Chapter 16 Flashcards

1
Q

Whats cyber threats

A

threats that comes from individual hackers, criminal groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whats cybersecurity

A

The measure a company takes to protect a computer or a systems against unauthorized access or attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some of the recent cyber attacks

A

Colonial pipeline : Attack for ransomware
Florida water supply : Hacker accessed the water and increased the sodium hydroxide levels to fatals amounts
Equifax: Names ,social security and more were stolen during data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whats is Nation Institute of Standard and Technology (NIST) five functions that company should address to cybersecurity risk

A
  1. recover
    2.Identify
  2. Protect
  3. Detect
  4. Respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats the cyber kill chain

A

the life cycle of cyberattack from the early stage of gathering information through the final steps of damaging the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The three steps in cyber kill chain are

A

gathering info about the network
Accessing the network
Disrupting the network, causing damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 types of cyber attacks

A

Reconnaissance attacks
Access attacks
Disruptive attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain reconnaissance attacks

A

knowledge gathering attacks that help attackers identify targets and plan their operations.
They can set the stage for later access and disrupt the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When gathering information whats are the categories and explain them

A

Physical attack: Threaten element a network administrator has no control over. Ex: people, physical security

Logical attacks: Occur on a fully digital spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats physical reconnaissance attack

A

use human interaction to generate info about the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing is

A

involves persuading people to perform acts that would give access to confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whats email phishing

A

deceptive request designed to trick the victim into sharing private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats dumpster diving

A

is looking through someone else physical trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Eavesdropping is

A

unauthorized interception of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To avoid the eavesdropping risk company

A

use encrypt data and secure communication line. They use file transfer protocol (FTP) that allows them to transfer between company network and outside parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What a logical reconnaissance attacks

A

use digital attacks and does not require human target

17
Q

Ping sweeps ( IP Probe) is

A

identify which host are active in the network by sending communication to each ip address to see if there is a response packet. If the IP does not sent a response packet the packet assumes that the IP address is not active and remove it from the list of prospective access points

18
Q

Port scnas is

A

After the ping sweeps is port scans which indicates the ports that are open and sending or receiving data on the network. They wait for the packet to sees if the ports are active

19
Q

What are logical reconnaissance control activities and explain them

A

Vulnerability scans: Its perform to detect and classify security loopholes in the infrastructure
Penetration test : Its attempting to hack their own company
Patches: company must ensure that their are running the up to date patches

20
Q

Whats a physical access attacks

A

result in acces to either hardware or people

21
Q

Example of physical acesss attacks

A

Tailgating

Accidental tailgating: authorized user is unaware
Polite tailgating; authorized user is aware of the other person but may politely hold the door for the tailgater

22
Q

Whats logical access attacks

A

seek unauthorized acess to a systems or an application by either exploiting a network vulnerability during renaissance attack or use force to get t

23
Q

Brute force attack are

A

attackers attempting many password to access the network before finding the correct one

24
Q

On path attack are

A

hacker is actively injected into the connection ( just like eavesdropping)

25
Q

IP Spoofing is

A

Creates and IP with modified addresses to disguise their identity and impersonate a legitimate computer network

26
Q

hat are the packets in IP Spoofing

A

Normal packet: IP address of the packet sender
Spoofed packets: Forged sources address

27
Q

Whats denial of service attacks

A

the goal is to send excessive traffic to a server so that it is unavailable for real users

28
Q

What are Botnets

A

they are computers that are programmed to do whatever the attackers want

29
Q

Whats a distributed denial of service attacks

A

uses multiple computers to increase pressure on the victim server unti its unavailable

30
Q

What are malware attacks

A

Malicious code that is written to cause harm and attack the target system

31
Q

What is an example of malware

A

virus

32
Q

Explain worms

A

replicate human interaction whitout assistance

33
Q

Explain logic bomb

A

malicious code that is programmed into a systems and remains dormant until certain conditions are met. They are difficult to detect or prevent until they are active

34
Q

Trojan horse is

A

disguised as software but carries malicious code that may activated via a logic bomb. They are non replicating and use to obtain back door access