Definitions C

CIA Triad

Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity.

Confidentiality

Involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.

Integrity

Means maintaining and assuring the accuracy and completeness of data over its entire lifecycle.

Availability

For any information system to serve its purpose, the information must be available when it is needed. This means the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly.

Links

Competitive Intelligence

Competitive intelligence (CI) is the process and forward-looking practices used in producing knowledge about the competitive environment to improve organizational performance.

Links

Cyber Kill Chain

Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective. The chain:

  • Reconnaissance

    • Harvesting email addresses, conference information, etc.

  • Weaponization

    • Coupling exploit with backdoor into deliverable payload

  • Delivery

    • Delivering weaponized bundle to the victim via email, web, USB, etc.

  • Exploitation

    • Exploiting a vulnerability to execute code on victim's system

  • Installation

    • Installing malware on the asset

  • Command and control (C2)

    • Command channel for remote manipulation of victim

  • Action on objectives

    • Intruders accomplish their goals

Links

Cyber Threat Intelligence

Cyber threat intelligence (CTI) is knowledge, skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace.

Cyber threat intelligence - tactical

Technical intelligence (including Indicators of Compromise such as IP addresses, file names, or hashes) which can be used to assist in the identification of threat actors.

Cyber threat intelligence - operational

Operational: details of the motivation or capabilities of threat actors, including their tools, techniques and procedures.

Cyber threat intelligence - strategic

Strategic: intelligence about the overarching risks associated with cyber threats which can be used to drive high-level organizational strategy.

Links

Last updated