Security+ Guide to Network Security Fundamentals Ch. 1 Terms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Lack of vendor support

When the company that made a device provides no support for the device.

2
New cards

Weak configuration

Configuration options that provide limited security choices.

3
New cards

End-of-life systems

System for which vendors have dropped all support for security updates due to the system's age.

4
New cards

Misconfiguration

An incorrectly configured device.

5
New cards

Default configurations

The out-of-the-box security configuration settings.

6
New cards

Improperly configured accounts

Account set up for a user that might provide more access than is necessary.

7
New cards

Architecture/design weaknesses

Deficiencies in software due to poor design.

8
New cards

Improper input handling

Software that allows the user to enter data but does not validate or filter user input to prevent a malicious action.

9
New cards

Improper error handling

Software that does not properly trap an error condition and provides an attacker with underlying access to the system.

10
New cards

Race condition

A software occurrence when two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

11
New cards

Vulnerable business processes

A situation in which an attacker manipulates commonplace actions that are routinely performed; also called business process compromise.

12
New cards

Resource exhaustion

A situation in which a hardware device with limited resources (CPU, memory, file system storage, etc.) is exploited by an attacker who intentionally tries to consume more resources than intended.

13
New cards

System sprawl

The widespread proliferation of devices across an enterprise.

14
New cards

Undocumented assets

Devices that are not formally identified or documented in an enterprise.

15
New cards

Untrained users

Users with little or no instruction in making security decisions.

16
New cards

New threat

A threat that has not been previously identified.

17
New cards

Zero day

An attack in which there are no days of warning.

18
New cards

Confidentiality

Security actions that ensure that only authorized parties can view the information.

19
New cards

Integrity

Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.

20
New cards

Asset

An item that has value.

21
New cards

Availability

Security actions that ensure that data is accessible to authorized users.

22
New cards

Threat

A type of action that has the potential to cause harm.

23
New cards

Threat actor

A person or element that has the power to carry out a threat.

24
New cards

Vulnerability

A flaw or weakness that allows a threat agent to bypass security.

25
New cards

Risk

A situation involving exposure to danger.

26
New cards

Risk response techniques

Different options available when dealing with risks.

27
New cards

Transfer

A response to risk that allows a third party to assume the responsibility of the risk.

28
New cards

Accept

A response to risk that acknowledges the risk but takes no steps to address it.

29
New cards

Avoid

A response to risk that identifies the risk and the decision is made to not engage in the risk-provoking activity.

30
New cards

Sophisticated

Threat actors that have developed a high degree of complexity.

31
New cards

Mitigate

Addressing risks by making risks less serious.

32
New cards

Funding and resources

An attribute of threat actors that can vary widely.

33
New cards

Attributes

Characteristic features of the different groups of threat actors.

34
New cards

Internal

The location within an enterprise in which some threat actors perform.

35
New cards

External

The location outside an enterprise in which some threat actors perform.

36
New cards

Intent and motivation

The reasoning behind attacks made by threat actors.

37
New cards

Script kiddies

Individual who lacks advanced knowledge of computers and networks and so uses downloaded automated attack software to attack information systems.

38
New cards

Hacktivists

A group of threat actors that is strongly motivated by ideology.

39
New cards

Open-source intelligence

Freely available automated attack software.

40
New cards

Nation state actors

State-sponsored attackers employed by a government for launching computer attacks against foes.

41
New cards

Insiders

Employees, contractors, and business partners who can be responsible for an attack.

42
New cards

Competitors

Threat actors that launch attack against an opponents' system to steal classified information.

43
New cards

Advanced Persistent Threat (APT)

A new class of attack that uses innovative attack tools to infect a system and then silently extracts data over an extended period.

44
New cards

Organized crime

Threat actors that are moving from traditional organized criminal activities to more rewarding and less risky online attacks

45
New cards

Defense-in-depth

Creating multiple layers of security defenses through which an attacker must penetrate; also called layered security.

46
New cards

Layered security

Creating multiple layers of security defenses through which an attacker must penetrate; also called defense-in-depth.

47
New cards

User training

Instructing employees as to the security reasons behind security restrictions.

48
New cards

Technical controls

Using technology that is carried out or managed by devices as a basis for controlling the access to and usage of sensitive data.

49
New cards

Control diverisity

Having different groups responsible for regulating access to a system.

50
New cards

Vendor diversity

Using security products provided by different manufacturers.

51
New cards

Administrative controls

Security controls for developing and ensuring that policies and procedures are carried out; regulating the human factors of security.

52
New cards

Industry-standard frameworks

"Supporting structures" for implementing security; also called reference architectures.

53
New cards

Reference architectures

"Supporting structures" for implementing security; also called industry-standard frameworks.

54
New cards

Industry-specific frameworks

Frameworks/architectures that are specific to a particular industry or market sector.

55
New cards

Regulatory

Information security frameworks/architectures that are required by agencies that regulate the industry.

56
New cards

Non-regulatory

Information security frameworks/architectures that are not required.

57
New cards

International

Information security framework/architectures that are worldwide.

58
New cards

National

Information security framework/architectures that are domestic.