2.1 Common Threats Flashcards

1
Q

2.1.1 Threat Domains

A

A threat domain is considered to be an area of control, authority, or protection that attackers can exploit to gain access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.1.2 Types of Cyber Threats

A

Cyber threats can be classified into different categories. This allows organizations to assess the likelihood of a threat occurring and understand the monetary impact of a threat so that they can prioritize their security efforts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software attacks

A

A successful denial-of-service (DoS attack)
A computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software errors

A

A software bug
An application going offline
A cross-site script or illegal file server share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sabotage

A

An authorized user successfully penetrating and compromising an organization’s primary database
The defacement of an organization’s website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Human errors

A

Inadvertent data entry errors
A firewall misconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Theft

A

Laptops or equipment being stolen from an unlocked room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hardware failures

A

Hard drive crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Utility interruption

A

Electrical power outages
Water damage resulting from sprinkler failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Natural disasters

A

Severe storms such as hurricanes or tornados
Earthquakes
Floods
Fires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2.1.3 Internal vs External Threats

A

Threats can originate from both within and outside of an organization, with attackers seeking access to valuable sensitive information such as personnel records, intellectual property, and financial data.

Internal threats are usually carried out by current or former employees and other contract partners who accidentally or intentionally mishandle confidential data or threaten the operations of servers or network infrastructure devices by connecting infected media or by accessing malicious emails or websites.

The source of an external threat typically stems from amateur or skilled attackers who can exploit vulnerabilities in networked devices or can use social engineering techniques, such as trickery, to gain access to an organization’s internal resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2.1.5 User Threats and Vulnerabilities

A

A user domain includes anyone with access to an organization’s information system, including employees, customers, and contract partners. Users are often considered to be the weakest link in information security systems, posing a significant threat to the confidentiality, integrity, and availability of an organization’s data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

No awareness of security

A

Users must be aware of and understand an organization’s sensitive data, security policies and procedures, technologies, and countermeasures that are implemented in order to protect information and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Poorly enforced security policies

A

All users must be aware of and understand an organization’s security policies, as well as the consequences of non-compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Theft

A

Data stolen by users can pose a significant financial threat to organizations, both in terms of the resulting damage to their reputation and the legal liability associated with the disclosure of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unauthorised downloads and media

A

Many network and device infections and attacks can be traced back to users who have downloaded unauthorized emails, photos, music, games, apps, or videos to their computers, networks, or storage devices. The use of unauthorized media such as external hard disks and USB drives also poses a threat.

17
Q

Unauthorized VPNs

A

VPNs can hide the theft of unauthorized information because the encryption normally used to protect confidentiality can stop a network administrator from tracking data transmission (unless they have permission to do so).

18
Q

Unauthorized websites

A

Accessing unauthorized websites can pose a risk to a user’s data and devices, as well as the organization itself. Often, these websites prompt users to download scripts or plugins that contain malicious code or adware. Some of these sites can even take over user devices like cameras and applications.

19
Q

Destructions of systems, applications and data

A

The accidental or deliberate destruction or sabotage of systems, applications, and data poses a serious risk to all organizations. Activists, disgruntled employees, or industry competitors may attempt to delete data and destroy or misconfigure devices to make organizational data and information systems unavailable.

20
Q
A

Always keep in mind that there are no technical solutions, controls, or countermeasures that will make information systems any more secure than the behaviors and processes of the people who use these systems.

21
Q

2.1.6 Threats to Devices

A

Any devices left powered on and unattended pose the risk of someone gaining unauthorized access to network resources.
Downloading files, photos, music, or videos from unreliable sources could lead to the execution of malicious code on devices.
Cybercriminals often exploit security vulnerabilities within software installed on an organization’s devices to launch an attack.
An organization’s information security teams must try to keep up to date with the daily discovery of new viruses, worms, and other malware that pose a threat to their devices.
Users who insert unauthorized USB drives, CDs, or DVDs run the risk of introducing malware, or compromising data stored on their device.
Policies are in place to protect an organization’s IT infrastructure. A user can face serious consequences for purposefully violating such policies.
Using outdated hardware or software makes an organization’s systems and data more vulnerable to attack.

22
Q

2.1.7 Threats to the Local Area Network

A

The local area network (LAN) is a collection of devices, typically in the same geographic area, connected by cables (wired) or airwaves (wireless).

Because users can access an organization’s systems, applications, and data from the LAN domain, it is critical that it has strong security and stringent access controls.

Examples of threats to the LAN include:

Unauthorized access to wiring closets, data centers and computer rooms
Unauthorized access to systems, applications and data
Network operating system or software vulnerabilities and updates
Rogue users gaining unauthorized access to wireless networks
Exploits of data in transit
Having LAN servers with different hardware or operating systems makes managing and troubleshooting them more difficult
Unauthorized network probing and port scanning
Misconfigured firewalls

23
Q

2.1.8 Threats to the Private Cloud

A

The private cloud domain includes any private servers, resources, and IT infrastructure available to members of a single organization via the internet. While many organizations feel that their data is safer in a private cloud, this domain still poses significant security threats, including:

Unauthorized network probing and port scanning
Unauthorized access to resources
Router, firewall or network device operating system or software vulnerabilities
Router, firewall or network device configuration errors
Remote users accessing an organization’s infrastructure and downloading sensitive data

24
Q

2.1.9 Threats to the Public Cloud

A

Where a private cloud domain hosts computing resources for a single organization, the public cloud domain is the entirety of computing services hosted by a cloud service or internet provider that are available to the public or shared across organizations.

25
Q

2.1.10 Threats to Applications

A

The application domain includes all of the critical systems, applications, and data used by an organization to support operations. Increasingly, organizations are moving applications such as email, security monitoring, and database management to the public cloud.

Common threats to applications include:

Someone gaining unauthorized access to data centers, computer rooms, wiring closets or systems
Server downtime during maintenance periods
Network operating system software vulnerabilities
Data loss
Client-server or web application development vulnerabilities

26
Q

2.1.12 Threat Complexity

A

An advanced persistent threat (APT) is a continuous attack that uses elaborate espionage tactics involving multiple actors and/or sophisticated malware to gain access to the target’s network.
Attackers remain undetected for a long period of time, with potentially devastating consequences. APTs typically target governments and high-level organizations and are usually well-orchestrated and well-funded.

As the name suggests, algorithm attacks take advantage of algorithms in a piece of legitimate software to generate unintended behaviors. For example, algorithms used to track and report how much energy a computer consumes can be used to select targets or trigger false alerts. They can also disable a computer by forcing it to use up all its RAM or by overworking its central processing unit (CPU).

27
Q

2.1.13 Backdoors and Rootkits

A
28
Q

Backdoors

A

Backdoor programs, such as Netbus and Back Orifice, are used by cybercriminals to gain unauthorized access to systems by bypassing the normal authentication procedures.

Cybercriminals typically have authorized users unknowingly run a remote administrative tool program (RAT) on their computer that installs a backdoor. The backdoor gives the criminal administrative control over a target computer. Backdoors grant cybercriminals continued access to a system, even if the organization has fixed the original vulnerability used to attack the system.

29
Q

Rootkits

A

This malware is designed to modify the operating system to create a backdoor that attackers can then use to access the computer remotely.

Most rootkits take advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.

Rootkits can also modify system forensics and monitoring tools, making them very hard to detect. In most cases, a computer infected by a rootkit has to be wiped and any required software reinstalled.

30
Q

2.1.14 Threat Intelligence and Research Sources

A

The United States Computer Emergency Readiness Team (US-CERT) and the U.S. Department of Homeland Security sponsor a database of common vulnerabilities and exposures (CVE). These CVEs have been widely adopted as a way to describe and reference known vulnerabilities.

Each CVE entry contains a standard identifier number, a brief description of the security vulnerability, and any important references to related vulnerability reports. The CVE list is maintained by a not-for-profit, the MITRE Corporation, on its public website.

31
Q

The Dark Web

A

This refers to encrypted web content that is not indexed by conventional search engines and requires specific software, authorization, or configurations to access. Expert researchers monitor the dark web for new threat intelligence.

32
Q

Indicator of Compromise (IOC)

A

IOCs such as malware signatures or malicious domain names provide evidence of security breaches and details about them.

33
Q

Automated Indicator Sharing (AIS)

A

Automated Indicator Sharing (AIS), a Cybersecurity and Infrastructure Security Agency (CISA) capability, enables the real-time exchange of cybersecurity threat indicators using a standardized and structured language. Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence Information (TAXII) are standards used in AIS.