Domain 2 Flashcards

(92 cards)

1
Q

Nation State

A

Country’s Government that uses cyber attacks to disrupt or steal information from another country. High Skill. Motivation Espionage, Disruption, Power. Example - Stealing intellectual property from a foreign competitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unskilled Attacker

A

Someone with limited technical knowledge who may launch attacks out of curiosity or malice. Low. Malice, Curiosity. Launching a phishing campaign against random email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivist

A

To promote a political or social cause. Varies skill. Values (Political/Social). Example leaking sensitive data from a corporation they believe is unethical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider Threat

A

Authorised Internal user who intentionally or unintentionally misuses their access to harm a system or organisation. Varies (Financial Gain, Espionage, Disgruntled employee). Selling customer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organised Crime

A

A criminal syndicate that uses cyberattacks for financial gain, such as stealing money or data. High Sill. Financial Gain (Extortion or Fraud). Example Ransomware attack on a major hospital chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shadow IT

A

Employees leveraging unauthorised or unmanaged IT resources used within an organisation, which can create security vulnerabilities. Varies. Productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Exfiltration’s

A

Unauthorised removal of sensitive or proprietary information from computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Espionage

A

Goal of stealing confidential information from another organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service Disrption

A

Causing Outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blackmail

A

Threat to expose sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Financial Gain

A

Steal money or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Political belief

A

Driven by ideological or political motivations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethical Hacking

A

Authorised Stimulated attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Revenge

A

Retaliate against previous activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disruption/Chaos

A

Aimed at causing widespread disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

War

A

Disrupt Enemy military operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threat Vector

A

Method or Combination of methods that attacker use to gain unauthorised access to a computer system, network or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attack Surface

A

Sum total of all the possible entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Authority

A

Citing Position, Responsibility or affiliation that grants the attacker the authority to make the request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Intimidation

A

Suggesting you may face negative outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Consensus

A

Claiming that someone is in a similar position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Famililarity

A

Attempting personal connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trust

A

Citing Knowledge and experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Urgency

A

Time sensitivity that demands immediate action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Spear Phishing
Targets Specific group of users
26
Whaling
Targets high level executives
27
Vishing
Voice based Phishing
28
Smishing
SMS based messaging
29
Pretexting
Attacker tries to convince a victim to give up information of value, or access to a service or system
30
Watering Hole
Attackers compromise a legitimate website frequently visited by a target grou
31
Brand Impersonation
Attacker creates websites, social media accounts, or email that closely resemble those of a legitimate brand
32
Typosquatting
Typing incorrect website address. URL Hijacking
33
Vulnerability
Weakness in system
34
Threat
Potential event that could exploit the vulnerability
35
Exploit
Specific Method/tool used to take advantage of a vulnerability
36
Attack
Actual attempt
37
Buffer Overflow
Exist when a developer writes code that does not validate user input to ensure it does not allow input that is too large. Prevent this with Input Validation and Prevent this by software training.
38
Memory Injection
Maliciously inserting information into memory is known as memory injection. This is primary goal of buffer overflow
39
Integer Overflow
Putting too much information into small space
40
Race Condition
Systems behaviour is based on sequence or timing of uncontrollable events
41
Time of Check
Moment a system verifies access permission or other security controls
42
Time of Use
Moment when the system accesses the resources or uses granted permission
43
SQL Injection
Use unexpected input to a web application to gain unauthorised access to an uderlying database
44
Cross Site Scripting
Malicious scripts are injected into otherwise benign and trusted websites through input field
45
Firmware
Firmware attacks can occur through the update process or one of malicious downloads, impacting the boot process
46
End of life
Aging equipment that has some usable lifespan left
47
Legacy
Hardware, Software that are unsupported
48
Server Virtualisation
Is the process of dividing a physical server into multiple unique and isolated virtual servers by means of software applications (hypervisor)
49
Resource Reuse
When cloud providers take hardware resources originally assigned to one customer and reuse them with another customer
50
Rooting and Jailbreaking
Remove the vendor restrictions on a mobile device
51
Zero day
Attack that uses a vulnerability that is either unknown to everyone
52
Trojan
A software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network
53
Spyware
Software designed to monitor and steal a users activity without their knowledge
54
Worm
Self replicating program that spreads itself across network, infecting other computers
55
Bloatware
Unnecessary software pre-installed on a device
56
Keylogger
Software or hardware that records every keystroke typed on a computer
57
Multipartite virus
Use more than one propagation technique
58
Stealth Viruses
Hide themselves by actually tampering
59
Polymorphic Viruses
Modify their own code as they travel
60
Logic Bomb
Malicious code designed to trigger a specific action at a predetermined time or even
61
Rootkit
Provides attacker Privileged Access
62
Denial of Service
Is a resource consumption attack intended to prevent legitimate activity on a victimised system
63
DDOS
DOS attack multiple compromised computers
64
Reflected DDOS
Attacker sending request to third party server with a spoofed source IP address
65
Amplified DDOS
Reflection techniques in combination with amplification
66
DNS Poisoning
Attacker alters the domain name to IP address mappings in DNS system. May direct traffic to a rogue system or perform Denial of service
67
DNS Spoofing
Attacker sends false replies to a requesting system beating real repy from valid DNS server
68
Domain Hijacking
Change the registration of a domain through technical means
69
Bluejacking
Push unsolicited message
70
Bluesnarfing
Data theft using Bluetooth
71
Blue bugging
Backdoor attack before returning control of the phone to its owner
72
Evil Twin
Malicious Access point set up to appear to be legitimate trusted network
73
Rogue Access Points
Access Points added to your network either intentionally or unintentionally.
74
On Path attack (Man in the Middle Attack)
Attacker between 2 endpoints and is able to intercept traffic
75
Credential Replay
Stealing or Capturing legitimate login credentials
76
Directory Traversal
Gain access to restricted directories . Command Injection attack is used to carry Directory traversal
77
Collision Attack
Two inputs that produce the same hash value. MD5 is known for collision
78
Downgrade Attack
Protocol that is downgraded from higher mode to lower mode
79
Birthday attack
Attempt to find collision in hash function. Targets Digital Signature
80
Password Spraying
Single password for many different accounts
81
Mobile App Management (MAM
keep personal and business data separate
82
Mandatory Access Control
Determined by the system and not the object owner
83
Discretionary Access Control
Permits the owner or creator of an object to control and define accessibility. NTFS file permission
84
Non discretionary access control
Enables the enforcement of system wide restrictions that override object specific access control
85
Rule based Access control
Rules define the traffic
86
Role Based Access control
Well defined collection of name job control
87
Application Allow lst
Explicitly allowed application
88
Application Deny
Not restricted will be allowed
89
Hardware Root of Trust
A line of defence against executing unauthorised firmware. It verifies keys match before the secure boot process
90
Trusted Platform Module
Chip on the motherhood. Multipurpose for securing keys and FDE
91
Extended Detection and Response
Includes Network devices, cloud infrastructure, IoT devices
92
HIPS - Host based intrusion prevention system