What is the CIA Triad?
Its an abreviation for the 3 most important things for security:
1. Confidentiality: Make sure only authorized users can access data
2. Integrity: Make sure the data is not tampered with.
3. Availability: Make sure the data and services are available at all times they are needed.
Whats the difference between a threat and a vulnerability?
Threat: Person or event that has the potential for impacting an asset in a negative manner.
Vulnerability: Quality or characteristic (like a flaw in code), within an asset or environment, that could allow the threat to be realized.
What is a risk?
A threat, that can be realized due to a vulnerability, is a risk.
What are the 4 types of vulnerabilities?
Whats the difference between a vulnerability and an exploit?
A vulnerability is just the weakness, that could be exploited, the Exploit is a piece of software (or sometimes just an action) that is used to exploit the vulnerability.
What is a Risk Assessment?
A Risk Assessment determines possible incidents, their likelihood and consequences for the organization.
What is a Posture Assessment?
A Posture Assessment evaluates the attack surface of an organization.
What is Device Hardening?
Device Hardening is the process of reducing the attack surface of an device
What are 6 basic steps for device hardening?
What are 3 “annoyance” defense techniques?