ISDS 4096 Exam 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/150

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:16 PM on 3/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

151 Terms

1
New cards

CIA triad

confidentiality, integrity, availability

2
New cards

confidentiality

only authorized users can view information

focus: secrecy and limiting access

3
New cards

integrity

information is complete and unaltered; only authorized users can change info

focus: correctness and protection from improper modification

4
New cards

availability

information is accessible by authorized users whenever they request the info

focus: uptime, access, reliability

5
New cards

easy CIA comparison

confidentiality = who can see it

integrity = can it be trusted

availability = can it be accessed

6
New cards

DAD triad

disclosure, alteration, destruction

7
New cards

disclosure

information exposed to unauthorized parties; violation of confidentiality

8
New cards

alteration

information is changed improperly; violation of integrity

9
New cards

destruction

information or systems are destroyed, denied, or made inaccessible; violation of availability

10
New cards

easy DAD comparison

exposed data = disclosure = confidentiality problem

changed data = alteration = integrity problem

unavailable system = destruction/denial = availability problem

11
New cards

authenticity

assurance that data is genuine and originates from its claimed source

12
New cards

nonrepudiation

assurance that someone can't deny performing an action/sending a communication

13
New cards

AAA services

identification, authentication, authorization, auditing, accounting

14
New cards

identification

claiming an identity

examples: entering username, swiping ID badge, typing employee number

15
New cards

authentication

proving the identity

examples: password, fingerprint, code from authenticator app

16
New cards

authorization

determining what actions are allowed

examples: whether user can view payroll files, whether employee can edit records, whether admin can install software

17
New cards

auditing

recording and reviewing user/system activity

example: reviewing logs

18
New cards

accounting

tracking actions to a user so responsibility can be assigned

example: recording which user modified a database record

19
New cards

security governance and planning

exists at multiple levels and should align with organization's goals, mission, and objectives

20
New cards

strategic plan

long-term plan that defines organization's security purpose and aligns security with business goals

useful for 5 years, should include risk assessment

21
New cards

tactical plan

midterm plan that provides more detail on how to accomplish strategic goals

useful for a year, prescribes and schedules tasks to accomplish organizational goals

examples: project plans, acquisition plans, budget plans, etc.

22
New cards

operational plan

short-term, highly detailed plan that explains how to carry out goals in practice

based on strategic and tactical plans; daily operations, detailed procedures, staffing

examples: training plans, system deployment plans, product design plans

23
New cards

due diligence

establishing plans, policies, and processes to protect organization; knowing what should be done and planning for it

understand risk and create right framework

example: organization performs risk assessment and writes security policy

24
New cards

due care

practicing activities that maintain protection; doing right action at right time

example: organization actually enforces MFA and trains employees

25
New cards

policy

short written statement defining course of action for entire organization

26
New cards

standard

detailed written definition of how software and hardware are to be used

27
New cards

procedure

written instructions for how to use policies and standards

28
New cards

guideline

suggested course of action for using a policy, standard, or procedure

29
New cards

threat modeling

thinking through how system could be attacked -> identifying possible threats before incident happens -> prioritizing threats so defenses can be chosen

two major tools: STRIDE (categorizing threats) and DREAD (prioritizing threats)

30
New cards

STRIDE

spoofing, tampering, repudiation, information disclosure, denial of service, elevation of privilege

31
New cards

spoofing

gaining access through falsified identity

examples: fake user account identity, impersonating a trusted sender, fake login credentials

32
New cards

tampering

unauthorized changes or manipulation of data

examples: editing records, modifying files, changing packets in transit

33
New cards

repudiation

ability to deny having performed an action (by maintaining plausible deniability); can result in innocent third parties being blamed for security violations

examples: user denies sending a transaction, malicious actor tries to avoid accountability

34
New cards

information disclosure

disclosure of private or controlled information to unauthorized entities

examples: leaked customer data, exposed health records, unauthorized file access

35
New cards

denial of service

attack that prevents authorized use of a resource/makes a service unavailable

examples: traffic flooding, resource exhaustion, deliberate outage-causing attack

36
New cards

elevation of privilege

turning a limited account into one with greater privileges

examples: normal user becoming admin, application exploit leading to root access

37
New cards

STRIDE review

fake identity -> spoofing

data changed -> tampering

deny action -> repudiation

secret exposed -> information disclosure

service unavailable -> denial of service

user gains extra permissions -> elevation of privilege

38
New cards

Why is diagramming used in threat modeling?

to reveal where a technology or system might be attacked, so threats can be identified and prioritized

help reveal attack points and trust concerns; STRIDE used to categorize possible threats found in design and DREAD used afterward to prioritize them

39
New cards

DREAD

scoring criteria: damage potential, reproducibility, exploitability, affected users, discoverability

40
New cards

how to use DREAD?

rank each threat from 1 to 10 on all 5 criteria

add the scores

divide by 5

result = numeric score between 1 and 10 (higher score = more serious threat)

41
New cards

damage potential

how severe the harm would be if threat occurs

42
New cards

reproducibility

how easily the attack can be repeated

43
New cards

exploitability

how hard or easy it is to perform the attack

44
New cards

affected users

how many users are likely to be impacted (percentage)

45
New cards

discoverability

how easy it is for attacker to discover the weakness

46
New cards

defense in depth

using multiple layers of security controls so one failed control doesn't leave the system unprotected

example: firewall + logging + endpoint protection

47
New cards

What determines whether people are a risk or an asset?

training, motivation, security design

48
New cards

job descriptions

define roles and responsibilities to reduce misuse and confusion

49
New cards

acceptable use policy (AUP)

defines allowed and prohibited use of company resources

50
New cards

non-disclosure agreement (NDA)

prevents employees from sharing confidential info

51
New cards

principle of least privilege

users receive only minimum access needed to perform their job

52
New cards

privilege creep

accumulation of excessive access over time

53
New cards

separation of duties

dividing critical tasks among multiple people to prevent fraud

54
New cards

job rotation

switching roles periodically to uncover fraud

55
New cards

user behavior analytics (UBA)

monitoring user behavior to detect anomalies

56
New cards

offboarding

removing access and credentials when an employee leaves

57
New cards

social engineering

manipulating people to reveal information or perform unauthorized actions

58
New cards

phishing

mass email attack to steal information

59
New cards

spear phishing

targeted phishing attack

60
New cards

whaling

targeting high-value individuals

61
New cards

business email compromise (BEC)

impersonating executives to commit fraud

62
New cards

prepending

adding misleading prefixes like RE:, FW:, INTERNAL:

63
New cards

baiting

luring victims with something enticing (e.g. infected USB)

64
New cards

tailgating

following someone into a restricted area

65
New cards

shoulder surfing

watching someone enter sensitive info

66
New cards

dumpster diving

searching trash for sensitive data

67
New cards

credential hijacking

stealing and using login credentials

68
New cards

invoice scam

fake invoice used to trick payment

69
New cards

hoax

tricking users into harmful actions

70
New cards

risk management

process of identifying, assessing, and responding to risk

71
New cards

threat agent

entity that carries out an attack

72
New cards

threat event

actual occurrence of an attack or incident

73
New cards

threat vector

path used to attack (email, USB, network, etc.)

74
New cards

vulnerability

weakness that can be exploited

75
New cards

risk

likelihood and impact of a threat exploiting a vulnerability

76
New cards

safeguard (control)

measure that reduces risk

77
New cards

attack

attempt to exploit a vulnerability

78
New cards

breach

successful attack

79
New cards

risk relationship

threat + vulnerability = risk

80
New cards

risk responses

avoid, mitigate, transfer, accept

81
New cards

asset valuation purpose

justifies security controls and prioritizes protection

82
New cards

NIST Cybersecurity Framework

identify, protect, detect, respond, recover

83
New cards

NIST Risk Management Framework (RMF)

prepare, categorize, select, implement, assess, authorize, monitor

84
New cards

risk maturity model levels

ad hoc, preliminary, defined, integrated, optimized

85
New cards

end of life (EOL)

product no longer produced

86
New cards

end of support (EOS/EOSL)

product no longer receives updates

87
New cards

incident

any event negatively affecting CIA

88
New cards

security incident

malicious or intentional attack event

89
New cards

incident response steps

detection, response, mitigation, reporting, recovery, remediation, lessons learned

90
New cards

detection methods

IDS, antivirus, logs, user reports

91
New cards

preventive controls

stop attacks before they occur

92
New cards

detective controls

identify attacks after they occur

93
New cards

botnet

network of infected systems controlled by an attacker

94
New cards

command and control (C2)

system used to control botnets

95
New cards

denial of service (DoS)

attack that disrupts system availability

96
New cards

distributed DoS (DDoS)

multiple systems attacking one target

97
New cards

SYN flood

DOS attack exploiting TCP handshake

98
New cards

smurf attack

ICMP flooding attack

99
New cards

fraggle attack

UDP flooding attack

100
New cards

ping flood

overwhelming system with ping requests

Explore top flashcards

flashcards
APUSH Progressive Era PEDLIGS
84
Updated 907d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 98d ago
0.0(0)
flashcards
Latin and Greek Roots List 1-3
75
Updated 333d ago
0.0(0)
flashcards
Numbers 1 - 20
20
Updated 528d ago
0.0(0)
flashcards
Business Law - Midterm
126
Updated 186d ago
0.0(0)
flashcards
La inmigración
45
Updated 488d ago
0.0(0)
flashcards
APUSH Progressive Era PEDLIGS
84
Updated 907d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 98d ago
0.0(0)
flashcards
Latin and Greek Roots List 1-3
75
Updated 333d ago
0.0(0)
flashcards
Numbers 1 - 20
20
Updated 528d ago
0.0(0)
flashcards
Business Law - Midterm
126
Updated 186d ago
0.0(0)
flashcards
La inmigración
45
Updated 488d ago
0.0(0)