SecurtyPro (TestOut) Chapter 1 Notes
The scale and velocity of an attack can grow to millions of computers in a matter of minutes or days due to its ability to proliferate on the internet. Because modern attacks are not limited to user interactions, such as using a floppy disk, to spread an attack from machine to machine, the attacks often affect very large numbers of computers in a relatively short amount of time.
Attack Scale and Velocity
___________________, which ensures the uptime of the system so that data is available when needed.
Availability
___________________, which ensures that data is not disclosed to unintended persons. This is provided through encryption, which converts the data into a form that makes it less likely to be usable by an unintended recipient.
Confidentiality
What does CIA stand for in the computer world? They also are often identified as the three main goals of security.
Confidentiality, integrity, and availability
This is the type of hacker who generally use the Internet to carry out terrorist activities, such as disrupting network-dependent institutions
Cyber terrorists
This is the type of hacker who usually seek to exploit security vulnerabilities for some kind of financial reward or revenge
Cybercriminals
Can be the most overlooked yet most dangerous threat agent because they have greater access to information assets than anyone on the outside trying to break in.
Employee
Types of threat agents include the following:
Employee, Spy, and Hacker
Is any threat agent who uses their technical knowledge to bypass security mechanisms to exploit a vulnerability to access information.
Hacker
___________________, which ensures that data is not modified or tampered with. This is provided through hashing
Integrity
___________________, which provides validation of a message's origin. For example, if a user sends a digitally signed email, they cannot claim later that the email was not sent. Non-repudiation is enforced by digital signatures
Non-repudiation
____________ ________, which includes all hardware and software necessary to secure data, such as firewalls and antivirus software.
Physical security
____________, which are the rules an organization implements to protect information.
Policies
A wide variety of attack tools are available on the internet, allowing anyone with a moderate level of technical knowledge to download the tools and run an attack.
Proliferation of Attack Software
_______ ______________ is the process of identifying security issues and deciding which countermeasures to take in reducing risk to an acceptable level. The main objective is to reduce the risk for an organization to a level that is deemed acceptable by senior management
Risk management
This is the type of hacker who download and run attacks available on the internet, but generally are not technically savvy enough to create their own attacking code or script.
Script kiddie
Is the degree of protection against danger, damage, loss, and criminal activity.
Security
_________________ __________ are complex, making them difficult to detect and thwart. Sophisticated attacks: · Use common internet tools and protocols, making it difficult to distinguish an attack from legitimate traffic. · Vary their behavior, making the same attack appear differently each time.
Sophisticated Attacks
Can be employed in corporate espionage to obtain information about competitors for commercial purposes
Spies
____________ ____ _____________, which are the people who use the software and the people who manage the software, respectively.
Users and administrators
An ________ is something that has value to the person or organization, such as sensitive information in a database
asset
An _________ is a procedure or product that takes advantage of a vulnerability to carry out a threat, such as when a disgruntled employee waits for the server room door to be left ajar, copies the database to a thumb drive, and then sells it
exploit
A _______ is an entity that can cause the loss of an asset or any potential danger to the confidentiality, integrity, or availability of information or systems, such as a data breach that results in a database being stolen.
threat
A ________ ________ (sometimes known as an attacker) is an entity that can carry out a threat, such as a disgruntled employee who copies a database to a thumb drive and sells it to a competitor
threat agent
A _______________ is a weakness that allows a threat to be carried out, such as a USB port that is enabled on the server hosting the database or a server room door that is frequently left ajar. USB devices pose the greatest threat to the confidentiality of data in most secure organizations. There are so many devices that can support file storage that stealing data has become easy, and preventing it is difficult.
vulnerability