Cell division Flashcards

(92 cards)

1
Q

Current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data and intentionally misused the access to negatively affect the CIA of the organization’s data or information systems.

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 insider threat methods

A

Steal sensitive data via storage devices
Open backdoors
Logic bombs
Attack internal resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Insider threat detection and prevention techniques

A
Data/File encryption
DLP
Data access monitoring
Data redaction
Data access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discretional access control

A

Only users specified by the owner may have some combination of read, write, and execute rights to file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mandatory access control

A

Access control policy decisions are made by a central authority, not by the individual owner of an object, and the owner cannot change access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Direct remote attacks

A

Attack delivered via wifi, ethernet, rf or bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Drive by attack

A

Malware automatically downloads to user’s system after visiting legitimate, but compromised website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attacks on south korea

DarkSeoul Gang

A

North Korea state sponsored threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TTPs include weaponized email attachments

Human intelligence usage

A

Russian state sponsored threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Russian attributed malware

A
Zeus
Gozi
SpyEye
SpyZeus
Ligats Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vietnamese govt suspected

Poses threat to companies doing business, manufacturing or preparing to invest in the country

A

APT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APTs associated with China

A

30, 18, 17, 12, 3, 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APTs associated with Russia

A

29, 28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attributes of an APT

Loads malicious software directly into a computer’s memory in a way that bypasses HD
Uses blackcoffee malware as part of the first stage of its attacks

A

APT 17 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attributes of an APT -

Major data breach at community health systems
Exploited “Heartbleed” bug in VPN server within CHS network
Gh0st remote access trojan (RAT)

A

APT 18 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attributes of an APT -

Components designed to infect removable drives in order to cross air-gapped networks and steal data
Steal sensitive political, economic and military info about region for gov espionage

Associated malware:
Backspace
Neteagle
Shipshape
Spaceship
Flashfood
A

APT 30 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attributes of an APT -

Only compromised servers for C2 communication

Associated malware:
Hammertoss
Uploader
tDiscover

A

APT 29 - Russia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Associated malware - Chopstick, Sourface
Targets former Soviet state and NATO
Gain insider info related to govts, militaries and security organizations

A

APT 28 - Russia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Maintain surveillance on media outlets that could impact reputation of Chinese leaders
Targets: Western journalists, US military contractors, Taiwanese and Japanese govts, Japanese tech companies
Associated malware- Riptide, hightide, threebyte and waterspout
Most clandestine, discriminating, skilled Chinese group
Adapts tools/techniques based on news reports about itself

A

APT 12 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Associated malware - Leouncia

Tends to focus on sat telecoms and tech companies based primarily in SE Asia

A

APT 5 - Undisclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Main actor behind a major attack campaign: Op Clandestine Fox
Associated malware: Shotput, cookiecutter, and Plugx/sogu

A

APT 3 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Systematically stole hundreds of TB of data from at least 141 organizations spanning 20 major industries
Specifically targets industries that China identifies as strategic in its 5 year plan
Associated malware:
Backdoor.(random names)
Steals broad categories of intellectual property

A

APT 1 - China

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Agents that make use of cyberspace resources for intel collection

A

Cyberspace espionage agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

1 of the critical infrastructure protocols in internet traffic flow

Can be manipulated to route traffic from 1 country to another

A

Border gateway protocol threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Exploits affect info and communication technology devices, which are manufactured, assembled, and distributed from a multitude of individual component and through numerous distributors Operations affect hardware, software, and firmware components
Supply chain threat
26
High performing computing (Russia has 6 HPC systems capable of trillion computations per second) Quantum computing: Are aggressively pursuing implementations for secure quantum communication protocols
Advanced computing technologies
27
Generated bi-weekly by the 624th Ops Center Designed to keep AF members up to date on current threats Strengthens SA of threats that could affect AF personnel/systems
Cyber threat bulletin
28
Annual report which uses insights, statistics, and case studies to show how tools and tactics of APT actors evolved since 2014
Mandiant's annual cyber threat report
29
Worldwide team of security engineers, threat analysts, and researchers who develop a variety of content on the latest threats that impact organizations and end users (Annual threat report, monthly threat report, white papers)
Symantec security response publications
30
Report that resulted in analytic efforts between DHS and FBI USG confirmed 2 RIS actors (APT 29 and APT 28) participated in intrusion against US political party Referred to GRIZZLY STEPPE
JAR-16-20296A | Joint Analysis Report
31
Adversaries transition through 5 phases starting with 0 - 4
Administer - Intent and resource development Prepare - Recon and staging Engage - Delivery and Exploitation Propagate - Internal recon, lateral movement, and network persistence Effect - Exfil and attack
32
Phase 0
Administer resource development and tasking
33
Phase 1
Prepare recon and staging
34
Phase 2
Engage delivery and Exploitation
35
Phase 3
Propagate internal recon, lateral movement, and network persistence
36
Phase 4
Effect exfil and attack
37
3 primary missions in DCO
Defend networks, systems and information Prepare to defend the US and its interests against cyberattacks of significant consequence Provide integrated cyber capabilities to support military operations and contingency plans
38
Encryption programs use ___ to encrypt and decrypt data
algorithms
39
Types of symmetric algorithms
Stream ciphers (RC4) Block ciphers (3DES & AES)
40
Mathematical function that converts a numerical input value into another compressed numerical value
Hashing
41
4 goals of cryptography
Privacy - What is private remains private Authenticity - Proof that msg is from person we believe it to be from Integrity - Info should remain unaltered at the point it was produced Non-repudiation - Sender of data is provided w/ proof of delivery and recipient is assured of the sender's identity
42
Enclave protection mechanisms: | INFOCON 5
Routine network ops (DoDIN Ops) Higher INFOCON less severe
43
INFOCON 1
Highest readiness condition | Significant impact to end-users for short periods
44
Mission Assurance Category MAC I
Most stringent protection measures | Requires high integrity and high availability
45
Mission Assurance Category MAC III
Requires best practice protective measures | Info systems handle info necessary for day-to-day business
46
Provide non-product specific requirements to mitigate sources of security vulnerabilities consistently and commonly encountered across IT systems and applications Not be confused w/ STIGs
DISA Security Requirement Guides | SRGs
47
Minimum requirements, standards, controls and options for securing the enclave as a whole
DISA Security Technical Implementation Guide (STIGs)
48
Required by all enclaves connecting to the DISN Initiated in parallel with request fulfillment process for new/additional connections
Assessment and authorization (A&A) process
49
Seeks to provide a more threat-focused, mission based assessment Analyze 3 levels of effort to review operational risk (mission, threat, and vulnerabilities)
Command cyber operational readiness inspections | (CCORIs) for short
50
If directed by ____ or ____, US military may conduct cyber ops to counter imminent/on-going attack against US homeland or US interests
POTUS or SecDef
51
2 encryption classes??
Asymmetric | Symmetric
52
Firewall can have 2 rules: define default deny
Deny by default/deny all | Assumes most traffic is potentially malicious, unwanted, or unauthorized
53
Firewall can have 2 rules: define default allow
Allow by default or allow all | Assumes most traffic is benign
54
When writing firewall rules, what is the order the syntax goes in?
``` base protocol source address source port destination address destination port action ```
55
NIDS function in 3 modes
Signature detection Anomaly detection hybrid
56
Cyber incident handling process
Detection of events Preliminary analysis and ID Preliminary response action Incident analysis Response and recover Post-incident analysis
57
Incident category | CAT 0
Training and exercises
58
Incident category | CAT 1
Root level intrusion (incident)
59
Incident category | CAT 2
user level intrusion (incident)
60
Incident category | CAT 3
Unsuccessful activity attempt (event)
61
Incident category | CAT 4
Denial of service (incident)
62
Incident category | CAT 5
Non-compliance activity (event)
63
Incident category | CAT 6
Reconnaissance (event)
64
Incident category | CAT 7
Malicious logic (incident)
65
Incident category | CAT 8
Investigating (event)
66
Incident category | CAT 9
Explained anomaly (event)
67
The discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless comms, and storage devices in a way that is admissible as evidence in a court of law
Digital forensics
68
4 phases of forensics process
Collection Examination Analysis Reporting
69
Document that serves as starting point for developing a forensic capability
NIST 800-86
70
Any data stored in IS memory (system registers, cache, RAM) that will be lost when the IS loses power or is shut down
Volatile data Open connections, ports and sockets, routing info, network interface status, ARP cache
71
Data in the IS's HD and removable storage media that will not be changed when the machine is powered off
Non-volatile data
72
Windows based forensic tools
``` EnCase Forensic Toolkit (FTK) ```
73
Unix based forensic tools
The Sleuth Kit (TSK), SMART
74
Malware analysis 3 types of analysis
Surface Analysis run-time static
75
Goal of this process is to deliver fielded capability within 180 days of validated request Identify service specific needs during current conflict or crisis that if not satisfied in an expedited manner, will result in unacceptable loss of life or critical mission failure
UON Urgent Operational Need
76
Urgent need identified by a warfighting commander that requires synchronization across multiple Service/agency providers to ensure complete and timely combat capability is provided to the Joint warfighter
JUON Joint urgent operational need
77
3 types of Test & evaluation
Developmental testing Operational testing Cyber test
78
Lowest level in the software chain | Language of reversing
Assembly language
79
Take a program's executable binary as input and generate textual files that contain the assembly language code for part/whole of program
Disassembler
80
Allow software developers to observe their program while it's running
Debuggers
81
Program that converts instructions into a machine-code or lower level form so that they can be read and executed by a computer
Compiler
82
Tries to reverse compilation process to obtain the original source code file or something similar to it Takes binary file & attempts to produce readable high-level language code from it
Decompiler
83
Byte = __ bits Word = __ bits Dword = __ bits Qword = __ bits
8 bits 16 bits = 2 bytes 32 bits = 4 bytes 64 bits = 8 bytes
84
__ means load the value happens from right to left
MOV | faster than Load effective address
85
__ is intended to be used for arithmetic operations or pointers to memory
LEA = load effective address
86
Motivated by money and power Previously lawful citizens with technical skills turn to cybercrime as means to escape poverty
Criminal syndicates
87
Means of general protest or to promote an expreseed ideology or a political agenda The "anonymous" collective
Cyber militias / hacktivists
88
Form of specialized black hats Develop original software for antagonistic or criminal purposes
Malware authors
89
Use computer and network technologies to carry out their attacks and cause public fear Islamic State hacking division
cyber terrorists
90
Main motives are to aid or support one's own nation-state in an ongoing real world conflict or war
Patriot hacking
91
Layer 8 issues Weakest link
Ordinary citizen
92
Mission analysis is phased in to the 4 phases
Site section Pre-inspection Inspection Post-inspection