This shows the difference between where security measures are and where they are desired to be
What is a Gap Analysis?
This threat actor is driven by ideological or political goals
What is a Hacktivist?
These allow a system to quickly restore to a known state at any time, associated mostly with VMs
What are Snapshots?
Considered the BEST way to guarantee the destruction of data on a device
What is Fire?
This is done to thoroughly verify an outside vendor's financial stability, reputation, security practices, and compliance with regulations before engaging in a business agreement
What is Due Dilligence?
This is the method of using a substitute piece of data in place of a sensitive piece of data, like a credit card number or health information
What is Tokenization?
This mitigation works by putting networks into logically or physically distinct regions
What is Segmentation?
This is an operating system that you will commonly find in medical devices, vehicles, and industrial control systems, in some situations security methods are compromised to ensure timely operations of the system which can be leveraged as vulnerabilities
What is a Real-time Operating System RTOS?
This is the biggest security benefit to automation
What is Reaction Time?
This is when an outside organizations vouches for your compliance status
What is Attestation?
These are stated so that users and customers know when to expect systems to be offline for a change
What is a Maintenance Window?
Installing end point protection, disabling unused ports and protocols, changing default passwords, and other similar measures are known as this
What are Hardening Techniques?
This is the biggest risk to a business associated with any shared cloud model
What is Multitenancy?
These are automated tools that look for known weaknesses in security on services and devices present on your network
What are Vulnerability Scanners?
A type of penetration testing where the tester has full knowledge of the system environment
What is Known Environment testing (white box testing)?
This is the method of hiding data within another piece of data, can be detected through hashing if you have a known original version of the data
What is Steganography?
This attack commonly uses scripts hidden within vulnerable social media comment sections, where an attack is stored on the server but runs within the user's browsers
What is a Cross-Site Scripting XSS attack?
This is a big benefit of cloud computing, the ability for resources to be added for long term changes to use of cloud resources
What is Scalability?
This enforces security policies to a network by inspecting devices that attempt to connect beyond their MAC address and will block devices that do not meet security requirements
What is Network Access Control NAC?
This is calculated by taking the SLE and multiplying it by the ARO
What is the Annualize Loss Expectancy ALE?
This resource on a CA tracks certificates that are no longer valid before their expiration date due to compromise, loss, or other security concerns
What is a CRL Certificate Revocation List?
This process ensures that data cannot be accessed from systems once they are no longer in production use before device disposal
What is decommissioning?
This is the best mitigation against natural disasters in reference to the cloud
What is Geographic Dispersion?
We put these into separate network segments due to the security risks they pose due to being cheaper, weaker devices, even though they are becoming commonplace in all parts of life
What is Internet of Things?
This states the specific tasks that a vendor is performing under a broader contract, has to do with individual jobs or small groups of jobs
What is a Work Order or Statement of Work WO/SOW? Think invoicing for the actual job, not just what is supposed to be done