Cybersecurity Final version 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/119

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

120 Terms

1
New cards
Risk
Likelihood that something bad will happen to an asset
2
New cards
Threat
Any action that could damage an asset
3
New cards
Vulnerability
A weakness that allows a threat to be realized or to have an effect on an asset
4
New cards
Cryptography
Practice of hiding data and keeping it away from unauthorized users
5
New cards
Encryption
The process of transforming data from cleartext into ciphertext
6
New cards
Ciphertext
The scrambled data that is the result of encrypting cleartext
7
New cards
Cleartext
Regular
8
New cards
Integrity
Maintain valid
9
New cards
Availabioolity
The amount of time users can use a system
10
New cards
Uptime
Measure of how long a computer system has been operating without restarting.
11
New cards
Downtime
Refers to a period of time when a system is unavailable
12
New cards
Availability formula
A \= (Total Uptime)/(Total Uptime + Total Downtime)
13
New cards
Mean time to failure (MTTF)
The expected time until the first failure of a piece of equipment
14
New cards
Mean Time to Repair (MTTR)
The average time required to repair a system or piece of equipment
15
New cards
Mean Time Between Failures (MTBF)
the average length of time between failures of a product or component
16
New cards
Recovery Time Objective (RTO)
The overall length of time an information system's components can be in the recovery phase before negatively impacting the organization's mission or processes
17
New cards
Recovery Point Objective (RPO)
Maximum amount of data that can be lost without substantial impact
18
New cards
What is the weakest link in the security of an IT Infrastructure
The user
19
New cards
Policy
A short written statement that defines a course of action that applies to entire organization
20
New cards
Standard
A detailed written definition of how software and hardware are to be used
21
New cards
Procedures
Written instructions for how to use policies and standards
22
New cards
Guidelines
Suggested course of action for using policy
23
New cards
Private data
Classification standard: Data about people that must be kept private
24
New cards
Confidential
Classification standard: Information or data owned by the organization
25
New cards
Internal use only
Classification standard: Information or data shared internally by an organization
26
New cards
Public domain data
Classification standard: Information or data shared with the public
27
New cards
Minimum level of classification levels
Three
28
New cards
Real-time
Occurs instantaneously
29
New cards
Store-and-forward
Acceptable delay in transmitting communication
30
New cards
E-commerce
Sale of goods and services on the internet
31
New cards
Business-to-consumer (B2C)
Customers purchase goods and services directly from their website
32
New cards
Business-to-business (B2B)
Businesses conduct sales with other businesses
33
New cards
Payment Card Industry Data Security Standard (PCI DSS)
Protects private customer data
34
New cards
Black-hat
A hacker who attacks systems and exposes vulnerabilities with malicious intent most often for monetary gain
35
New cards
White-hat
A hacker who exposes security flaws in
applications and operating systems so
manufacturers can fix them before they
become widespread problems.
36
New cards
Gray-hat
A skilled hacker who falls in the middle of white hat and black hat hackers. The gray hat may cross the line of what is ethical
37
New cards
Crackers
A type of hacker who specializes in breaching copy protection on software allowing it to be pirated
38
New cards
What is a Security Breach?
Any event that results in a violation of any of the CIA security tenets
39
New cards
Denial of Service Attack
A coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks
40
New cards
Unacceptable Web Browsing
Defined in an acceptable use policy (AUP)
41
New cards
Backdoors
Hidden access included by developers
42
New cards
Disclosure threats
Sabotage
43
New cards
Alteration threats
Unauthorized changes
44
New cards
Denial or destruction threats
DoS attack
45
New cards
Virus
-Attaches itself to or copies itself into another program on a computer
-Tricks the computer into following instructions not intended by the original program developer
-Infects a host program any may cause that host program to replicate itself to other computers
-User who runs infected program authenticates the virus
46
New cards
Worm
-A self-contained program that replicates and sends copies of itself to other computers without user input or action
-Does not need a host program to infect
-Is a standalone program
47
New cards
Trojan Horse
-Malware that masquerades as a useful program
-Trojans can:
-Hide programs that collect sensitive information
-Open backdoors into computers
-Actively upload and download files
48
New cards
Logic Bomb
Malware which wats for a particular condition to exist (e.g. no input for a certain time period
49
New cards
a certain time and date
etc.) and then does something malicious.
50
New cards
Rootkit
-Modifies or replaces one or more existing programs to hide traces of attacks
-Many different types of rootkits
-Conceals its existence one installed
-Is difficult to detect and remove
51
New cards
Spyware
A type of malware that specifically threatens the confidentiality of information
52
New cards
Firewall
-Program or dedicated hardware device
-Inspects network traffic passing through it
-Denies or permits traffic based on a set of rules
53
New cards
Business Impact Analysis (BIA)
An analysis of an organization's functions and activities that classifies them as critical or noncritical
54
New cards
Business Continuity Plan (BCP)
A written plan for a structured response to any events that result in an interruption to critical business activities or functions
55
New cards
Disaster
An event that affects multiple business processes for an extended period
56
New cards
Disaster Recovery Plan (DRP)
A written plan including specific steps and procedures to recover from a disaster
57
New cards
Hot site
Has environmental utilities
58
New cards
Warm site
Has environmental utilities and basic computer hardware
59
New cards
Cold site
Has basic environmental utilities but no infrastructure components
60
New cards
Mobile site
Trailer with necessary environmental utilities
61
New cards
Security gap
Difference between the security controls in place and controls you need to address vulnerabilities
62
New cards
Gap analysis
Comparison of the security controls in place and the controls you need to address all identified threats
63
New cards
Sarbanes-Oxley Act (SOX)
requires all financial reports to include an internal controls report
64
New cards
Health Insurance Portability and Accountability Act (HIPAA)
a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed with the patient's consent or knowledge
65
New cards
Gramm-Leach-Bliley Act (GLBA)
Requires organizations to explain their information-sharing practices to their customers and to safeguard sensitive data
66
New cards
Federal Information Security Modernization Act (FISMA)
Requires stricter guidelines for how data is handled in order to reduce risk of a cyberattack
67
New cards
Government Information Security Reform Act (Security Reform Act) of 2000
a federal law requiring offices of the U.S. government to develop a security program to assess its risk to security threats and ways to protect from them
68
New cards
Authentication
verifying the identity of the person or device attempting to access the system
69
New cards
Authorization
Controlling what the user is allowed to do on a system
70
New cards
Physical Access Control
Controls entry into buildings
71
New cards
Logical Access Controls
Controls access to a computer system or network
72
New cards
Intrusion Detection System (IDS)
A program responsible for identifying attacks
73
New cards
Network-Based Intrusion Detection System (NIDS)
A system for examining network traffic to identify suspicious
74
New cards
host-based intrusion detection system (HIDS)
Software processes or services designed to run on server computers
75
New cards
Demilitarized zone (DMZ)
A physical or logical subnetwork which contains and exposes an organization's external-facing services to an untrusted
76
New cards
MAC (Media Access Control) address
Unique 48-bit address assigned to each network card. IEEE assigns blocks of possible addresses to various NIC manufacturers to help ensure that the address is always unique. The Data Link layer of the OSI model uses MAC addresses to locate machines.
77
New cards
Black-box testing
Uses test methods that aren't based directly on knowledge of a program's architecture or design
78
New cards
White-box testing
Is based on knowledge of the application's design and source code
79
New cards
Gray-box testing
Lies somewhere in between black-box and white-box testing
80
New cards
Event
A measurable occurrence that has an impact on the business
81
New cards
Incident
Any event that violates or threatens to violate your security policy
82
New cards
Control
Includes both safeguards and countermeasures
83
New cards
Countermeasure
Counters or addresses a specific threat
84
New cards
Single Loss Expectancy (SLE)
The expected monetary loss every time a risk occurs.
85
New cards
Annualized Rate of Occurrence (ARO)
The number of incidents per year
86
New cards
Annualized Loss Expectancy (ALE)
How much monetary loss is expected every year
87
New cards
Critical Business Functions (CBF)
Activities that are vital to your organization's survival and to the resumption of business operations.
88
New cards
Maximum Tolerable Downtime (MTD)
The maximum period of time that a business process can be down before the survival of the organization is at risk.
89
New cards
Emergency Operations Center (EOC)
Physical location identified for coordination of information and resources to support incident management activities.
90
New cards
Decryption
The process of unscrambling ciphertext into plaintext
91
New cards
Alogorithm
A repeatable process that produces the same result when it receives the same input
92
New cards
Cipher
An algorithm to encrypt or decrypt information
93
New cards
Symmetric Encryption
the same key is used to encode and decode
94
New cards
Assymetric Encryption
used in public key encryption
95
New cards
Keyspace
The number of possible keys to a cipher
96
New cards
Open ciphers
Make it possible for experts around the world to examine the ciphers for weaknesses
97
New cards
Data Encryption Standard (DES)
The most scrutinized cipher in history
98
New cards
Cryptanalysis
the study and practice of finding weaknesses in ciphers
99
New cards
Nonrepudiation
Enables you to prevent a party from denying a previous statement or action.
100
New cards
Transposition ciphers
Rearranges characters or bits of data