Attacks, Threats, Vulnerabilities Flashcards

1
Q

The Principle Behind Social Engineering.

What are they?

A

Authority

Intimidation

Consensus / Social Proof

Scarcity

Urgency

Familiarity / Liking

Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Principle Behind Social Engineering:

Explain Authority?

A

Convincing a target that they have the authority in the situation so they can act a certain way.

You are trying to entice the target that you have the authority (manager, high level person) asking them to do something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Principle Behind Social Engineering:

Explain Intimidation?

A

A principle that attacker would use on a target to cause apprehension.

They will try to install fear on the target so they can they act or do what they want them to do.

Ex. Telling someone they will go to jail if they don’t do what is being told of them to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Principle Behind Social Engineering:

Explain Consensus/Social Proof?

A

Meaning that if the attacker can convince a target that others are also doing it, then they should also do it.

Ex. Monkey See Monkey do.
F.O.M.O. - Fear of missing out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Principle Behind Social Engineering:

Explain Scarcity?

A

Supply and demand.

When the attacker tells the target that things are in short supply and should act fast. People may want it more when things are in low supply.

Ex. There is only 2 left on this thing at this price… act now.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Principle Behind Social Engineering:

Explain Urgency?

A

Time…

Act now or it will be gone forever and not think about the consequences.

Ex. Cash settlement with a link that only has limited time to act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Principle Behind Social Engineering:

Explain Familiarity/Liking?

A

Establishing a place of comfort.

When attacker craft a thing in a way that will interest you that make you feel comfortable.

The more comfortable the target gets, the likely that they will do what the attacker is asking them to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Principle Behind Social Engineering:

Explain Trust?

A

Give the target a pathway to think that they are doing what is right at that moment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some social engineering techniques?

A

Pretexting

Impersonation

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the pretexting social engineering technique?

A

When the attacker crafts a fake scenario that sounds legit.

As long as the scenario is believable, someone can fall in this trap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the impersonation social engineering technique?

A

Preventing to be someone you are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the reconnaissance social engineering technique?

A

Is the process of building up information that is specific of the target. It can be both digital and in person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spam?

A

Unsolicited emails sent to many recipients.

Mostly a nuisance but can be a security concern. (links or attachments)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Spim?

A

Is like Spam but sent over SMS (text messages) or VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Phishing?

A

It’s a email based attack used by social engineers to induce people to give up personal info such as passwords or financial data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the CIA Triad?

A

Confidentiality / Integrity / Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does Confidentiality mean?

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does integrity mean?

A

Ensures that there is no unauthorized modifications to information or system whether intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does Availability mean?

A

Ensures that information and systems are ready to meet the need of users when requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 3 key threats to cybersecurity programs?

A

Disclosure / Alteration / Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does Disclosure mean?

D.A.D Triad.

A

Sensitive data or systems are exposed to unauthorized individuals.

Also known as DATA LOSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does Alteration mean?

D.A.D Triad.

A

The unauthorized modification of information whether internally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does Denial mean?

D.A.D Triad.

A

The disruption of authorized users access to information or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Financial Risk?

A

the rest of monetary damage to the organization as a the results of the data breach or destruction of physical buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Reputational risk?

A

When negative publicity surrounding a security breach causes the loss of trust among anyone associated with the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Strategic Risk?

A

The risk that a company will become less effective in meeting its major goals due to the breach.

Ex. Losing laptop with the only copy of a new product or competitors gaining your info of a new product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Operational Risk?

A

Is the risk of a company to cary out its day to day functions. Things are not efficient causing slow delivery of products or processes.

28
Q

What is a Compliance risk?

A

Is the risk of running afoul of legal or regulatory requirements.

Not following the guidelines given. Example - HIPPA

29
Q

What is an invoice scam?

A

common phishing strategy in which an invoice is sent to you.

30
Q

What is P.I.I ?

A

Personal Identifiable Information.

31
Q

What is Identify Fraud ?

A

When someone identifiable information is stolen AND USED.

32
Q

What are hoaxes?

A

false info made to appear real so you can act on it.

Example: Popups

33
Q

What is watering hole?

A

Is where attacks compromise a website that many will visit frequently.

Example - Solarwinds attack.

34
Q

What is typo squatting?

A

When a cyber criminal register domain names with common typos.

35
Q

What is pharming?

A

Redirection of traffic from a legit site to a fake site by modifying the DNS servers and entries.

36
Q

What is an evil twin attack?

A

Is when rogue wifi AP that has a power signal with the same SSID that is legit. This allows attackers to monitor and analyze traffic.

Password, PII may be harvested, signal jamming may happen.

37
Q

What is blue jacking?

A

Sending of messages / images / audio or video to send via bluetooth.

Similar to spam but via bluetooth.

38
Q

What is blue snarfing?

A

stealing of data via bluetooth. This is unauthorized access through bluetooth.

39
Q

What is a physical attack?

A

USB can have malware and/or cause a power surge attack.

40
Q

What is a supply chain attack?

A

Attackers infiltrate third party software vendors so that they can cause damage to the users that use it. This is a type of a watering hole attack.

Example - SOLARWIND!

41
Q

What is a Shadow IT?

A

Use of info technology systems, devices software, applications and services without explicit IT department approval.

42
Q

What is a black hat (unauthorized) hacker?

A

Criminal hacker who attack systems for personal gain or other malicious purposes.

43
Q

What is a white hat (authorized) hacker?

A

Security experts who study and practice hacking legally for finding countermeasures against other hackers.

44
Q

What is a gray hat (un)Authorized hacker?

A

Hackers who are neither black hats nor white hats but haver characteristics of both.

45
Q

Under attacker qualities, what does intent mean?

A

The actual goal of the attacker. For instance, financial gain, political motive, gathering intelligence, etc.

46
Q

Under attacker qualities, what does sophistication mean?

A

Some attackers are clumsy and obvious, others are like cyber-ninjas.

47
Q

Under attacker qualities, what does resources mean?

A

Ranging from a teenager on their parents’ computer to the NSA.

48
Q

Under attacker qualities, what does location mean?

A

Some attacks need physical access, while others cab be conducted from from anywhere.

49
Q

Under attacker qualities, what does information mean?

A

Attackers may know nothing about your organization, or others (such as insiders) may know quite a bit.

50
Q

What is a script kiddies?

A

Less skill and knowledge, simply uses scripts. The is the lowest level attacker.

51
Q

What is an Hacktivist?

A

Hackers who attack organizations for political reasons?

52
Q

What is an Organized Criminal?

A

Criminal hackers who typically seek financial gain.

53
Q

What is a competitor?

A

Unethical business attempt attack on comepetitors.

54
Q

What is a insider attack?

A

Employees or ex-employees.

55
Q

What is a nation state / state actor?

A

Intelligence agencies, militaries and dedicated cyberwarfare organizations.

A hacker who has a license to hack.

56
Q

What is an APT?

A

Advanced persistent threat; ongoing series of sophisticated attacks; associated with nation states.

57
Q

What is a Cyber Kill Chain?

A

A model developed by Lockheed Martin. Basically a framework that has a series of distinct steps that an attacker uses during a cyberattack.

This helps us understand and combat different forms of attacks.

58
Q

What are the steps in a Cyber kill Chain?

A

Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and Control
Actions on Objectives

59
Q

Explain the reconnaissance phase in a cyber kill chain?

A

Attackers attempt to enumerate exploitable vulnerabilities and weaknesses.
Ex. Unpatched Systems / Misconfigurations /

Attackers use numerous tools ( nmap, OSINT, OpenVAS)

60
Q

Explain the weaponization phase in a cyber kill chain?

A

Attackers choose vulnerabilities to exploit. They are creating the attack to exploit the vulnerability.

61
Q

Explain the delivery phase in a cyber kill chain?

A

They start to attack you.
Ex. Malicious email attachment
Infected USB
Pharming attacks
Watering hole

62
Q

Explain the exploitation phase in a cyber kill chain?

A

Attackers start executing what they delivered to your systems.

63
Q

Explain the installation phase in a cyber kill chain?

A

Attacker installs persistence mechanisms to ensure that they can come back again and again.

64
Q

Explain the command and control phase in a cyber kill chain?

A

Lines of communication are open with attackers maybe to there c2 server and your servers.

65
Q

Explain the Actions and objectives phase in a cyber kill chain?

A

Total remote access and steal all your data at any time.