SB 17: Attacks Flashcards

1
Q

What does incident prevention mean?

A

It is when you (ideally) can detect and stop an attack before it succeeds. It is common to use real-time intrusion detection and other techniques for monitoring logs and systems. In order to respond to an attack it needs to be identified before it is completed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is jailing?

A

It aims to fool an attacker into believing their attack was successful by placing them in a confined area. Multilevel security systems are excellent for jailing because they can provide greater degrees of confinement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is diversity?

A

It is an attempt to increase the difficulty of succeeding with an attack by introducing diversity in the different systems. If all systems are the same then one attack will work on all of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is moving target defense?

A

It is a diversity mechanism that changes the system whilst it is running in order to try and thwart attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the attack surface?

A

The set of entry points and data that can be used to compromise a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the defender’s dilemma?

A

The attacker has more flexibility because they can change tactics. Whereas the attack surface can really only stay the same, be minimized or eliminated. It highlights the asymmetry that exist between a defender and attacker. Moving target can reduce the asymmetry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give some examples of moving target defense and briefly explain how they work

A

Network based: IP address hopping. Meant to confuse attackers and hide services. When a client contacts the server, a component maps the destination address and port number to different ones. When the packet gets to the network the server is located on a mechanism maps the address and port to the actual ones the server is located on. The mapped addresses and port numbers are selected pseudorandomly. It must not cause any impediment to the authorized client while still preventing unauthorized ones. Relies on randomness to prevent predicting the changes to the attack surface.

Address space layout randomization (ASLR): Randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap and libraries. The effectiveness is dependent upon the amount of randomness introduced. Attacks that rely on knowing the location of variables and functions will fail. It aims to prevent the exploitation of memory corruption vulnerabilites (like buffer overflow).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the different phases of intrusion handling?

A

There are different steps that are required in order to restore a system to comply with the security policy.

  1. Preparation: occurs before an attack. Deals with establishing procedures and mechanisms for detecting and responding to attacks.
  2. Identification: when an attempted attack has been identified it triggers the remaining phases.
  3. Containment: trying to limit the effects of the attack as much as possible.
  4. Eradication: to try and stop and block the attack and any further similar ones.
  5. Recovery: to restore the system to a secure state that complies with the security policy.
  6. Follow-up: taking action against the attacker, identifying problems in the handling of the incident and recording lessons learned.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the containment phase

A

To limit the access of the attacker to system resources. Can be done via two approaches.

  1. Passive monitoring
  2. Constraining access to prevent further damage. Minimize the protection domain of the attacker and prevent them from achieving their goal. If the goal is unknown there is a risk that the attacker might be constrained to the area where the information they want is.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some methods used in the eradication phase?

A

Wrappers: a common method for blocking. Placed around suspected targets. Implement various forms of access control, enables local or networked control of access.

Firewalls: controls access from the external network (the Internet) to the internal network and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Computer Security Incident Response Team (CSIRT)?

A

A team established to assist and co-ordinate responses to a security incident among a defined constituency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What forms can a counter-attack take?

A

Legal measures
Technical counterattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a honeypot and during which phase can it be implemented?

A

A carefully designed piece of information or data that will entice the attacker and thus trap them (hopefully) long enough for any countermeasures to be carried out. Used in the containment phase (in order to continue by moving to the eradication phase i guess)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a deception toolkit (DTK)?

A

Using deception as a method for countering attacks. Decieving the attacker into believing the system has more vulnerabilities than it actually does. This can increase the workload for the attacker becuase they will not know which of their attacks is going to work. It enables tracking of attack attempts in order to respond in time.

If enough people use it is will (supposedly) become easier to detect and twhart all but the most sophisticated of attacks.

Requires a widespread usage of the tool = port 365: indicates wheter the machine is running a deception defense or not, therefore it is likely that attackers will look their first and their attack will then be immediately noticed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three aspects of a CSIRT mission?

A
  1. Publication: publish policies and procedures to inform its constituency of what it can do. Communication plan.
  2. Collaboration: collaborate with other CSIRT in gathering and disseminating information and responding to attacks.
  3. Secure communication: Ensuring it’s communicating with the correct recipients and not some impersonator.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is thumb-printing?

A

A method for finding where the attack came from.

It compares the contents of connections passing through hosts. It is possible to construct the chain of hosts making up the connections. Marking and tracing paths to find their origin.