csc438 section2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/112

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:38 PM on 2/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

113 Terms

1
New cards

What does 'accuracy' refer to in cybersecurity?

The degree to which information is correct and reliable.

2
New cards

What is an 'advanced persistent threat' (APT)?

A prolonged and targeted cyberattack where an intruder gains access to a network and remains undetected.

3
New cards

Define 'adversary capability'.

The skills and resources that an adversary possesses to carry out an attack.

4
New cards

What is meant by 'attack vector'?

The method or pathway used by an attacker to gain access to a system.

5
New cards

What does 'Common Vulnerability Scoring System' (CVSS) provide?

A standardized framework for rating the severity of security vulnerabilities.

6
New cards

What is the 'Cyber Kill Chain™'?

A model that outlines the stages of a cyberattack, from reconnaissance to execution.

<p>A model that outlines the stages of a cyberattack, from reconnaissance to execution.</p>
7
New cards

What is 'insider threat'?

A security risk that originates from within the organization, typically involving employees or contractors.

8
New cards

What does 'open source intelligence' (OSINT) entail?

The collection and analysis of publicly available information for intelligence purposes.

9
New cards

Define 'indicator of compromise' (IoC).

A piece of forensic data that indicates a potential intrusion or breach in a system.

10
New cards

What is 'vulnerability management'?

The process of identifying, classifying, remediating, and mitigating vulnerabilities in software or hardware.

11
New cards

What does 'risk management' involve?

The identification, assessment, and prioritization of risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.

12
New cards

What is a threat actor?

A term used to describe individuals or entities responsible for cyber incidents against enterprises, governments, and users.

13
New cards

What is commodity malware?

Malware sold by other threat actors that can be customized for specific attacks.

14
New cards

What distinguishes black hat hackers?

They violate computer security for personal gain or to inflict malicious damage.

15
New cards

What is the role of white hat hackers?

They probe systems with permission to find weaknesses and report them back to the organization.

16
New cards

Define gray hat hackers.

Attackers who break into systems without permission but disclose the attack to pressure organizations into fixing vulnerabilities.

17
New cards

What are hacktivists?

Groups motivated by ideology, often making political statements or retaliating against perceived injustices.

18
New cards

What are nation-state actors?

State-sponsored attackers who launch cyberattacks against foreign governments or their own citizens to cause harm.

19
New cards

What is an insider threat?

A threat that comes from employees, contractors, or business partners of an organization.

20
New cards

What are intentional insiders?

Individuals who intentionally steal or alter data for personal gain or revenge.

21
New cards

What are unintentional insiders?

Individuals who cause harm to the organization without malicious intent, often due to carelessness.

22
New cards

What is the role of competitors as threat actors?

They may launch attacks to steal classified information to gain a competitive advantage.

23
New cards

What do brokers do in the context of cybersecurity?

They sell knowledge of vulnerabilities to other attackers or governments instead of reporting them to vendors.

24
New cards

What is cyberterrorism?

Attacks aimed at causing disruption and panic among citizens by targeting critical infrastructure.

25
New cards

How has organized crime adapted in the digital age?

They have shifted from traditional crimes to online attacks that are more rewarding and less risky.

26
New cards

What is shadow IT?

When employees install their own equipment or software in violation of company policies due to frustration with slow technology acquisition.

27
New cards

What are known knowns in cybersecurity threats?

Threats that both threat actors and security personnel are aware of, such as established viruses.

28
New cards

What are known unknowns?

Vulnerabilities that organizations are aware of but have not been discovered by outside threat actors.

29
New cards

Define unknown knowns.

Threats known to threat actors but not to security professionals, often referred to as zero-day attacks.

30
New cards

What are unknown unknowns?

Security threats that are hidden from both threat actors and security professionals.

31
New cards

What is the goal of nation-state actors in cyberattacks?

To cause financial harm to businesses in foreign countries or damage the reputation of enterprises.

32
New cards

What motivates hacktivists today?

They may spread fake news and support conspiracy theories in addition to making political statements.

33
New cards

What is the primary motivation of organized crime in cyberattacks?

To engage in more rewarding and less risky online criminal activities.

34
New cards

What is the primary characteristic of gray hat hackers?

They operate without permission but do not seek personal gain from their actions.

35
New cards

What is a common consequence of insider threats?

Data theft or alteration that can harm the organization's resources and reputation.

36
New cards

What is the significance of the Johari Window in cybersecurity?

It helps categorize and understand the visibility of threats in relation to knowledge among threat actors and security professionals.

37
New cards

What type of hacker attempts to probe a system with permission?

White hat hackers.

38
New cards

What is the main difference between intentional and unintentional insiders?

Intentional insiders act with malicious intent, while unintentional insiders cause harm without malicious intent.

39
New cards

What are white hat hackers?

Ethical attackers who probe systems for weaknesses with permission and report findings to the organization.

40
New cards

What is a Key Risk Indicator (KRI)?

A metric indicating the upper and lower bounds of specific indicators of normal network activity.

41
New cards

What is an Indicator of Compromise (IoC)?

Evidence that malicious activity is occurring, often in the early stages of an attack.

42
New cards

How can sharing IoC information benefit organizations?

It aids predictive analysis and helps discover attacks before they escalate.

43
New cards

What are the areas that threat intelligence sharing can aid?

Incident response, vulnerability management, risk management, security engineering, and detection and monitoring.

44
New cards

What is the intelligence cycle?

The process through which raw cybersecurity data is transformed into useful threat intelligence.

45
New cards

What is the first step of the intelligence cycle?

Requirements: Setting high-level goals for the threat intelligence program.

46
New cards

What does the collection step in the intelligence cycle involve?

Gathering information from internal networks, security devices, and external sources like security news and forums.

47
New cards

What happens during the analysis phase of the intelligence cycle?

Processing collected data into usable information.

48
New cards

What is the purpose of the dissemination phase in the intelligence cycle?

Making decisions on how the information should be acted upon and distributed.

49
New cards

What is the feedback phase in the intelligence cycle?

Evaluating the effectiveness of threat intelligence decisions and using that feedback to improve future requirements.

50
New cards

What are the two categories of threat intelligence sources?

Open Source Intelligence (OSINT) and Closed Source Intelligence.

51
New cards

What is Open Source Intelligence (OSINT)?

Threat intelligence that is freely available to the public.

52
New cards

What are the two types of OSINT?

Public lists of threat indicators and formalized sharing through trusted communities.

53
New cards

What services does the Cyber Information Sharing and Collaboration Program (CISCP) provide?

Analyst-to-analyst exchanges, analytical products, cross-industry orchestration, and digital malware analysis.

54
New cards

What are information sharing and analysis communities?

Organizations that share OSINT unique to their specific industry.

55
New cards

What is a challenge of Open Source Intelligence?

Data comes from various sources and formats, making consistency and relevance a concern.

56
New cards

What is the solution to address data variety in OSINT?

Formatting data in the eXtensible Markup Language (XML).

57
New cards

What are the three elements that differentiate data, information, and knowledge?

Data: discrete facts; Information: organized data with meaning; Knowledge: expertise applied to information.

58
New cards

What is an example of data?

Discrete facts like '141, 700, A, 701, B'.

59
New cards

What is an example of information?

Organized data such as 'Course 141-700 is offered in the A-Term'.

60
New cards

What is an example of knowledge?

Expert skills applied to information, like 'Enrollment in CIS 141/700 A-Term has increased over CIS 141/701 in the B-Term'.

61
New cards

What is the purpose of the feedback phase in the intelligence cycle?

To assess the effectiveness of decisions and improve future intelligence cycles.

62
New cards

What question does feedback in the intelligence cycle aim to answer?

'What did we do right, and what did we do wrong?'

63
New cards

What is the purpose of the Cybersecurity Information Sharing Act (CISA)?

CISA provides authority for cybersecurity information sharing between the private sector, state and local governments, and the federal government.

64
New cards

What does the Freedom of Information Act (FOIA) allow the public to do?

FOIA allows the public to request access to records from any federal agency, with certain exemptions.

65
New cards

What is the Traffic-Light Protocol (TLP)?

TLP is a set of designations used to ensure that sensitive information is shared only with the appropriate audience, indicated by four colors: red, amber, green, and white.

66
New cards

What does the Protected Critical Infrastructure Information (PCII) Act protect?

PCII protects private sector infrastructure information that is voluntarily shared with the government for homeland security.

67
New cards

What is Closed Source Intelligence?

Closed Source Intelligence is proprietary information owned by an entity with exclusive rights, requiring investigation based on specific criteria.

68
New cards

What are vulnerability databases?

Vulnerability databases are repositories of known vulnerabilities and information about how they have been exploited.

69
New cards

What is the correct order of the intelligence cycle?

Requirements, collection, analysis, dissemination, and feedback.

<p>Requirements, collection, analysis, dissemination, and feedback.</p>
70
New cards

What is a cybersecurity framework?

A cybersecurity framework is a series of documented processes used to define policies and procedures for implementing and managing security controls.

71
New cards

What is the MITRE ATT&CK framework?

MITRE ATT&CK is a knowledge base of attacker techniques that have been classified in detail.

72
New cards

What does the Diamond Model of Intrusion Analysis examine?

The Diamond Model examines network intrusion events.

73
New cards

What is the Cyber Kill Chain™?

The Cyber Kill Chain™ is a set of steps used to break into a web server or computer network, based on a military targeting process.

74
New cards

What is reputational research in cybersecurity?

Reputational research involves looking into past actions and tracking the credibility of web domains.

75
New cards

What is behavioral research in cybersecurity?

Behavioral research acknowledges the importance of human behavior in designing and using cybersecurity technology.

76
New cards

What is the Common Vulnerability Scoring System (CVSS)?

CVSS assigns a numeric score to vulnerabilities based on factors like access vector, attack complexity, and system integrity.

77
New cards

Why might vulnerabilities with higher CVSS scores not be prioritized first?

Not all high CVSS vulnerabilities are equally damaging; circumstances must also be considered.

78
New cards

What is Automated Indicator Sharing (AIS)?

AIS is a method for computer-to-computer communication to distribute threat intelligence quickly.

79
New cards

What are threat maps?

Threat maps illustrate cyber threats overlaid on a geographical representation.

<p>Threat maps illustrate cyber threats overlaid on a geographical representation.</p>
80
New cards

What role do file and code repositories play in cybersecurity?

They allow victims of attacks to upload malicious files and software code for examination.

81
New cards

What is the significance of the year 2015 in cybersecurity legislation?

In 2015, the Cybersecurity Information Sharing Act (CISA) was passed.

82
New cards

What is the main goal of the intelligence cycle?

The main goal is to set high-level objectives for the intelligence program and ensure effective information use.

83
New cards

What is the importance of feedback in the intelligence cycle?

Feedback assesses the effectiveness of the threat intelligence and informs future actions.

84
New cards

What does the term 'cyber threat intelligence' refer to?

Cyber threat intelligence refers to information that helps organizations understand and mitigate cyber threats.

85
New cards

What is the role of human behavior in cybersecurity?

Human behavior can significantly impact the effectiveness of cybersecurity measures, as users may inadvertently engage with threats.

86
New cards

What is the purpose of sharing limitations in the Traffic-Light Protocol?

To ensure that sensitive information is only shared with the appropriate audience.

87
New cards

What is the significance of the year 1967 in relation to FOIA?

The Freedom of Information Act (FOIA) was passed in 1967.

88
New cards

What factors are considered in behavioral research?

It acknowledges human behavior, such as users clicking on malicious links or attachments.

89
New cards

What does CVSS stand for?

Common Vulnerability Scoring System.

90
New cards

What does a higher CVSS score indicate?

It indicates a vulnerability that may be more serious, but not necessarily the one that should be addressed first.

91
New cards

What are some questions to assess vulnerabilities?

Questions include: Can it be fixed quickly? Can it be exploited externally? Is sensitive data involved?

92
New cards

What principle should defenders remember during a cyberattack?

Defenders cannot always assume the most likely course of action by the threat actor.

93
New cards

What is the definition of threat modeling?

A proactive strategy for evaluating risks by identifying potential threats and developing tests to detect and respond to them.

94
New cards

What is one advantage of threat modeling?

It helps quickly identify new threats and allows security teams to evaluate risks effectively.

95
New cards

What is the total attack surface?

The sum total of the number of different attack points in an organization.

96
New cards

What is an attack vector?

The method used to compromise a vulnerability, such as weak credentials or malware.

97
New cards

What does likelihood refer to in threat modeling?

The probability of an attack occurring and being successful, ranging from low to very high.

98
New cards

What is an attack tree?

A diagram that displays the goal of an attack, types of attacks, and techniques used.

99
New cards

What does the OCTAVE methodology focus on?

Assessing nontechnical organizational risks that may result from compromised data.

100
New cards

What is the drawback of the Trike threat modeling process?

It faces scalability issues if the system is too large.

Explore top flashcards

flashcards
Cô Yến 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)
flashcards
Cô Yến 5/12/2024
22
Updated 480d ago
0.0(0)
flashcards
EXAM 2 - part 6
22
Updated 250d ago
0.0(0)
flashcards
Einheit 1 Freunde
75
Updated 229d ago
0.0(0)
flashcards
Biology Honors Evolution
51
Updated 1096d ago
0.0(0)
flashcards
Matiekos egzas
73
Updated 819d ago
0.0(0)
flashcards
Livy 2.10 Vocab
20
Updated 1215d ago
0.0(0)