Cyber Security Fundamentals Flashcards
(87 cards)
Blockchain
Data structure containing transactional record (stored as blocks) that ensures security and transparency through a vast, p2p network with no controlling agency.
TTPs
Tactics
Techniques
Procedures
Port Hopping
Allows adversaries to randomly change ports and protocols during a session.
Cloud Computing Service Models
SaaS
IaaS
PaaS
SaaS
the capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure
PaaS
the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.
IaaS
the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include OSs and applications.
SaaS Model
SaaS cloud service is hosted by the CSP and available to consumers through a pay-as-you-go model.
Main function of PaaS
The main function of PaaS is to give a useful framework for developers to manage new product apps, build apps, and test apps.
Primary Function of IaaS
The primary function of IaaS is to provide visual data centers to bjusinesses.
Promiscuous Share
In a promiscuous share, a legitimate share is created for a user, but that user then shares with other people who shouldn’t have access.
Ghost (or Stale) Share
In a ghost share, the share remains active for an employee or vendor that is no longer working with the company or should no longer have access.
Payment Card Industry’s Data Security Standard
The Payment Card Industry’s Data Security Standard (PCI DSS) establishes its own cybersecurity standards and best practices for businesses and organizations that allow payment card purchases.
European Union General Data Protection Regulations
The European Union (EU) General Data Protection Regulations (GDPR) apply to any organization that does business with EU citizens.
Cybercriminals
Cybercriminals are the most common attacker profile
They are also known for the proliferation of bots and botnet attacks, where endpoints are infected and then organized collectively by a command-and-control, or C&C, attack server.
Hacktivists
Hacktivist groups perform high-profile attacks in an attempt to showcase their political or social cause.
Cyberterrorists
Cyberterrorist attacks often are associated with state affiliations and are focused on causing damage and destruction.
Script Kiddies
Script kiddie is the name associated with novice attackers who use publicly available attack tools without fully realizing the implications of their actions.
Cybercrime Vendors
Capitalizing on the service model of cloud computing, many threat actors now rent or sell their malware and exploits – including business email compromise (BEC) and ransomware – as cybercrime-as-a-service (CCaaS) offerings on the dark web
Cyber Attack Lifecycle
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- C&C
- Act on Objective
Reconnaissance
They research, identify, and select targets, often extracting public information from targeted employees’ social media profiles or from corporate websites, which can be useful for social engineering and phishing schemes.
Weaponization (Attack)
Attackers determine which methods to use to compromise a target endpoint.
Delivery (Attack)
Attackers next attempt to deliver their weaponized payload to a target endpoint via email, IM, drive-by download (an end user’s web browser is redirected to a webpage that automatically downloads malware to the endpoint in the background), or infected file share.