Unit 8 - Security

    Subdecks (6)

    Cards (290)

    • An asset is anything of value to an organization
    • A vulnerability is a weakness in a system or its design, that can be exploited by a threat
    • A threat is a potential danger to a company
    • An exploit is a mechanism which takes advantage of a vulnerability
    • Mitigation is a counter-measure that reduces the likelihood or severity of a potential threat or risk
    • Risk is the likelihood of a threat to exploit the vulnerability of an asset, primarily with the aim of negatively affecting an organisation
    • Risk is measured by the probability of an event vs it's consequences
    • An attack vector is the path a bad actor can use to gain unauthorised access
    • Internal threats generally have the easiest vectors of attack
    • Data loss is when data is intentionally or unintentionally lost, stolen, or leaked to the outside world.
    • 4 example data loss vectors?
      Intercepted email
      Unencrypted storage device
      Removable media
      Not shredded hard copy
    • 5 hacking terms:
      Script kiddie - Inexperienced hackers using prebuilt tools, to harm, but rarely profit
      Vulnerability broker - Gray hat hackers who discover and report exploits to vendors
      Hacktivists - Gray hat hackers who publicly protest organisations or governments by accessing confidential info and performing network attacks
      Cyber criminals- Black hat hackers whether self-employed or part of a larger cybercrime organisation
      State sponsored - White or black hat hackers who work for a government generally targeting foreign governments
    • One hacktivist group is anonymous
      Another is Syrian Electronic Army
    • Stuxnet malware was used to damage Iran's nuclear enrichment capabilities
    • State-sponsored hackers create advanced, customised attack code