CH1 Flashcards

(80 cards)

1
Q

Any potential danger to an asset

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If a vulnerability exist but has not yet been exploited the threat is considered what?

A

Latent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If someone is actively launching an attack against your system and successfully accesses something or compromises your security against an asset the threat is what?

A

Realized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The entity that takes advantage of a vulnerability

A

malicious actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The path used by a malicious actor to perform an attack

A

threat agent or threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A weakness in the system design, implementation, software, or code, or the lack of a mechanism.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 places vulnerabilities can be found

A

Applications, Operating Systems, Hardware, Misconfiguration, Shrinkwrap software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The identifier used by vendors, security researchers, and vulnerability coordination centers to disclose vulnerabilities to the public

A

CVE (Common Vulnerability Exposures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A piece of software, a tool, a technique, or a process that takes advantage of a vulnerability that leads to access, privilege escalation, loss of integrity, or denial of service on a computer system.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The probability or likelihood of the occurrence or realization of a threat.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any item of economic value owned by an individual or corporation.

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The amount of risk left after safeguards and controls have een put in place to protect the asset

A

residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List 5 types of threat actors

A

Script kiddies, organized crime groups, state sponsors and governemnts, hacktivists, terrorist groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

People who use existing scripts or tools to hack into computers and networks. They lack expertise to write their own scripts

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Group whose main purpose is to steal information, scam people, and make money

A

Organized crime group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These agents are interested in stealing data, including intellectual property and research-and-development data from major manufacturers, government agencies, and defense contractors.

A

State sponsors and governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

People who carry out cybersecurity attacks aimed at promoting a social or political cause

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These groups are motivated by political or religious beliefs

A

Terrorist Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These individuals perform ethical hacking to help secure companies and organizations.

A

White hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These individuals perform illegal activities, such as organized crime.

A

Black hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

These individuals usually follow the law but sometimes venture over to the darker side of black hat hacking.

A

Gray hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The knowledge about an existing or emerging threat to assets, including networks and systems.

A

Threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What 5 items make up threat intelligence

A

context, mechanisms, indicators of compromise, implications, and actionable advise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Typically require a host program or file to infect, requiring some human interaction.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Can travel from system to system without human interfaction
Worm
26
Closely related to virus's and worms, similar to Trojan because users don't know it's installed, steals information from the user and eats up bandwidth. Can also redirect web traffic and flood you with popups.
Spyware
27
What are the primary types of malware attack mechanisms
Master boot record infection, BIOS infection, File infection, Macro infection, Cluster, Multipartite
28
List 5 basic components of a virus
Search routine, infection routine, payload, antidetection routine, trigger routine.
29
Programs that pretend to do one thing but, when loaded, actually perform another, more malicious act.
Trojan
30
An attack in which an attacker leaves a USB thumb drive in the desk drawer of a victim.
Poison apple attack
31
What is the number one means of malware propogation?
Email attachments
32
A program used to combine two or more executables into a single packaged program.
Wrappers
33
Similar to WinZip, Rar, Tar... these programs compress files to prevent anyone from viewing the malware's code until it is placed in memory
Packers
34
Encrypt or obscure the code. Some obscure the contents of the Trojan by applying an encryption algorithm.
Crypters
35
Popular method used by criminals, hacktivist, and nation-state attackers to make money. Encrypts specific files in the victims system until a ransom is paid to the attacker.
Ransomware
36
A way of moving information through a communication channel or protocol in a manner in which it was not intended to be used.
Covert channel
37
Software or hardware devices used to record everything a person types.
Keyloggers
38
A standalone environment that allows you to safely view or execute the program while keeping it contained.
Sandbox (Cisco ThreatGrid)
39
List 3 types of injection-based vulnerabilities
SQL injection, HTML injection, Command injection
40
This type of vulnerability can allow an attacker to view, insert, delete, or modify records in a database. The attacker inserts, or injects, partial or complete SQL queries via the web application.
SQL Injection
41
What are the 3 categories of SQL injection attacks
in-band, out-of-band, blind
42
SQL injection attack where attacker obtains data by using the same channel that is used to inject the SQL code (data is dumped directly in a web application or web page).
In-band SQL injection
43
SQL injection attack where the attacker retrieves data using a different channel (an email, text, or instant message).
Out-of-band SQL injection
44
SQL injection attack where the attacker does not make the application display or transfer any data; rather, the attacker is able to reconstruct the information by sending specific statements and discerning the behavior of the application and database.
Blind (or inferential) SQL injection
45
Vulnerability that occurs when an unauthorized user is able to control an input point and able to inject arbitrary HTML code into a web application.
HTML Injection
46
Attack in which an attacker tries to execute commands that he or she is not supposed to be able to execute on a system via a vulnerable application.
Command injection
47
Credential brute forcing, session hijacking, redirecting, exploiting default credentials, exploiting weak credentials, exploiting Kerberos vulnerabilities are all examples of what type of vulnerability.
Authentication-based vulnerabilities.
48
In this type of attack, an attacker attempts to log into an application or system by trying different usernames and passwords.
Credential brute force and password cracking
49
Brute force attack in which the attacker actively tries to log in to the application by using many different combinations of credentials
Online brute force
50
Brute force attack in which the attacker can gain access to encrypted data or hashed passwords.
Offline brute-force
51
Some of the most common web applications vulnerabilities seen today where attackers use obfuscation techniques by encoding tags or malicious portions of the script using Unicode so that the link or HTML content is disguised to the end user browsing the site.
Cross-site Scripting (XSS)
52
What are the 3 major categories of XSS
Reflected XSS, Stored (persistent) XSS, DOM-based XSS
53
Type of XSS attack in which malicious code or scripts are injected by a vulnerable web application using any method that yields a response as part of a valid HTTP request. Example - user persuaded to follow a malicious link to a vulnerable server that injects the malicious code back to the user's browser.
Reflected XSS
54
Type of XSS attack in which the malicious code or script is permanently stored on a vulnerable or malicious server, using a database. These are typically carried out on blog sites, web forums, and other permanent storage methods.
Stored (persistent) XSS
55
Type of XSS attack in which the attacker sends a malicious URL to the victim, and after the victim clicks the link, it may load a malicious website or a site that has a vulnerable DOM router handler. After the site is rendered by the browser, the payload executes the attack in the user's context on that site.
DOM (Document Object Model) XSS
56
Type of attack in which unauthorized commands are transmitted from a user who is trusted by the application. AKA (on-click attacks or session-riding).
Cross-site request forgery (CSRF or XSRF)
57
Occurs when a system or application attempts to perform two or more operations at the same time however, due to the nature of such a system or application, the operations must be done in the proper sequence in order to be done correctly. These are also referred to as TOCTOU attacks). Example - policy push to IPS device rebuilds ACL's - attacker has a small window to bypass the ACL's.
Race conditions
58
A non-profit charitable organization that leads several industry-wide initiatives to promote the security of applications and software. They list the top 10 most common vulnerabilities against applications at their website.
OWASP Top 10
59
The requirement that private or confidential information not be disclosed to unauthorized individuals
Confidentiality
60
The ability to make sure that a system and its data has not been altered or compromised.
Integrity
61
A requirement that information and programs are changed only in a specified and authorized manner
Data Integrity
62
A requirement that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
System Integrity
63
Systems, applications, and data must be available to authorized users when needed and requested. This concept is referred to as....
Availability
64
What are the 3 types of DDoS attacks
Direct DDoS, Reflected DDoS, Amplification DDoS
65
Occurs when the source of the attack generates the packets, regardless of protocol, application, and so on, that are sent directly to the victim of the attack.
Direct DDoS
66
Occur when the sources of the attack are sent spoofed packets that appear to be from the victim, and then the sources become unwitting participants in the DDoS attacks by sending the response traffic back to the intended victim.
Reflected DDoS
67
A form of reflected DDoS attack in which the response traffic (sent by the unwitting participant) is made up of packets that are much larger than those that were initially sent by the attacker (spoofing the victim).
Amplification DDoS
68
According to NIST, what are the advantages of cloud computing
Distributed storage, scalability, resource pooling, access from any location, measured service, automated management.
69
According to NIST, what are the essential characteristics of cloud computing
On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured service
70
Cloud deployment model that is open for public use
Public Cloud
71
Cloud deployment model that is used just by the client organization on-prem or at a dedicated area in a cloud provider
Private Cloud
72
Cloud deployment model that is composed of two or more clouds (including on-prem)
Hybrid Cloud
73
Cloud deployment model that is shared between several organizations
Community Cloud
74
Accorindg to NIST, Cloud computing can be broken into the following 3 basic models
IaaS, PaaS, SaaS
75
Cloud solution where you are renting infrastructure. You purchase virtual power to execute your software as needed.
IaaS
76
Cloud solution providing everything except applications.
PaaS
77
Cloud solution designed to provide a complete packaged solution. The software is rented out to the user. Usually provided through some type of front end or web portal.
SaaS
78
Includes any computing devices (mechanical and digital machines) that can transfer data over a network without requiring human-to-human or human-to-computer interaction - for example, sensors, home appliances, connected security cameras, wearables, and numerous other devices.
IoT (Internet of Things)
79
A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices
Cybersecurity incident
80
Any observable occurrence in a system or network. Include users connecting to a file share, server receiving a request for a web page, user sending email etc.
Event