CS Cyber Attack Life Cycle #1 Flashcards

(16 cards)

1
Q

What are cyber attack life cycle models?

A

Models representing the sequence of steps that cyber attacks go through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do cyber attack life cycle models provide us?

A

A framework to understand cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 4 reasons do we need to understand cyber attacks for?

A

Figure out why past attacks did well, develop knowledge bases on past attacks, identify convenient and effective ways to protect assets, forecast potential next steps of ongoing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 7 steps of the Lockheed Martin Kill Chain?

A

Reconnaissance, Weaponisation, Delivery, Exploitation, Installation, Command and Control, Action on Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens in Reconnaisance?

A

Selecting and researching a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 2 examples of Reconnaisance?

A

Get email addresses from website, scan system to identify security used by target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in Weaponisation?

A

Developing cyber weapons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 5 examples of Weaponisation?

A

PDF with malicious script, RAT, Stolen Credentials, Setup C&C infrastructure, Phishing email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens in Delivery?

A

Deliver payload to target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 3 examples of Delivery?

A

Download from website, email attachment, USB stick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens in Exploitation?

A

Execution of payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 examples of Exploitation?

A

Exploit known vulnerabilities, Exploit OS auto-start, User deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens in Installation?

A

Ensure payload persistence within the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 2 examples of Installation?

A

Multiple copies on multiple machines, register payload as OS service with auto-start mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens in Actions on Objectives?

A

Execution of desired action on target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 2 examples of Actions on Objectives?

A

Data Exfiltration, Disruption