Cyber Security Flashcards
(121 cards)
What is the cyber security triad?
Confidentiality, integrity, availability
What is integrity?
Guarding against improper information modification/destruction
What are the integrity-related concepts?
Authenticity & accountability
What 4 steps of cyber attack countermeasures are there?
Detection, prevention, mitigation, recovery
What is a checksum?
A function that maps file contents to a numerical value
List the 5 main cyber attackers
Cybercriminals, nation states, hacktivists, insider threats, script kiddies/noobs
What is the relation between an instigator and a perpetrator?
A perpetrator can be hired/bribed by an instigator
What are 3 potential motivations of Nation States?
Garner high quality intelligence
Sabotage critical infrastructures
Subversion e.g. political elections
What are 3 potential attacks hacktivists may perform?
Web defacements
Data breaches (to prove beliefs)
DDoS
List the stages of the Kill-Chain model
Reconnaissance, weaponisation, delivery, exploitation, installation, command & control, actions on objectives
What is the difference between exploitation & installation?
Exploitation: execution of payload to exploit vulnerability
Installation: ensurance of payload persistence within the target
What 8 cyber attacks are there?
Cryptojacking
Data breaches
DDoS
Influence campaigns
Money theft
Personal document ransom
Supply chain attacks
Web defacements
What 3 types of money theft attacks are there and what do they involve?
Banking trojan horse: seemingly legitimate software captures credentials
Cyber banking fraud: attacks launched from compromised machines to transfer stolen funds
BEC (Business Email Compomise)/Whaling: attacker requests large money transfer pretending to be CEO
What 4 steps are there in personal document ransom / ransomware?
1) Attacker sends email with attachment user is lured to open
2) Attachment either prompts user to execute a macro or lanuches powershell to download & execute final payload
3) Ransomware encrypts specific file types
4) Files can only be decrypted by paying a ransom
What is cryptojacking?
The practice of hijacking computer resources to mine cryptocurrency
What 3 things could happen to stolen data in data breaches?
Public disclosure
Private intelligence
Sold on the black market
What is a supply chain attack?
Where the adversary compromises the weakest link in the supply chain to reach the target from there
What is Social Engineering?
A technique to either pschologically manipulate people into performing an action or gather information left around by people
What 3 ways is information gathered in Social Engineering?
Via the web (company website / social media)
Dumpster diving
Shoulder surfing
What 4 ways may an adversary interact with the target in Social Engineering?
Phishing: sending emails incl. spear phishing (specific individual/organisation) & whaling (high-profile)
Vishing: using video calls
Smishing: using SMS (text)
Physical impersonation
What is baiting in Social Engineering?
A real-world trojan horse e.g. infected removable media, gift with wiretap
What 5 essential defences are there in corporate security?
Firewalls
User access control
Malware protection
Patch management
Secure configuration
Ineffective against advanced attacks e.g. SE
Firewalls
Sit at the edge of a network
Blocks all incoming traffic by default, inspects each packet passing through, accepts packets that satisfy rules
Allows all outbound traffic.
The 3 steps of secure configuration
Unnecessary software removed
Auto-run features disables
Default password changed