Podcast
Questions and Answers
A security team is evaluating measures to protect sensitive data. Which principle of security aims to prevent unauthorized disclosure of information?
A security team is evaluating measures to protect sensitive data. Which principle of security aims to prevent unauthorized disclosure of information?
- Accounting
- Availability
- Integrity
- Confidentiality (correct)
An organization wants to ensure that its data remains accurate and complete. Which security principle is most relevant to this goal?
An organization wants to ensure that its data remains accurate and complete. Which security principle is most relevant to this goal?
- Confidentiality
- Availability
- Integrity (correct)
- Authentication
A hospital needs to ensure that patient records are accessible to doctors at all times, especially during emergencies. Which security principle is paramount in this scenario?
A hospital needs to ensure that patient records are accessible to doctors at all times, especially during emergencies. Which security principle is paramount in this scenario?
- Availability (correct)
- Integrity
- Authentication
- Confidentiality
An IT auditor is reviewing access logs to identify who accessed a sensitive file, what changes they made, and when they disconnected from the network. Which security principle supports this audit process?
An IT auditor is reviewing access logs to identify who accessed a sensitive file, what changes they made, and when they disconnected from the network. Which security principle supports this audit process?
A company implements multi-factor authentication (MFA) to enhance its security posture. What type of security control does MFA represent?
A company implements multi-factor authentication (MFA) to enhance its security posture. What type of security control does MFA represent?
After a successful ransomware attack, a company restores its systems from backups. What type of security control is represented by restoring from backups?
After a successful ransomware attack, a company restores its systems from backups. What type of security control is represented by restoring from backups?
An organization implements security cameras around its perimeter. What type of security control is represented by security cameras?
An organization implements security cameras around its perimeter. What type of security control is represented by security cameras?
A company mandates the use of strong passwords and regular password changes for all employees. What type of security control do these password policies represent?
A company mandates the use of strong passwords and regular password changes for all employees. What type of security control do these password policies represent?
What is the primary focus of information security within an organization?
What is the primary focus of information security within an organization?
How does cybersecurity differ from information security?
How does cybersecurity differ from information security?
In the context of information security, what is the significance of 'policies and procedures'?
In the context of information security, what is the significance of 'policies and procedures'?
A company discovers that an employee has been using unauthorized cloud storage services to share sensitive documents. Which category of threat actor does this situation exemplify?
A company discovers that an employee has been using unauthorized cloud storage services to share sensitive documents. Which category of threat actor does this situation exemplify?
A group of activists defaces a company's website to protest its environmental policies. Which type of threat actor is most likely responsible for this action?
A group of activists defaces a company's website to protest its environmental policies. Which type of threat actor is most likely responsible for this action?
Which of the following threat actors is primarily motivated by financial gain through cyberattacks?
Which of the following threat actors is primarily motivated by financial gain through cyberattacks?
An employee is disgruntled and decides to sabotage a company's database. What type of threat does this scenario represent?
An employee is disgruntled and decides to sabotage a company's database. What type of threat does this scenario represent?
A nation launches a cyberattack on another country's critical infrastructure. What type of threat actor is responsible?
A nation launches a cyberattack on another country's critical infrastructure. What type of threat actor is responsible?
New exploits are being sold on the dark web to the highest bidder. What type of threat actor does this describe?
New exploits are being sold on the dark web to the highest bidder. What type of threat actor does this describe?
A competitor launches an attack against another company's system to steal classified information. What is the threat actor?
A competitor launches an attack against another company's system to steal classified information. What is the threat actor?
Unskilled attackers often rely on readily available tools to carry out their attacks. What is their primary motivation?
Unskilled attackers often rely on readily available tools to carry out their attacks. What is their primary motivation?
What is the process of ensuring a user's credentials are authentic?
What is the process of ensuring a user's credentials are authentic?
What is the purpose of authorization?
What is the purpose of authorization?
Attack surface can be considered mainstream. Which of the following is an example of an attack surface?
Attack surface can be considered mainstream. Which of the following is an example of an attack surface?
Which of the following is a common communication tool targeted for exploitation?
Which of the following is a common communication tool targeted for exploitation?
What is meant by a supply chain infection?
What is meant by a supply chain infection?
In open-source software, how do threat actors exploit the code?
In open-source software, how do threat actors exploit the code?
Which category of vulnerability is exploited by attackers before anyone else knows it exists?
Which category of vulnerability is exploited by attackers before anyone else knows it exists?
What is a potential impact of a successful attack on an organization?
What is a potential impact of a successful attack on an organization?
What is 'data exfiltration' in the context of cybersecurity attacks?
What is 'data exfiltration' in the context of cybersecurity attacks?
Which of the following data impacts involves stealing data to disclose it in an unauthorized fashion?
Which of the following data impacts involves stealing data to disclose it in an unauthorized fashion?
Which type of external cybersecurity resource provides a series of documented processes used to define policies and procedures for the implementation and management of security controls in an enterprise environment?
Which type of external cybersecurity resource provides a series of documented processes used to define policies and procedures for the implementation and management of security controls in an enterprise environment?
Which of the following are the three basic parts which NIST Frameworks are divided into?
Which of the following are the three basic parts which NIST Frameworks are divided into?
What is the process of adhering to regulations called?
What is the process of adhering to regulations called?
What do benchmarks or secure configuration guides primarily serve as?
What do benchmarks or secure configuration guides primarily serve as?
What is the common name used for external cybersecurity resources which are documented "white papers" that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?
What is the common name used for external cybersecurity resources which are documented "white papers" that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?
An organization identifies a new type of malware through a continually maintained database. What type of cybersecurity resource is the organization utilizing?
An organization identifies a new type of malware through a continually maintained database. What type of cybersecurity resource is the organization utilizing?
A cybersecurity professional is using a database that describes the behavior of threat actors and how they manage attacks. What is the name of this database?
A cybersecurity professional is using a database that describes the behavior of threat actors and how they manage attacks. What is the name of this database?
What is an example of Authentication?
What is an example of Authentication?
Flashcards
Security
Security
The state of being free from danger.
Confidentiality
Confidentiality
Ensures information is protected from unauthorized access.
Integrity
Integrity
Ensures information is correct and unaltered.
Availability
Availability
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Accounting
Accounting
Signup and view all the flashcards
Security Control
Security Control
Signup and view all the flashcards
Cybersecurity
Cybersecurity
Signup and view all the flashcards
Information Security
Information Security
Signup and view all the flashcards
Threat Actor
Threat Actor
Signup and view all the flashcards
Financial crime targets
Financial crime targets
Signup and view all the flashcards
Unskilled Attackers
Unskilled Attackers
Signup and view all the flashcards
Shadow IT
Shadow IT
Signup and view all the flashcards
Organized Crime
Organized Crime
Signup and view all the flashcards
Insider Threats
Insider Threats
Signup and view all the flashcards
Hacktivists Attacks
Hacktivists Attacks
Signup and view all the flashcards
Nation-State Actors
Nation-State Actors
Signup and view all the flashcards
Competitors (Threat Actor)
Competitors (Threat Actor)
Signup and view all the flashcards
Brokers (Threat Actor)
Brokers (Threat Actor)
Signup and view all the flashcards
Cyberterrorists
Cyberterrorists
Signup and view all the flashcards
Attack Surface
Attack Surface
Signup and view all the flashcards
Supply Chain Infections
Supply Chain Infections
Signup and view all the flashcards
Open-Source Software
Open-Source Software
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Zero-Day Vulnerabilities
Zero-Day Vulnerabilities
Signup and view all the flashcards
Data Loss
Data Loss
Signup and view all the flashcards
Standard
Standard
Signup and view all the flashcards
Study Notes
Understanding Security
- Security means being free from danger and the goal of security is safety.
- It involves measures taken to ensure safety, which makes it the process of security.
- As security increases, convenience often decreases.
Principles of Security
- There are three types of security protections: CIA, which stands for Confidentiality, Integrity, and Availability.
- Confidentiality ensures information is available only to authorized individuals.
- Integrity guarantees information accuracy and completeness.
- Availability ensures information is accessible to authorized users.
- Security involves controlling access to information.
- Authentication confirms user credentials.
- Authorization grants permission for specific actions.
- Accounting creates a record of network access, resource usage, and disconnection times.
- Security controls are safeguards within an enterprise protecting the CIA triad, including Deterrent, Preventive, Detective, Compensating Corrective, and Directive controls.
- Deterrent controls can include measures such as a security camera
- Preventive controls can include stronger passwords
- Detective controls can include alarm systems
- Compensating controls can include multi factor authentication
- Corrective controls can include things like backups
- Directive controls can include policies
Cybersecurity versus Information Security
- Information security protects "processed data" that is essential in an enterprise environment.
- Cybersecurity involves practices, processes and technologies that protect devices, networks, and programs which process and store data electronically
Defining Information Security
- Information Security includes all policies and procedures required to keep data secure: whether transmitted, processed, stored, people or products
Knowledge Check Activity 1-1
- Confidentiality ensures only authorized parties can view protected information.
Threat Actors and Motivations
- A threat actor, also known as an attacker, is responsible for attacks.
- Financial crime targets individuals, enterprises, and governments.
- Categories of threat actors:
- Unskilled attackers
- Shadow IT
- Organized crime
- Insiders
- Hacktivists
- Nation-state actors
- Competitors
- Brokers
- Cyberterrorists
Unskilled Attackers
- Unskilled attackers lack technical knowledge but want to perform attacks.
- They use freely available or low-cost, easy-to-use tools for attacks.
- Their motivation is usually data exfiltration or service disruption.
Shadow IT
- Shadow IT is bypassing corporate approval for technology purchases
- Employee motivations are often ethical but can weaken security.
Organized Crime
- A close-knit tightly controlled group set up to engage in illegal activities
- Recently organized crime moved into cyberattacks.
- Cyberattacks are considered less risky and more rewarding than traditional crime
- Motivation is generally financial gain
Insider Threats
- Insiders can be employees, contractors, and business partners within a company.
- Motivation could include revenge or blackmail.
- Attacks are hard to recognize.
Hacktivists
- Groups or individuals strongly motivated by ideology are called hacktivists.
- Their attacks often involve website intrusion and content changes for political statements.
- Some of their attacks are retaliatory, such as disabling a bank's website, if the bank does not support groups that the hacktivists support.
- Motivation is to cause disruption/chaos.
Nation-State Actors
- Governments are increasingly using state-sponsored attackers for cyberattacks against foes.
- Nation-state actors are often involved in multiyear intrusion campaigns targeting highly sensitive economic, proprietary, or national security information.
- A new class of attacks uses advanced persistent threat-APT to extract data silently for extended periods of time.
Other Threat Actors
- Competitors will launch attacks against opponent systems and attempt to steal classified information.
- Brokers will sell their knowledge of a weakness to other attackers or governments.
- Cyberterrorists attack a nation's network of computer infrastructure, with the intent of disruption and panic amongst citizens.
Knowledge Check Activity 1-2
- The motivation of an employee engaging in shadow IT is considered ethical but weakens security.
Threat Vectors and Attack Surfaces
- An attack surface, or threat vector, is a digital platform targeted by threat actors.
- Attack surfaces are found in all technology settings.
- The primary targets of threat actors still are things like Login pages of online banking sites.
- Common communication tools like Email, texts, instant messages, and voice calls, are common communication tools are message based such as phishing
- A supply chain is a network that moves a product from creation to the end user
- Each link is a potential threat vector and it is possible that malware can be injected into the product during its manufacturing, storage, and distribution, which is called supply chain infection.
- Software supply chains have recently been the target of attackers due to the fact that open source code allows threat actors to add malicious code.
Categories of Vulnerabilities
- A vulnerability means being open to attack or being harmed.
- Cybersecurity vulnerabilities can be categorized into software, hardware, misconfigurations,and zero-day.
- Software vulnerabilities are predominantely within software, with OS software being the chief culprit.
- Can come in the form of a malicious update
- Hardware vulnerabilities can include the difficulty patching firmware, legacy platforms, and end-of-life hardware
- Misconfigurations settings are often not properly deployed causing misconfigurations that result in vulnerabilities.
- Zero-day vulnerabilities can be exploited before anyone knows they exist and do not give a warning.
Impacts of Attacks
- A successful attack results in several negative impacts, including data impact and overall affects.
- Overall affects include inaccessibility of systems aka availability loss, which results in lost productivity, aka financial loss.
- Attacks may also affect the public perception of the enterprise, effecting its reputation.
- Types of attacks include:
- Data Loss: The destruction of data so that it cannot be recovered
- Data exfiltration: Stealing data to distribute it to other parties
- Data breach: Stealing data to disclose it in an unauthorized fashion
- Identity theft: Taking personally identifiable information to impersonate someone
Information Security Resources
- These are resources to defend from any potential cyber attacks.
They include:
- Frameworks
- Regulations
- Legislation
- Standards
- Benchmarks/secure configuration guides
- Information sources
Frameworks
- An information security framework documents processes to define policies and procedures for implementing and managing security controls in an enterprise.
- The National Institute of Standards and Technology (NIST) frameworks have three parts:
- Framework Core, which is a set of activities and outcomes related to cyber security.
- Implementation tiers levels of security maturity
- Profiles which outline customized approaches based on specific needs.
Regulations
- Adhering to regulations is regulatory compliance.
- Most organizations must follow multiple regulations from different regulatory bodies like broadly applicable, industry specific, U.S. state regulation, and international regulations.
Legislation
- Governing bodies can enact legislation or laws to provide information security resources which would include
- National Laws
- Territorial Laws
- State Laws
Standards
- A standard is a document approved through concensus for a recognized standardization body.
- Standards provide frameworks, rules, guidelines, or characteristics for products and production methods.
- The Payment Card Industry Data Security Standard (PCI DSS) is one information security compliance standard.
Benchmarks/Secure Configuration Guides
- Hardware manufacturers and software developers distribute benchmarks and secure configuration guides
- These serve as guidelines for configuring a device or software for resilience against attacks.
- These guides are usually platform-/vendor-specific and apply to specific products.
Information Sources
- Requests for comments (RFCs) are like "white papers" authored by technology bodies with experts who employ specialist engineers and scientists.
- Data feeds are continually maintained databases compiling the latest cybersecurity incidents.
- Common cybersecurity data feeds, include vulnerability feeds that provide current information on vulnerabilities.
- The adversary tactics, techniques, and procedures (TTP) is a database of how threat actors manage attacks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.