Cybersecurity Flashcards

(43 cards)

1
Q

What is Lateral Movement?

A

Once within the system, the hacker can access other areas within the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Firmware?

A

permanent software programmed in read only memory or hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does “DDoS” stand for and what is a DDoS attack?

A

(Distributed Denial of Service Attack); malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Zombie Machine?

A

A machine one can control because they are vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is difficult to filter the high amount of data when an attack comes from multiple ______?

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three Factors impacting security:

A

The amount of time it takes, the amount of money (resources) and probability of success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When designing a system, what is the “KISS” rule?

A

Keep it Simple, Stupid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________ Surface

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three types of entities?

A

1) Software
2) Hardware
3) Humanware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pseudo Anonymity?

A

Pseudonymous merely means you are not using your real, legal name to identify yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Bug Bounty?

A

A bug bounty is a reward that is paid out to developers who find critical flaws in software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “Kerckhoff’s principle?

A

Kerckhoff’s principle is the concept that a cryptographic system should be designed to be secure, even if all its details, except for the key, are publicly known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three fundamental questions you need to ask yourself when designing a system?

A

1) What assets do we need to protect? Ex. Phone, data, system, etc
2) How are those assets threatened?
3) What can we do to counter those threats?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three components of computer security?

A

Integrity
Availability
Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is integrity?

A

Guarding against improper information modification or destruction. Including ensuring information non-repudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is dat availability?

A

Ensuring timely and reliable access to an use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is data confidentiality?

A

Preserving authorized restrictions on information access and disclosure. Including means for protecting personal privacy and proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 6 Computer Security Challenges?

A
  1. Attackers only need to find a single weakness, the developer/admin needs to find ALL the weaknesses.
  2. The attacker can exploit Multiple weaknesses
  3. Users and system managers tend to no see the benefits of security until a failure occurs
  4. Security requires regular and constant monitoring
  5. It’s often an afterthought + incorporated into a system after the design is completed
  6. Thought of as an impediment to efficient and user-friendly operations
19
Q

Three types of System Vulnerabilities (of System Resources)

A

Corrupted (loss of integrity)
Leaky (loss of confidentiality)
Unavailable or very slow (loss of availability)

20
Q

3 Types of attacks

A

Active – Attempt to alter/affect system resources
Passive – does not (directly) affect the system resources
Insider vs Outsider

21
Q

What is “Legacy Approach”?

A

Bad guys are outside, good guys are inside your org.

22
Q

Dealing with a Security Attack (3x)

A

Prevent
Detect
Recover

23
Q

What is the Old Encryption Standard - Acronym and meaning) + how many bits ?

A

Data Encryption Standard (DES) + 56 bits

24
Q

What is the New Encryption Standard - Acronym and meaning) + how many bits ?

A

Advanced Encryption Standard (AES) + 64 BITS

25
What is a countermeasure?
an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause
26
What is Security Policy?
a set of rules and practices that specify how a system or organization provides security services to protect sensitive and critical system resources
27
Active Attack
attempt to alter/affect system resources
28
Passive Attack
does not (directly) affect the system resources
29
Three Types of Attacks
Active Passive Insider/Outsider
30
Interception (Unauthorized Disclosure)
Unauthorized access to data
31
Inference (Unauthorized Disclosure)
traffic analysis or use of limited | access to get detailed information
32
What is intrusion? (Unauthorized Disclosure)
unauthorized access to sensitive data
33
What is a Masquerade? (Deception)
e.g., Trojan horse; or an attempt by an unauthorized user to gain access to a system by posing as an authorized user
34
What is Falsification? (Deception)
altering or replacing of valid data or | the introduction of false data
35
What is repudiation? (Deception)
an entity deceives another by falsely | denying responsibility for an act?
36
What is incapacitation? (Disruption)
a result of physical destruction of or | damage to system hardware
37
What is Corruption? (Disruption)
system resources or services function in | an unintended manner; unauthorized modification
38
What is obstruction? (Disruption)
e.g. overload the system or interfere | with communications
39
What is Misappropriation? (Usurpation)
an entity assumes unauthorized | logical or physical control of a system resource
40
What is misuse? (Usurpation)
causes a system component to perform a function or service that is detrimental to system security
41
What are the 4 kinds of Threat Consequences?
1. Unauthorized disclosure 2. Deception 3. Disruption 4. Usurpation
42
What is a Passive Attack?
Passive attacks attempt to learn or make use of information from the system but does not affect system resources
43
What is an Active Attack and what are the 4 main types?
Masquerade Replay Modification of Messages Denial of Service