Attacks
Threats
Boats
Vulnerabilities
Mitigations
Assess
100

Mary got an email that has a lot of misspellings and a link to "login to Facebook" from an email address that has nothing to do with Facebook telling her that she needs to log in to her account through the link is an example of this kind of attack

What is Phishing?

100

Software that does malicious actions on an end user system

What is Malware?

100

This ensures data confidentiality

What is Encryption?

100

These are commonly unintentional actions taken or not taken during initial set up that lead to potential risks on a network or device, not an inherent flaw in the system's security

What are Misconfigurations?

100

This is what it's called when we choose not to do a risky activity

What is Risk Avoidance?

100

This type of assessment assesses potential losses from threats

What is a Business Impact Analysis/BIA?

200

John received an email claiming to be from his boss instructing him to buy Gift Cards and mail them to a weird address to "pay some bills" and the email included details specific to John

What is spear-phishing?

200

Has little skilled knowledge, mostly uses tools made by much more skilled attackers with little knowledge of how they function

What is a Script-Kiddie?

200

This ensures data integrity

What is Hashing?

200

This potential type of risk is defined by not being aware that it could be a risk until it has been exploited

What is a Zero Day Vulnerability?

200

When you let someone else take responsibility for the impact of risks on your network

What is Risk Transference?

200

A type of assessment that reviews your adherence to laws, regulations, or standards

What is a compliance audit?

300

An example would be someone running an unauthorized access point in a public place with the intent of being able to record all traffic that is going through it while appearing to be an authorized wireless network in the public place

What is a Man in the Middle/MITM or Evil-Twin attack?

300

Uses advanced techniques and has a large if not infinite budget with which to perform attacks; shielded from prosecution in their home nation for their actions in other nations

What is an Advanced Persistent Threat or Nation State Actor?

300

We refer to data moving from point to point as this when talking about states of data

What is Data in Transit?

300

These kinds of systems present vulnerabilities due to the fact that they are no longer being given security updates

What is a Legacy system?

300

When you decide that the risk is something you can handle, so you do nothing about it

What is Risk Acceptance?

300

A type of assessment that identifies potential threats and vulnerabilities

What is a Risk Based audit?

400

When a large number of computers target a single network or server with the express goal of preventing anyone else being able to access it during the attack

What is a Distributed Denial of Service Attack?

400

Has extensive knowledge and uses it for what they feel are just goals, regardless of the legality of their actions

What is a Hacktivist?

400

We refer to data as at _____ when it is being stored

What is Data at Rest?

400

Using tools like Nessus or OpenVAS, this kind of assessment looks at the potential for an attacker to find weaknesses in a network

What is a Vulnerability Assessment?

400

When you implement security controls to lower your risk

What is Risk Reduction?

400

A type of assessment that looks at IT infrastructure in depth

What is a Technical Audit?

500

An example of this kind of attack would be if Dorothy notices a lot of activity from one public IP address that is taking actions to make accessing a resource impossible during the attack or until the resource can be restored

What is a Denial of Service Attack?

500

An example of this is finding an unauthorized access point or computer inside your network placed there by an employee who is likely not intending to present a threat, but that is not always true.

What is Shadow IT/Rouge IT?

500

This refers to the state of data while it is being processed

What is Data in Use?

500

Rating system used to describe vulnerabilities based on their qualities as opposed to the specific method, but this must be combined with potential threats to discovery what kind of risk you face from the vulnerability, rated on a scale of 0-10.

What is Common Vulnerability Scoring System/CVSS?

500

This is the most powerful tool we have to mitigate attacks that involve user interaction

What is User Education?

500

This is a particular type of assessment that probes for vulnerabilities and often requires proof of concept to prove that a vulnerability may be exploitable; do NOT do this without a signed contract with all parties involved defining goals and rules.

What is Penetration testing?