Define cybersecurity.
Refers to protecting computer systems, including their electronic data, software and hardware, from theft or damage as well as disruption
What are assets in cybersecurity?
Valued data/computerized assets
What is the CIA Triad? What are its assets?
Describes the security attributes of assets
What are the three elements of criminality? Define them.
What is the purpose of cybersecurity testing? What does it provide?
Probes systems to reveal potential failures in furnishing desired level of security.
Provides verification and validation.
What is threat modeling? (i.e., what does it anticipate?)
Anticipates the nature of assaults that might be encountered in the operating environment of the system
Specification of what the system __________ is often less difficult than elaborating what the system __________.
Should do; should not do
List four cybersecurity differences.
When do vulnerabilities appear?
They can either lay dormant for years before exposure or appear with new development.
What are threat actors?
Individuals with varying motivations and skills that will expose control weaknesses and at times will expose it to other threat actors.
Cybersecurity testing must evaluate ___________.
How well risk mitigation supplements risk avoidance.
What is the leading cause of security failures?
Social engineering (exploits through low-tech means)
What is the overall goal of cybersecurity testing?
To reduce overall risk exposure to an acceptable level.
List and define the two cybersecurity test approaches.
What are dynamic security issues?
Issues that can only be seen during execution.
List and define the five stages of cybersecurity testing.
What needs to be done to avoid cybersecurity testers from being mistaken for malicious insiders?
All cybersecurity testing must be pre-authorized in writing by appropriate management
What two modes of cybersecurity testing should be conducted? Define them.
What is fuzzing?
Inserting random variations of expected input values to detect sensitivities that might be exploited
What is Red Team vs. Blue Team?
Derived from the military where team of attackers (red team) is pitted against team of defenders (blue team).
Targeted tests should probe the adequacy of what specific controls? (This is a long list of items having to do with cybersecurity.)