Gov & the Rest Mock Up

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

STIX/TAXII

Definition and Explanation:


• STIX (Structured Threat Information eXpression): A
standardized language for representing cyber threat
information. It enables the sharing of threat data
across different systems and organizations to
improve situational awareness and defense
mechanisms.
• TAXII (Trusted Automated eXchange of Indicator
Information): A protocol that facilitates the
exchange of cyber threat information over HTTPS. It
is designed to support the sharing of STIX data.
Uses:
• Threat Intelligence Sharing: Organizations use STIX
to format and TAXII to transport threat intelligence
data, enhancing collaborative efforts in identifying
and mitigating cyber threats.
• Incident Response: Security teams utilize STIX/TAXII
to exchange real-time threat indicators, enabling
quicker response to ongoing cyber incidents.
Use Cases/Scenarios:
• Government Agencies: Sharing threat information
about potential state-sponsored attacks.
• Private Sector: Collaboration between companies to
defend against industry-specific threats like
ransomware campaigns targeting financial
institutions.
Characteristics:
• Interoperability: STIX/TAXII enables different
security tools to work together by standardizing the
format and exchange of threat data.
• Automation: Supports automated threat intelligence
sharing, reducing the time to detect and respond to
threats.

Data Sovereignty
Definition and Explanation: Data sovereignty refers to
the concept that data is subject to the laws and
governance structures within the nation it is collected.
This is crucial for understanding how data privacy,
security, and access policies apply to data stored or
processed in different jurisdictions.

Uses:
• Compliance: Ensuring data storage and processing
comply with local laws and regulations, such as
GDPR in Europe.
• Risk Management: Identifying and mitigating risks
associated with storing data in foreign countries.
Use Cases/Scenarios:
• Multinational Corporations: Navigating diverse
regulatory landscapes when storing employee and
customer data across various countries.
• Cloud Services: Ensuring cloud service providers
adhere to local data sovereignty laws when hosting
data internationally.
Characteristics:
• Legal Compliance: Must comply with local laws
where the data resides.
• Data Localization: Often involves storing data within
specific geographical boundaries to meet legal
requirements.

IRC (Internet Relay Chat)


Definition and Explanation: IRC is a protocol for real-
time text messaging between users over the internet. It
is widely used for group communication in discussion
forums, as well as for one-on-one private messages.
Uses:
• Community Building: Creating online communities
where users can chat in real-time.
• Collaboration: Facilitating communication within
and between organizations, especially for technical
support and coordination.
Use Cases/Scenarios:
• Open Source Projects: Developers and contributors
use IRC channels to discuss project updates, share
code, and resolve issues.
• Customer Support: Companies use IRC to provide
real-time support to their customers.
Characteristics:
• Real-Time Communication: Enables immediate
interaction between users.
• Channel-Based: Supports multiple channels, each
dedicated to different topics or groups.

Hash Algorithms (e.g., CHAP)


Definition and Explanation: Hash algorithms are
cryptographic functions that take an input (or message)
and return a fixed-size string of bytes. The output is
typically a "digest" that is unique to each unique input.
CHAP (Challenge-Handshake Authentication Protocol)
uses hash algorithms for secure authentication.
Uses:
• Data Integrity: Ensuring that data has not been
altered.
• Authentication: Verifying identities securely, as in
the case of CHAP.
Use Cases/Scenarios:
• Password Storage: Storing passwords as hashes
instead of plaintext to enhance security.
• Network Authentication: Using CHAP in PPP (Point-
to-Point Protocol) to authenticate users.

Characteristics:
• Deterministic: The same input always produces the
same hash.
• Collision-Resistant: Difficult to find two different
inputs that produce the same hash.

Types of Controls
Definition and Explanation: Controls in cybersecurity are
measures implemented to mitigate risks and secure
systems. They are typically categorized into three types:
1. Physical Controls: Measures that protect the
physical infrastructure of IT systems.
2. Technical Controls: Security measures implemented
through technology.
3. Administrative Controls: Policies and procedures
designed to manage and enforce security within an
organization.
Uses:
• Physical Controls: Protecting hardware and facilities.
• Technical Controls: Securing software and network
resources.
• Administrative Controls: Governing employee
behavior and organizational processes.
Use Cases/Scenarios:
• Physical Controls: Using locks, biometric scanners,
and surveillance cameras.
• Technical Controls: Implementing firewalls,
encryption, and intrusion detection systems.
• Administrative Controls: Developing security
policies, conducting training, and performing risk
assessments.
Characteristics:
• Preventative: Aim to prevent security incidents.
• Detective: Identify and detect security breaches.
• Corrective: Mitigate the impact of a security
incident.
Footprinting (including ports and null pointer)
Definition and Explanation: Footprinting is the process
of gathering information about a target system to
identify potential vulnerabilities. It often involves
scanning ports and looking for open or vulnerable
services.
Uses:
• Reconnaissance: Gathering information before
launching a cyber attack.
• Security Assessment: Identifying weaknesses in a
network or system.
Use Cases/Scenarios:
• Penetration Testing: Ethical hackers perform
footprinting to simulate an attack and identify
security gaps.
• Cyber Attack: Malicious actors use footprinting to
gather intelligence on a target system.
Characteristics:
• Passive Footprinting: Collecting information without
directly interacting with the target.
• Active Footprinting: Directly interacting with the
target to gather information.
Cyber Kill Chain
Definition and Explanation: The Cyber Kill Chain is a
model developed by Lockheed Martin that outlines the
stages of a cyber attack from reconnaissance to data
exfiltration. It helps in understanding and defending
against cyber threats.
Uses:
• Incident Response: Identifying and interrupting an
attack at various stages.
• Threat Analysis: Understanding the tactics and
techniques used by attackers.
Use Cases/Scenarios:
• Defensive Strategies: Organizations use the Cyber
Kill Chain to develop strategies to detect and
respond to attacks at each stage.
• Security Training: Educating security personnel on
the lifecycle of a cyber attack.
Characteristics:
• Structured Approach: Provides a systematic method
for analyzing attacks.
• Proactive Defense: Helps in implementing defenses
to counteract each stage of the attack.
Polymorphism
Definition and Explanation: Polymorphism in
cybersecurity refers to the ability of malicious software
to change its code or appearance to avoid detection by
security tools. This makes it difficult for traditional
signature-based antivirus solutions to identify the
malware.
Uses:
• Evasion: Malware uses polymorphism to evade
detection by changing its signature.
• Advanced Attacks: Enhancing the sophistication of
attacks by continuously evolving.
Use Cases/Scenarios:
• Malware Development: Creating malware that can
alter its code with each infection.
• Persistent Threats: Ensuring long-term undetected
presence within a system.
Characteristics:
• Dynamic Code: The malware continuously changes
its code to avoid detection.
• Stealth: Increases the difficulty of detection by
traditional security measures.

Service Accounts
Definition and Explanation: Service accounts are special
user accounts created to run services, applications, or
automated tasks on behalf of the system. They often
have elevated privileges and are managed differently
from regular user accounts.
Uses:
• Automation: Running scheduled tasks or scripts.
• Service Management: Operating system services
and applications.
Use Cases/Scenarios:
• Database Services: Using service accounts to
manage database operations.
• Application Deployment: Running applications that
require specific permissions to function.
Characteristics:
• Non-Interactive: Typically not used for logging in
interactively.
• Privilege Management: Often have elevated
permissions necessary for specific functions.
Entropy
Definition and Explanation: Entropy in cybersecurity
refers to the randomness collected by a system for use in
cryptographic functions. High entropy ensures that
cryptographic keys and other secure random values are
unpredictable.
Uses:
• Cryptography: Generating secure cryptographic
keys.
• Random Number Generation: Ensuring the
unpredictability of random values.
Use Cases/Scenarios:
• Encryption: Using high entropy sources for key
generation.
• Security Tokens: Creating random tokens for secure
communications.
Characteristics:
• Unpredictability: High entropy ensures values
cannot be easily guessed.
• Security: Critical for maintaining the strength of
cryptographic systems.
SSAE SOC Type I & II
Definition and Explanation: SSAE (Statement on
Standards for Attestation Engagements) provides
standards for auditors to assess the controls at a service
organization. SOC (System and Organization Controls)
reports are divided into:
• Type I: Describes the service organization's systems
and the suitability of the design of controls.
• Type II: Includes everything in Type I, plus the
operational effectiveness of those controls over a
specified period.
Uses:
• Audit and Compliance: Providing assurance about
the controls in place at service organizations.
• Risk Management: Assessing the effectiveness of
controls to manage risk.
Use Cases/Scenarios:
• Vendor Assessment: Evaluating the security and
reliability of third-party service providers.
• Regulatory Compliance: Meeting regulatory
requirements for data protection and control
assurance.
Characteristics:
• Detailed Reporting: Type II reports include an
examination of control effectiveness over time.
• Assurance: Provides confidence to stakeholders
about the security and reliability of the service
organization.
RAID Levels
Definition and Explanation: RAID (Redundant Array of
Independent Disks) is a technology that combines
multiple disk drives into a single unit to improve
performance and provide data redundancy. Common
RAID levels include:
• RAID 0: Striping without redundancy. Improves
performance but offers no fault tolerance.
• RAID 1: Mirroring. Data is duplicated across two or
more disks, providing redundancy.
• RAID 5: Striping with parity. Distributes data and
parity information across all disks, offering a balance
of performance and redundancy.
• RAID 10: Combines RAID 1 and RAID 0. Provides high
performance and redundancy by striping mirrored
sets.
Uses:
• Data Redundancy: Protecting data against disk
failures.
• Performance Improvement: Enhancing read and
write speeds.
Use Cases/Scenarios:
• Database Servers: Using RAID 10 for high-
performance and high-availability databases.
• File Servers: Using RAID 5 for efficient storage with
fault tolerance.
Characteristics:
• Redundancy: Provides varying levels of data
protection.
• Performance: Can significantly improve read/write
speeds depending on the RAID level.
Advanced Malware (APTs)
Definition and Explanation: Advanced Persistent Threats
(APTs) refer to sophisticated, targeted cyber attacks that
aim to gain and maintain access to a network over an
extended period. They often involve multiple attack
vectors and techniques to evade detection and achieve
their objectives.
Uses:
• Espionage: Stealing sensitive information over a long
period.
• Disruption: Compromising critical infrastructure or
business operations.
Use Cases/Scenarios:
• State-Sponsored Attacks: Nation-states targeting
other governments or organizations for intelligence.
• Corporate Espionage: Competitors targeting
companies to steal trade secrets.
Characteristics:
• Persistence: Maintains long-term access to the
target network.
• Sophistication: Uses advanced techniques to evade
detection and maintain control.

RTO/RPO
Definition and Explanation: RTO (Recovery Time
Objective) and RPO (Recovery Point Objective) are
metrics used in disaster recovery and business continuity
planning:
• RTO: The maximum acceptable amount of time to
restore a system or service after a disruption.
• RPO: The maximum acceptable amount of data loss
measured in time. It defines the point in time to
which data must be restored after a disruption.
Uses:
• Business Continuity Planning: Defining acceptable
downtime and data loss to ensure organizational
resilience.
• Disaster Recovery: Planning and implementing
strategies to meet RTO and RPO objectives.
Use Cases/Scenarios:
• IT Systems: Establishing RTO and RPO for critical
applications to minimize downtime and data loss.
• Data Centers: Designing backup and replication
strategies to meet defined RTO and RPO.
Characteristics:
• Quantitative Metrics: Provides measurable
objectives for recovery efforts.
• Risk Management: Helps in prioritizing recovery
efforts based on business impact.
Transport Encryption (HTTPS/TLS)
Definition and Explanation: Transport encryption
ensures the security of data as it travels over networks.
HTTPS (HyperText Transfer Protocol Secure) and TLS
(Transport Layer Security) are commonly used protocols
for encrypting data in transit.
Uses:
• Secure Communication: Protecting data from
eavesdropping and tampering during transmission.
• Data Integrity: Ensuring data remains unchanged
during transport.
Use Cases/Scenarios:
• Web Browsing: Using HTTPS to secure connections
between web browsers and servers.
• Email Security: Using TLS to encrypt email
communications.
Characteristics:
• Encryption: Uses strong cryptographic algorithms to
protect data.
• Authentication: Ensures the identity of the
communicating parties.
TLS
Definition and Explanation: TLS (Transport Layer
Security) is a cryptographic protocol that provides secure
communication over a computer network. It is the
successor to SSL (Secure Sockets Layer) and is widely
used to secure internet communications.
Uses:
• Web Security: Securing data transferred between
web servers and browsers.
• Application Security: Securing communications for
various applications such as email, messaging, and
VPNs.
Use Cases/Scenarios:
• E-Commerce: Ensuring secure transactions and
protecting customer data on online shopping sites.
• Secure APIs: Protecting data exchanged between
different software applications.
Characteristics:
• Encryption: Protects data in transit from
eavesdropping and tampering.
• Authentication: Verifies the identities of the
communicating parties to prevent man-in-the-
middle attacks.

You might also like