What is the CIA triad?
Confidentiality: Means that certain information should only be known to certain people.
Integrity: Means that the data is stored and transferred as intended and that any modification is authorized.
Availability: Means that information is accessible to those authorized to view or modify it.
What is a Vulnerability?
A weakness that could be accidentally triggered or intentionally exploited to cause a security breach.
What is a Threat?
The potential for someone or something to exploit a vulnerability and breach security.
Can be intentional or unintentional.
The person or thing that poses the threat is called a threat actor or threat agent.
The path or tool used by a malicious threat actor can be referred to as the attack vector.
What is Risk?
The likelihood and impact (or consequence) of a threat actor exercising a vulnerability.
Risk = Vulnerability + Threat
What is it called when you make a system more secure?
hardening.
What is Risk Management?
A process for identifying, assessing and mitigating vulnerabilities and threats to the essential functions that a business must perform to serve its customers.
Most companies will institute enterprise risk management (ERM) policies and procedures, based on published frameworks.
What is Risk Assesment?
A subset of risk management where the company’s systems and procedures are audited for risk factors.
Separate assessments can be devised to perform an initial evaluation and ongoing monitoring of threats, vulnerabilities, and security posture.
What is Posture assesment?
An audit process and tools for verifying compliance with a compliance framework or configuration baseline.
Can be used to assess the organization’s maturity level in its use of security policies and controls.
What is a IT service framework?
A framework to provide best practice guides to implementing IT and cybersecurity.
These frameworks can shape company policies and provide checklists of procedures, activities, and technologies that should ideally be in place.
What is the purpose of a security control?
Designed to give a system or data asset the properties of confidentiality, integrity, availability, and non-repudiation.
NOTE: Can be expensive.
What is a MEF?
Mission Essential Function.
Business or organizational activity that is too critical to be deferred for anything more than a few hours, if at all.
If there is a service disruption this must be restored first.
What is a BIA?
Business Impact Analysis.
A systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations.
What does regulatory compliance do?
Imposes externally determined requirements on companies in certain industries or when processing certain types of data.
These regulations might dictate the type of controls that must be deployed, and the type and frequency of audits.
What is PII?
Personal Identifiable Information.
Data that can be used to identify, contact, locate, or describe an individual.
ex. SSN, name, DOB, biometric data etc.
International, national, and state legislation can impose regulations on the collection and processing of personal data.
What is GDPR?
General Data Protection Regulation.
A privacy legislation that governs the collection and processing of PII.
GDPR means that personal data cannot be collected, processed, or retained without the individual’s informed consent unless there are other overriding considerations, such as public interest or other legal obligations.
Protects the data of EU citizens.
Gives data subjects the right to withdraw consent.
Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.
What is data Sovereignty?
The principle that countries and states may impose individual requirements on data collected or stored within their jurisdiction.
What is data locallity?
It establishes storage and processing boundaries based on national or state borders.
Most cloud storage and processing solutions offer data locality tools.
ex. if a healthcare database is hosted in the cloud, data locality could be configured to prevent an administrator from replicating it to any datacenter outside the United States.
What is PCI DSS?
Payment Card Industry Data Security Standard.
This is the information security standard for organizations that process credit or bank card payments.
Organizations that directly processes credit card transactions must adopt the PCI DSS standard to safeguard the cardholder data environment (CDE).
What does access control govern?
How subjects interact with objects.
Subjects= people, devices, software processes, or any other system that can request and be granted access to a resource.
Objects= the resources. Can be a network, server, database, app, or file.
Subjects are assigned rights or permissions on resources.
What are the 2 main types of cryptographic cipher or algorithm?
Encryption Algorithm: Converts plaintext to ciphertext. The ciphertext must be decrypted using a key linked to the initial encryption process before it can be read.
Cryptographic Hash Algorithm: converts a variable length string into a fixed-length hash. This hash cannot be converted back to a plaintext. This can prove the integrity of data by verifying it hasn’t been modified.
What is an exploit?
A specific method by which malware code infects a target host, often via some vulnerability in a software process. Also called exploit technique.
What is a Vulnerability Assessment?
An evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system.
Also called vulnerability testing.
What are deception and disruption technologies?
Powerful cybersecurity resilience tools that significantly increase the attacker’s cognitive load and resource expenditure by forcing them to constantly adapt their tactics, techniques, and procedures (TTPs).
What is a honeypot?
A decoy computer system designed to attract attackers.
By analyzing their attack strategies and tools, honeypots provide early warning of attack attempts and valuable insights into attacker behavior.
A host (honeypot), network (honeynet), file (honeyfile), or credential/token (honeytoken) set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration.
A honeypot or honeynet is more likely to be located in a protected but untrusted area between the Internet and the private network or on a closely monitored and filtered segment within the private network itself.