01. Introduction to Ethical Hacking Flashcards
(41 cards)
What is CONFIDENTIALITY?
Assurance that the information is accessible only to those authorised to have access.
What is INTEGRITY?
The trustworthiness of data or resources in terms of preventing improper or unauthorised changes.
What is AVAILABILITY?
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
What is AUTHENTICITY?
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
What is NON-REPUDIATION?
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
What is the ATTACK EQUATION?
Attacks = Motive + Method + Vulnerability
What are PASSIVE ATTACKS?
Passive attacks do not tamper with the data and involve intercepting and monitoring network traffic and data flow on the target network.
Examples: Sniffing, Eavesdropping, Network Traffic Analysis
What are ACTIVE ATTACKS?
Active attacks tamper with the data in transit or disrupt the communication or services between the systems to bypass or break into secured systems.
Examples: DoS, Man-in-the-Middle, Session Hijacking and SQL Injection
What are CLOSE-IN ATTACKS?
Close-in attacks are performed when the attacker is in close physical proximity with the target system or network in order to gather, modify, or disrupt access to information.
Examples: Social Engineering such as Eavesdropping, Shoulder Surfing, and Dumpster Diving
What are INSIDER ATTACKS?
Insider attacks involve using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems.
Examples: Theft of physical devices, Planting Keyloggers, Backdoors, Malware
What are DISTRIBUTION ATTACKS?
Distribution attacks occur when attackers tamper with hardware or software prior to installation.
Examples: Attackers tampering with hardware (or software) at its source or in transit
What are three examples of OFFENSIVE WARFARE?
Web Application Attacks, Web Server Attacks, Malware Attacks, MITM Attacks, System Hacking
What is DEFENSIVE INFORMATON WARFARE?
Refers to all strategies and actions designed to defend against attacks on ICT assets.
What are three examples of DEFENSIVE WARFARE?
Prevention, Deterrence, Alerts, Detection, Emergency Preparedness, Response
What is OFFENSIVE INFORMATION WARFARE?
Refers to information warfare that involves attacks against the ICT assets of an opponent.
What is the CEH HACKING METHODOLOGY? (CHM)
Footprinting, Scanning, (Enumeration, Vulnerability Analysis), Gaining Access (Cracking Passwords, Vulnerability Exploitation), (Escalating Privileges), Maintaining Access (Executing Applications, Hiding Files), Clearing Logs (Covering Tracks)
What is the CYBER KILL CHAIN METHODOLOGY?
Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and Control, Actions on Objectives
Define the CYBER KILL CHAIN METHODOLOGY.
The cyber kill chain methodology is a component of intelligence-driven defense for the identification and prevention of malicious intrusion activities. It provides greater insight into attack phases, which helps security professionals to understand the adversary’s tactics, techniques, and procedures beforehand.
What are TACTICS, TECHNIQUES, and PROCEDURES?
Tactics, Techniques, and Procedures (TTPs) refers to the patterns of activities and methods associated with specific threat actors or groups of threat actors.
What are TACTICS? (TTP)
“Tactics” are the guidelines that describe the way an attacker performs the attack from beginning to the end.
What are TECHNIQUES? (TTP)
“Techniques” are the technical methods used by an attacker to achieve intermediate results during the attack.
What are PROCEDURES? (TTP)
“Procedures” are organizational approaches that threat actors follow to launch an attack.
What is the MITRE ATT&CK FRAMEWORK? (PRE-ATT&CK and ENTERPRISE)
Reconnaissance, Weaponise, Deliver, Exploit, Control, Execute, Maintain
Define the MITRE ATT&CK FRAMEWORK.
MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, government, and the cybersecurity product and service community. The 14 tactic categories within ATT&CK for Enterprise are derived from the later stages (exploit, control, maintain, and execute) of the seven stages of the Cyber Kill Chain.