Cyber basics Flashcards

(128 cards)

1
Q

What does CIA stand for?

A

Confidentiality , integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does confidentiality in CIA refer to?

A

the act of sharing or revealing information only with authorized personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does integrity in CIA refer to?

A

the ability to ensure that information or data remains unchanged and accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does availability in CIA refer to?

A

ensuring timely and reliable access to and use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the red team do?

A

Test defenses, search for weaknesses, provide assesments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the blue team do?

A

Maintain security, Prevent breaches, Monitor for threats, Respond to incidents, Research technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an HVA?

A

High Value Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the primary roles of Cybersecurity in a business?

A

protect assests or HVA, protect data, protect functions and processes, protect ALL org assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: The cost of treating risk should never meet or exceed the potential loss?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does NIST stand for?

A

National institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is NIST framework required or voluntarily implemented?

A

A voluntary framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is risk?

A

Risk is the level of organizational assets, organizational operations, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occuring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk more simply?

A

Risk is if you have an asset with a vulnerability that has a threat of being exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does PII (pii) refer to?

A

Personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the security risk factors?

A

Threat, Vulnerability, Likelihood, Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does CONTROL refer to when associated with the word RISK?

A

Managing risk, including policies, procedures, guidelines, practices, or org structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does VULNERABILITY refer to when associated with the word RISK?

A

Weakness in a system, system security procedures, internal controls, or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does CYBERRISK refer to when associated with the word RISK?

A

risk to a business due to the failure of a business function dependent on digital technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does LIKELIHOOD refer to when associated with the word RISK?

A

A weighted factor based on subjective analysis if the probability that a given threat is capable of exploiting a given vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does RMF mean?

A

Risk Management Framework - a flexible risk based approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In order what are the 7 phases of the RMF?

A
  1. Prepare 2. Categorize information systems. 3. Select security controls. 4. implement security controls. 5. Assess security controls. 6. authorize information systems. 7. monitor security controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an asset?

A

Assets can be hardware, software, or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a threat?

A

A potentially negative action or event often caused by taking advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a risk?

A

probability of exposure or loss resulting from a cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
What is a vulnerability?
errors/flaws that weaken the overall security of the device/system.
25
What is an exploit?
taking advantage of a program/system to produce an unintended consequence/result
26
What are examples of threats and attacks?
Global threat (pandemic), regional threat (weather conditions), Industry specific (microchip shortage), cybersecurity (randsomeware, DDoS, etc)
27
What are some common threat vectors? (methods people use to exploit a system)
Unpatched vulnerabilities, security misconfiguration, weak, leaked, or stolen credentials, social engineering, and insider threats
28
What are some common attacks? (type of attack)
Malware, on path (man in the middle {MiTM}), DoS, DDoS, Phishing, SQL injection, Zero Day, DNS tunneling, ARP poisoning.
29
What is Malware?
Malware stands for malicious software. A program or code that can harm a computer or network
30
What is an on path or man in the middle attack?
An attack places themselves between two devices and modifies communications between the two
31
What is a DoS attack?
DoS stands for denial of service when a computer aims to make a computer or network unavailable to it's users.
32
What is a DDoS attack?
DDoS stands for distributed denial of service when an attacker aims to flood a server with traffic using multiple comprised computers AKA a "Botnet".
33
What is phishing?
A method used where someone pretends to be legitimate in order to trick individuals into providing sensitive information data.
34
What is DNS tunneling?
a method where cybercriminals exploit the DNS protocol to create a covert communication channel.
35
What is SQL injection?
SQL injection is when someone tricks a website into running harmful commands
36
What is a Zero Day attack?
Exploits a software flaw that the software’s creator doesn’t know about yet.
37
What is ARP poisoning?
sends fake ARP (Address Resolution Protocol) messages to a network
38
What is an IOC?
Indicator of compromise - present after an attack
39
What is an IOA?
Indicator of attack - early warning or clues that reveal suspicious activity. Present before an attack
40
What are some common malware types?
Worm, rootkit, keylogger, bot(s), mobile malware.
41
What is a worm and which part of CIA is impacted?
Worms spread through a network by replicating itself and not needing interaction. This impacts Integrity.
42
What is a rootkit and what part of CIA is impacted?
Gives remote access to devices. This impacts confidentiality and integrety.
43
What is a keylogger and what part of CIA is impacted?
A keylogger can monitor keystrokes. This impacts confidentiality.
44
What are bots and what part of CIA is impacted?
Can launch a broad flood of attacks. This impacts availability.
45
What is mobile malware and what part of CIA is impacted?
This infects mobile devices and impacts confidentiality and integrity.
46
What are the phases of incident response?
1. Prepare. 2. Detection and analysis. 3. Containment, eradication, and recovery. 4. Post incident activity.
47
What are 3 types of AI?
Artificial narrow intelligence , artificial general intelligence, artificial super intelligence.
48
What is a network?
two or more devices that can interact over links or connections.
49
What are the 4 types of network?
PAN, LAN, MAN, WAN
50
What is PAN and what does it stand for?
PAN is personal area network. A network connected by only two computers
51
What is LAN and what does it stand for?
LAN is local area network. A network where there is a group of connected computers in a specific place. (like a home or office)
52
What is MAN and what does it stand for?
MAN is metropolitan area network. A smart city for example
53
What is WAN and what does it stand for?
WAN is wide area network. This extends over large geographical distances, like the internet.
54
What are servers/clients?
A server is a computer or program that provides services to other computers. Clients are devices or applications that request and use the services provided by servers.
55
What is a router?
interconnecting LAN
56
What is a switch?
Used to interconnect devices on a LAN. It has ports.
57
What is a transmission medium?
The method in which network information is delivered. (satellite, copper wires, radio waves, fiber)
58
What is a transmission protocol?
Set of rules that dictate the proper communication between two or more computing devices.
59
What are some common network commands?
Ipconfig, ping, route, tracert, nslookup, netstat,arp
60
What is a passive attack?
Can monitor or copy data, doesnt impact the system. Threatens confidentiality
61
What is an active attack?
Modify or alter contact and impact the system, can threaten the availability and integrity of data.
62
True or false: Attacks can ONLY be passive or active
False: attacks can be either or both
63
What are some tools and controls for data?
Segmentation, segregation, firewalls
64
What is segmentation referring to?
Dividing networks into multiple segments or zones (wifi vs guest wifi)
65
What is segregation referring to?
Implementing rules to control communication between specific hosts, services, or subnets.
66
What is a firewall used for?
Hardware or software designed to protect one network from another. Bidirectionally monitoring network traffic which is then permitted or blocked based on rules. Secures traffic between trusted internal networks and untrusted external networks Used to filter specific traffic. Can also filter traffic between individual hosts
67
What are the 3 states of data?
Rest, in use, transit
68
What does data at rest mean?
Stored or archived data
69
What is data in use?
Data actively being processed (on a screen)
70
What is data in transit?
Data that is moving
71
What is physical segmentation?
having devices in a separate physical location
72
What is logical segmentation?
Involves using a virtual local area network (VLAN) to group devices regardless of location
73
What is a DMZ?
part of a network that faces the public - where web servers, email and other services reside. Separated from the local area network so hackers cannot get access to internal resources.
74
What are Security controls
Safeguards or counter measures to avoid, detect, counteract, and minimize security risks.
75
What are the 3 security control categories?
Administrative, technical, physical.
76
What are administrative security controls?
guidance, rules, and implementation procedures.
77
What are technical security controls?
hardware or software that is implemented. (firewall)
78
What are physical security controls?
protection from physical threats (someone looking over your shoulder, locking doors, etc)
79
Types of AI
Artificial Narrow Intelligence - specific topicArtificial General Intelligence - broad contentArtificial Super Intelligence
80
What is AI
intelligent machines that can mimic human cognitive abilities
81
What is LLM
Large Language Model - neural networks execute searches on vast amounts of stored information
82
What is a network
Two or more machines connected for communications
83
Ipconfig
used to display the status of the currently active interfaces and details
84
Ping
Can test connectivity either by IP address or DNS name
85
Route
Can display routing table and manipulate the entries within it
86
Tracert
can be used to determine the route to a remote host
87
Nslookup
used to find the IP that corresponds to a DNS record and vice versa
88
Netstat
can be used to display and filter all incoming and outgoing network connections
89
Arp - Address Resolution Protocol
can be used to update, display, or manipulate ARP table entries
90
Network commands
Ipconfig - used to display the status of the currently active interfaces and details Ping - Can test connectivity either by IP address or DNS name Route - Can display routing table and manipulate the entries within it Tracert - can be used to determine the route to a remote host Nslookup - used to find the IP that corresponds to a DNS record and vice versa Netstat - can be used to display and filter all incoming and outgoing network connections Arp - can be used to update, display, or manipulate ARP table entries
91
What is Linux
OS kernel created by Linus Torvalds - a version of GNU
92
What is GNU
GNU's Not Unix - an open source operating system that is the basis for Linux
93
What is a Distribution
An OS made from a collection of software including the Linux kernel, GNU tools, additional software, and a package manager
94
How many distributions are there? And which are popular
600. Red Hat Enterprise Linux (RHEL), Kali Linux
95
What is Kali Linux
Distribution with powerful security tools - over 600 tools for security professionals
96
What are the primary components of an OS?
Kernel mode (core OS functions) and User mode (applications)
97
What functions does Kernel Mode provide?
Bootloader - a program written into the computer that loads the OS. the first software to start up Drivers - Kernel modules can communicate with hardware devices without knowing intricate details. Essential to the system File system - the structure that the OS uses to organize and store files and data Network stack - allows applications to access a network through a physical networking device. A set of processes that controls how, where, and when data is stored or retrieved from a storage device. Sudo - super user do - run command with elevated privileges than a regular user
98
What functions does User Mode provide?
Processes - Running instances of programs Sessions - groups of processes from the same shell (shell = command box, same shell = commands that are typed in the same command box) services/daemons - background processes that start at boot time and perform specific functions without intervention from a user Application - a program that could be as simple as a command line tool or complex graphical program
99
What is a Linux CLI
Command Line Interface - runs on Linux startup - CLI is very powerful and requires knowledge to be used properly Servers run command lines - don't need need a GUI
100
What does the Linux GUI do
X server will start GUI interface Offers familiar windows and point and click functionality GUI is easier to use than CLI but not as powerful for automation
101
GUI Core utilities
Certain commands work in any distribution of linuxAKA coreutils Works across linux distributions
102
Basic Linux commands
Ls - lists whatever files are there CD - change directory - changes current working directory to parent directory or down Touch - creates an empty file Pwd - what directory you are in, correct complete path, route Cat - Concatenate (to link together), modify or create new files, dump files Cp - copy Mkdir - make directory Rm - removes empty or non empty directories rmdir - removes EMPTY directories Mv - move file
103
Linux Security Issues
Access control - Weak passwords, users with superuser access Permissions -unauthorized users with access to sensitive files Vulnerability -Unintended weaknesses or flaws that could be exploited or triggered through a variety of means
104
Threats and attacks
Ransomware - code that encrypts or deletes files - unencrypt key provided after payment Worms - Self-replicating Trojans
105
Security Control Categories
Administrative - guidance, rules, and implementation procedures Technical - hardware or software that are implemented (firewall) Physical - protect from physical threats (someone looking over your shoulder, lock doors, etc)
106
What is CLAMAV
Open source anti virus toolkit and engineNot a full featured endpoint security Scans files quickly Detects millions of viruses, worms, trojans and other malware
107
What are IPTables
Used for linux implementation of an endpoint firewall Used to protect linux systems from network access
108
What is server hardening
Determine the servers purpose and requirements Disable or remove unneeded apps and services/daemons Perform os updates and continue to do so
109
What is client hardening
Baseline is crucial for clients To ensure usability client hardening is less stringent than server hardening Controls include Endpoint security Host firewall Patching Configuration
110
What services does Windows Server provide
Web servers File, print, and db servers Active Directory - user management Cloud access Mobile device management
111
What is Active Directory
centralizes user management Oversees all users, groups, and devices in a windows environment Enables system admins to control permissions and access Runs on windows server softwareObjects: single
112
What is the difference between Active Directory and Azure Active Directory
Not simply active directory in the cloud Leverages several other cloud capabilities to exponentially grow security and control Example: ai enhanced password protection and automatic credential creation Seemlessly integrates with Mobile Device Management (MDM)
113
What is MDM
Cloud based mobile device management Natively integrates with Azure AD for enhanced security controls particularly in BYOD environments
114
What is Zero Trust
continuously verifies every transaction, asserts least privilege, relies on intelligence, advanced detection, Identity and access management
115
What is OWASP?
open web application security project - non-profit community ranks the biggest cybersecurity threats
116
Main differences between Windows and Linux
Windows is proprietary, users don't have kernel access Linux is open source and a user can have root access (kernel) Windows - frequently patched by Microsoft Linux - patched by the open source community - more secure by design
117
Ipconfig - used to display the status of the currently active interfaces and details Ping - Can test connectivity either by IP address or DNS name Route - Can display routing table and manipulate the entries within it Tracert - can be used to determine the route to a remote host Nslookup - used to find the IP that corresponds to a DNS record and vice versa Netstat - can be used to display and filter all incoming and outgoing network connections Arp - can be used to update, display, or manipulate ARP table entries
Network commands
118
What is patching?
Updating existing software or OS files to eliminate new vulnerabilities
119
Ipconfig
- used to display the status of the currently active interfaces and details
120
Ping -
Can test connectivity either by IP address or DNS name
121
Route
Can display routing table and manipulate the entries within it
122
Tracert
can be used to determine the route to a remote host
123
Nslookup
used to find the IP that corresponds to a DNS record and vice versa
124
Netstat
- can be used to display and filter all incoming and outgoing network connections
125
Arp -
can be used to update, display, or manipulate ARP table entries
126
Rootkit
Foundation in Unix/Linux, but they can be found on any OS Common characteristic: instead of modifying files in OS, it modifies files in kernel (foundational building blocks of OS) everything that runs in OS runs on top of Kernel B/c malware becomes part of OS itself, it becomes invisivble to anti virus / malware Identifying and removing from rootkit is very difficult
127