Piano Man
Closing Time
Sweet Caroline
We're more secure than your dad
The cost of doing Business
100

This shows the difference between where security measures are and where they are desired to be

What is a Gap Analysis?

100

This threat actor is driven by ideological or political goals

What is a Hacktivist?

100

These allow a system to quickly restore to a known state at any time, associated mostly with VMs

What are Snapshots?

100

Considered the BEST way to guarantee the destruction of data on a device

What is Fire?

100

This is done to thoroughly verify an outside vendor's financial stability, reputation, security practices, and compliance with regulations before engaging in a business agreement

What is Due Dilligence?

200

This is the method of using a substitute piece of data in place of a sensitive piece of data, like a credit card number or health information

What is Tokenization?

200

This mitigation works by putting networks into logically or physically distinct regions

What is Segmentation?

200

This is an operating system that you will commonly find in medical devices, vehicles, and industrial control systems, in some situations security methods are compromised to ensure timely operations of the system which can be leveraged as vulnerabilities

What is a Real-time Operating System RTOS?

200

This is the biggest security benefit to automation

What is Reaction Time?

200

This is when an outside organizations vouches for your compliance status

What is Attestation?

300

These are stated so that users and customers know when to expect systems to be offline for a change

What is a Maintenance Window?

300

Installing end point protection, disabling unused ports and protocols, changing default passwords, and other similar measures are known as this

What are Hardening Techniques?

300

This is the biggest risk to a business associated with any shared cloud model

What is Multitenancy?

300

These are automated tools that look for known weaknesses in security on services and devices present on your network

What are Vulnerability Scanners?

300

A type of penetration testing where the tester has full knowledge of the system environment

What is Known Environment testing (white box testing)?

400

This is the method of hiding data within another piece of data, can be detected through hashing if you have a known original version of the data

What is Steganography?

400

This attack commonly uses scripts hidden within vulnerable social media comment sections, where an attack is stored on the server but runs within the user's browsers

What is a Cross-Site Scripting XSS attack?

400

This is a big benefit of cloud computing, the ability for resources to be added for long term changes to use of cloud resources

What is Scalability?

400

This enforces security policies to a network by inspecting devices that attempt to connect beyond their MAC address and will block devices that do not meet security requirements

What is Network Access Control NAC?

400

This is calculated by taking the SLE and multiplying it by the ARO

What is the Annualize Loss Expectancy ALE?

500

This resource on a CA tracks certificates that are no longer valid before their expiration date due to compromise, loss, or other security concerns

What is a CRL Certificate Revocation List?

500

This process ensures that data cannot be accessed from systems once they are no longer in production use before device disposal

What is decommissioning?

500

This is the best mitigation against natural disasters in reference to the cloud

What is Geographic Dispersion?

500

We put these into separate network segments due to the security risks they pose due to being cheaper, weaker devices, even though they are becoming commonplace in all parts of life

What is Internet of Things?

500

This states the specific tasks that a vendor is performing under a broader contract, has to do with individual jobs or small groups of jobs

What is a Work Order or Statement of Work WO/SOW? Think invoicing for the actual job, not just what is supposed to be done