain for distributing computer hardware.
image-based
Attacks that focus on an image or copy of all a computer's contents.
insider threat
Employees, contractors, and business partners who pose a threat from the position of a trusted entity.
Instant messaging (IM)
Technology that allows users to send real-time messages through a software application over the Internet and is not restricted to a cell phone.
integrity
Procedures that ensure that the information is correct and no unauthorized person or malicious software has altered the data.
internal/external
Attribute of threat actors of origination from within the enterprise or outside it.
legacy platform
Older hardware platform for which there is a more modern version available but for a variety of reasons has not been updated or replaced.
level of sophistication/capability
Attribute of threat actors of a high level of power and complexity.
malicious update
Attack in which a software update is infected with malware and distributed.
managed service providers (MSPs)
IT service providers who manage networks, computers, cloud resources, and information security for small-to-medium enterprises.
managerial controls
Controls that use administrative methods.
message-based
Communication tools that are popular threat vectors by attackers.
misconfigurations
Erroneous technology settings.
nation-state actors
Threat actors who are employed by their own government to carry out attacks.
open service ports
Unnecessary ports that are not disabled.
operational controls
Controls that are implemented and executed by people.
organized crime
Close-knit group of highly centralized enterprises set up for the purpose of engaging in illegal activities.
OS-based vulnerabilities
Vulnerabilities found within operating systems.
philosophical/political beliefs
Threat actor's motivation of ideology for the sake of principles.
physical controls
Controls that implement security in a defined structure and location.
preventive controls
Controls used to prevent the threat from coming in contact with the vulnerability.
removable devices
Media devices like a USB flash drive.
resources/funding
Attribute of threat actors of an extensive network of resources.
revenge
Threat actor's motivation of avenging by retaliation.
service disruption
Threat actor's motivation of obstructing the normal business electronic processes.
service providers
Businesses that furnish solutions or services to users and organizations.
shadow IT
Process of bypassing corporate approval for technology purchases.
Short Message Service (SMS)
Messaging that uses a cellular network and is typically sent by a cell phone.
software provider
Type of supply chain for distributing computer software.
suppliers
First step in a supply chain that provides raw materials.
supply chain
Network that moves a product from its creation to the end-user.
technical controls
Controls that are incorporated as part of hardware, software, or firmware.
threat actor
Individual or entity who is responsible for attacks.
unsecure networks
Wired and wireless networks that lack security.
unskilled attackers
Individuals who want to perform attacks yet lack the technical knowledge to carry them out.
unsupported systems and applications
Computer systems and applications no longer supported by the organization that are often ignored and do not receive security updates.
vendors
Entities in a supply chain who purchase products for resale.
vulnerable software
Software that contains one or more security vulnerabilities.
war
Threat actor's motivation of armed hostile combat.
zero-day
Vulnerability for which there are no days of advanced warning.