DOMAIN 1 Flashcards

(81 cards)

1
Q

SOCIAL ENGINEERING

A

an attempt by an attacker to convince someone to provide info (like a password) or
perform an action they wouldn’t normally perform (such as clicking on a malicious link).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PHISHING

A

commonly used to try to trick users into giving up personal information (such as user
accounts and passwords), click a malicious link, or open a malicious attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SPEAR PHISHING

A

targets specific groups of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHALING

A

targets high level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VISHING

A

(voice phishing) phone based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SMISHING

A

uses SMS (text) messaging on mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SPAM

A

Unsolicited email, generally
considered an irritant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SPIM

A

SPAM over instant messaging, also
generally considered an irritant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DUMPSTER DIVING

A

Gathering important details (intelligence) from
things that people have thrown out in their trash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TAILGATING

A

when an unauthorized individual might
follow you in through that open door
without badging in themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ELICITING INFORMATION

A

strategic use of casual conversation
to extract information without the
arousing suspicion of the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SHOULDER SURFING

A

a criminal practice where thieves
steal your personal data by spying
over your shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHARMING

A

an online scam
similar to phishing, where
a website’s traffic is manipulated, and
confidential information is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDENTITY FRAUD

A

use of another person’s
personal information,
without authorization, to commit a crime or to
deceive or defraud that person or other 3rd party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PREPENDING

A

Prepending is adding words or phrases like “SAFE”
to a malicious file or suggesting topics via social
engineering to uncover information of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

INVOICE SCAMS

A

fake invoices with a goal of receiving money or
by prompting a victim to put their credentials
into a fake login screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CREDENTIAL HARVESTING

A

attackers trying to gain access to your
usernames and passwords that might be
stored on your local computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PASIVE DISCOVERY

A

Techniques that DO NOT send packets to the target; like Google hacking, phone
calls, DNS and WHOIS lookups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SEMI-PASSIVE DISCOVERY

A

Touches the target with packets in a non
aggressive fashion to avoid raising
alarms of the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ACTIVE DISCOVERY

A

More aggressive techniques likely to be noticed by the target, including port
scanning, and tools like nmap and Metaspoit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HOAXES

A

Intentional falsehoods coming in a variety of forms ranging from virus
hoaxes to fake news. Social media plays a prominent role in hoaxes today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IMPERSONATION

A

A form of fraud in which attackers pose as a known or trusted person to
dupe the user into sharing sensitive info, transferring money, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WATERING HOLE ATTACK

A

Attack strategy in which an attacker guesses or observes which websites an
organization often uses and infects one or more of them with malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TYPOSQUATTING
aka “URL hijacking”

A

a form of cybersquatting (sitting on
sites under someone else’s brand or
copyright) targeting users who type
an incorrect website address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
PRESTEXTING
An attacker tries to convince a victim to give up information of value, or access to a service or system. The attacker develops a story, or pretext, in order to fool the victim.
26
INFLUENCE CAMPAIGNS
A social engineering attack intended to manipulate the thoughts and minds of large groups of people.
27
HYBRID WARFARE
Attack using a mixture of conventional and unconventional methods and resources to carry out the campaign. Including: - SOCIAL MEDIA: May use multiple social platforms leveraging multiple/many individuals to amplify the message, influencing credibility. May involve creating multiple fake accounts to post content and seed the spread. And may even include paid advertising.
28
PRINCIPLES OF SOCIAL ENGINEERING
- Authority - Intimidation - Consensus - Scarcity - Familiarity aka "liking" - Trust - Urgency
29
APPLICATION ATTACKS
attacks attackers use to exploit poorly written software .
30
ROOTKIT (escalation of privilege)
freely available on the internet and exploit known vulnerabilities in various operating systems enabling attackers to elevate privilege. Countermeasures: keep security patches up to date anti malware software, EDR/XDR
31
BACK DOOR
undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. often used in development and debugging. Countermeasures: firewalls, anti malware, network monitoring, code review.
32
COMPUTER VIRUS
a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
33
TYPES OF VIRUSES
Crypto-malware Hoaxes Logic Bombs Trojan Horse
34
TYPES OF MALWARE
- Worm - Potentially Unwanted Programs (PUPs) - Keylogger - Spyware - Fileless virus - Command and control - Remote access trojan (RAT) - Ransomware
35
FILELESS VIRUS
a type of malicious software that does not rely on virus laden files to infect a host. Instead, it exploits applications that are commonly used for legitimate and justified activity to execute malicious code in resident memory.
36
COMMAND AND CONTROL
a computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network.
37
REMOTE ACCESS TROJAN
a malware program that gives an intruder administrative control over a target computer.
38
RANSOMWARE
infects a target machine and then uses encryption technology to encrypt documents, spreadsheets, and other files stored on the system with a key known only to the malware creator. user is then unable to access their files and receives an ominous pop up message warning that the files will be permanently deleted unless a ransom is paid within a short period of time. * Ransomware is a trojan variant.
39
RANSOMWARE OCUNTERMEASURES
- Back up your computer - Store backups separately - File auto versioning
40
RANSOMWARE PREVENTION
- Update and patch computers - Use caution with web links - Use caution with email attachments - Verify email senders - Preventative software programs - User awareness training (Most important defense).
41
PASSWORD ATTACKS
- Dictionary Attacks - Password Spraying - Offline - Online - Plaintext/unencrypted - Brute Force Attack - SALTS Cryptographic
42
DICTIONARY ATTACKS
Use programs with built in dictionaries. They attempt all dictionary words to try and find the correct password, in the hope that a user would have used a standard dictionary word.
43
PASSWORD SPRAYING
Attacker tries a password against many different accounts to avoid lockouts that typically come when brute forcing a single account. Succeeds when admin or application sets a default password for new users
44
OFFLINE
Attempt to discover passwords from a captured database or captured packet scan.
45
ONLINE
Attempts to discover a password from an online system. For example, an attacker trying to log on to an account by trying to guess a user’s password. *Most web and wi-fi attacks are online attacks.
46
PLAINTEXT/UNENCRYPTED
Protocols and authentication methods that leave credentials unencrypted, like basic authentication and telnet.
47
BRUTE FORCE ATTACK
Attempts to randomly find the correct cryptographic key attempting all possible combinations (trial and error). Password complexity and attacker resources will determine effectiveness of this attack.
48
SALTS Cryptographic
Attackers may use rainbow tables , which contain precomputed values of cryptographic hash functions to identify commonly used passwords A salt is random data that is used as an additional input to a one way function that hashes data, a password or passphrase. Adding salts to the passwords before hashing them reduces the effectiveness of rainbow table attacks.
49
MULTI-FACTOR AUTHENTICATION
- Something you KNOW (pin or password) - Something you HAVE (trusted device) - Something you ARE (biometric) *Multi-factor Authentication prevents: - Phishing - Spear phishing - Keyloggers - Credential stuffing - Brute force and reverse brute force attacks - Man-in-the-middle (MITM) attacks
50
BOTS, BOTNETS, AND BOT HERDERS
Represent significant threats due to the massive number of computers that can launch attacks
51
BOTNET
a collection of compromised computing devices (often called bots or zombies).
52
BOT HERDER
criminal who uses a command and control server to remotely control the zombies often use the botnet to launch attacks on other systems, or to send spam or phishing emails.
53
PHYSICAL ATTACKS
- Malicious Flash Drive - Malicious USB cable - Card cloning - Skimming
54
MALICIOUS FLASH DRIVE
Attack c omes in two common forms Drives dropped where they are likely to be picked up. Sometime effectively a trojan, shipped with malware installed after leaving the factory.
55
MALICIOUS USB CABLE
Less likely to be noticed than a flash drive. May be configured to show up as a human interface device (e.g. keyboard).
56
CARD CLONING
Focuses on capturing info from cards used for access, like RFID and magnetic stripe cards.
57
SKIMMING
Involve fake card readers or social engineering and handheld readers to capture (skim) cards, then clone so attacker may use for their own purposes. *Device ( skimmer) often installed at POS devices like ATM and gas pumps.
58
ADVERSARIAL ARTIGICIAL INTELLIGENCE
A rapidly developing field targeting AI and Machine Learning (ML).
59
TAINTED TRAINING DATA FOR MACHINE LEARNING (ML)
Data poisoning that supplies AI and ML algorithms with adversarial data that serves the attackers purposes, or attacks against privacy.
60
SECURITY OF MACHINE LEARNING ALGORITHMS
Validate quality and security of the data sources. Secure infrastructure and environment where AI and ML is hosted. Review, test, and document changes to AI and ML algorithms.
61
ARTIFICIAL INTELLIGENCE
Focuses on accomplishing “smart” tasks combining machine learning and deep learning to emulate human intelligence
62
MACHINE LEARNING
A subset of AI, computer algorithms that improve automatically through experience and the use of data.
63
DEEP LEARNING
a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called artificial neural networks.
64
SUPPLY CHAIN ATTACKS
a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply chain. Often attempt to compromise devices, systems, or software before it reaches an organization.
65
CLOUD-BASED ATTACKS
Data center is often more secure and less vulnerable to disruptive attacks (like DDoS) On the downside, you will not have facility level or physical system level audit access.
66
ON-PREMISES ATTACKS
You do not benefit from the cloud’s shared responsibility model. You have more control but are responsible for security of the full stack.
67
COLLISION ATTACK
attack on a cryptographic hash to find two inputs that produce the same hash value beat with collision resistant hashes
68
DOWNGRADE ATTACK
when a protocol is downgraded from a higher mode or version to a low quality mode or lower version. *Commonly targets TLS.
69
BIRTHDAY ATTACK
an attempt to find collisions in hash functions. *Commonly targets digital signatures
70
REPLAY ATTACK
an attempt to reuse authentication requests. *Targets authentication ( often Kerberos).
71
APPLICATION ATTACKS
A security hole created when code is executed with higher privileges than those of the user running it.
72
PRIVILEGE ESCALATION
a type of injection using malicious scripts
73
CROSS-SITE SCRIPTING (XXS)
A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. Occur when an attacker uses a web application to send malicious code to a different end user.
74
CROSS-SITE REQUEST FORGERY (XSRF OR CSRF)
similar to cross-site scripting attacks but exploits a different trust relationship. exploits trust a website has for your browser to execute code on the user’s computer.
75
DYNAMIC-LINK LIBRARY (DLL)
Is a situation in which the malware tries to inject code into the memory process space of a library using a vulnerable/compromised DLL.
76
LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP)
exploits weaknesses in LDAP implementations. This can occur when the user’s input is not properly filtered, and the result can be executed commands, modified content, or results returned to unauthorized queries.
77
EXTENSIBLE MARKUP LANGUAGE (XML)
when users enter values that query XML (known as XPath) with values that take advantage of exploits, it is known as an XML injection attack. XPath works in a similar manner to SQL, except that it does not have the same levels of access control, so exploits can return entire documents.
78
INJECTIONS (INJECTION ATTACKS)
used to compromise web front-end and backend databases.
79
SQL INJECTION ATTACKS
Use unexpected input to a web application to gain unauthorized access to an underlying database. *NOT new and can be prevented through good code practices.
80
POINTER/OBJECT DEREFERENCE
An attack that consists of finding null references in a target program and dereferencing them, causing an exception to be generated. *Dereferencing means taking away the reference and giving you what it was actually referring to. *GOOD coding is the best protection.
81