exam Flashcards

1
Q

The MITRE ATT&CK frameworks contain domain-adapted knowledge of attacker
tactics and techniques e.g. for enterprise systems or industrial control systems. Its
main use is to place detected adversary activity within a framework, which allows
the identification of likely related activities and indicators of compromise.
Can such a framework also be utilised to synthesise attack patterns such as for use in
training exercises? Give a reasoned answer why this may or may not be
appropriate. [25]

A

negative: the matrices are restrained in how the attack is constructed and its hard to discern the intent of the attacker. (which is critical for apt style attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In assessing the criticality of a given node in a network, a number of centrality
metrics can be used. Two examples of such metrics are vertex degree centrality (i.e.
counting the number of directly adjacent nodes to a given node) and betweenness
centrality (i.e. ranking vertices by the number of shortest paths between other
vertices in the graph that contain the given node).
Assume that we know that a given network is characterised by a power law degree
distribution. Which metric would be the preferred metric to determine the criticality
(e.g. overall loss of connectivity in case of failure or attack) of a node? Include both
the accuracy of the metric and the computational cost in your considerations and
give a reasoned answer. [25]

A

> In this case, both are similar
in a power law distribution, paths between non adjacent vertices will need to traverse higher degree vertices
we choose degree centrality because counting adjacent nodes is less costly than calculating several shortest paths per vertices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Input-Output Inoperability model proposed by Haimes and Jiang allows the
study of interconnected systems to determine the degree to which a particular
component or sector is affected (i.e. its level of dysfunction, such as the fraction of
intended production or service level).
For this, the model requires the availability of an interdependency matrix capturing
how each component (sector) depends on all others.
Identify and briefly describe two examples of limitations of the IIM for capturing the
impact of an attack. [25]

A

Issue 1:
IIM only captures a linear combination of inputs.
this is appropriate for absolutes like physical items but can be limiting for services with nonlinear dependsencies

Issue 2:
IIMs only consider settles, steady dependencies. They do not capture the immediate effects of disruption or any attempts and successes at substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Consider a company for which Internet connectivity, particularly to globally
distributed partners and suppliers is essential.
Explain why in this case the selection of multiple, redundant Internet Service
Providers (ISP) for connectivity is critical, and which metrics and questions the
company should approach each ISP with in order to ascertain that a given
combination of providers offers adequate levels of resilience and redundancy. [25]

A

The main problem is the AS connectivity of the provides via BGP.
just having several neighbours is not enough: we need to know that the paths of different providers are vertex disjoint and that there are several paths, so that if a vertex or segment goes down, we still have paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describe a power law distribution

A

> most vertices have a small degree
the number of nodes with a high degree decreases exponentially, they don’t follow a normal distribution
these high degree nodes are called HUBS

also known as scale free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is BGP?

A

Border Gateway Protocol
> used for routing in the internet
> every network needs a unique AS (Autonomous System) number
> every AS is connected to 2+ other ASs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe AS connection

A

each AS has several border gateways

each border gateway is a router that connects to a specific border gateway in another AS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A well-resourced adversary wishes to both discredit the product quality of a
vaccine manufacturer and to steal trade secrets from the R&D system at the
same time.
Assume that the relevant R&D data is held on a separate network not
connected to the Internet. How can the adversary learn about the
location of the data and successfully exfiltrate these if only a remote cyber
attack is possible?
Give a description of possible steps taken by the adversary beginning with
intelligence gathering; do not merely reproduce a generic framework, but
address how such an air-gapped system can still be compromised

A

> they don’t want to disrupt the network, just retrieve information from it
the network is air gapped but still has several vulnerabilities.
Seeing as we just want info, gaining access to a company computer that has the ability to request info from the database is enough to retrieve whatever we need.
if we know what information we want precisely and just need proof to discredit the company, the attack could be as simple as sending a phishing email to an employee and convincing them to send the information, or using the email to gain access to their system to see the information
there are some constant vulnerabilities no matter how protected a network is, like external connections and the people with access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To discredit the product quality, the attacker identified
seeks to disrupt production processes in such a way that quality control
processes will detect anomalies.
The attacker could not penetrate into the production system, but has
successfully compromised systems on the business network also used to
prepare shipments of the vaccine to an independent testing laboratory.
Can a manipulation of systems and databases call the product quality
into question? Briefly identify a scenario and elaborate how the adversary
would achieve a violation of quality requirements.

A

The vaccine process is likely automated, from the production of vaccines, to the regulation and the testing. If the data at any one of these stages is accessed and changed, it calls the quality into question and can discredit the effectiveness of the whole batch of vaccines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which insights can the target of a persistent attacker obtain by setting up a second, air-gapped
system without the actual production facilities? Which additional measures
would be required for such a decoy to be effective?

A

> it would have to be unknown to employees as a decoy
its data would need to formatted the same as the actual data
everything should be the same except its actual contents
it should be audited to know who has attempted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define a network

A

a collection of nodes and connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a diagram with edges on one axis and vertices on the other called?

A

incidence matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Isomorphism?

A

G1 and G2 are isomorphic if there exists a 1-1 mapping V1 -> V2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

define a walk

A

a sequence between nodes going through vi, vi+1, vi+2 …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

define a trail

A

a walk with distinct edges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

define a path

A

a walk with distinct vertices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is w(G)

A

the number of components in G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is a component?

A

a subgraph such that it is not a subgraph of anything but the graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

when is V* a vertex cut?

A

if w(G - V*) > w(G)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

when is E* an edge cut?

A

if w(G - E*) > w(G)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is k(G)?

A

the size of a minimal vertex cut. G is k connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is lambda(G)?

A

a minimal edge cut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the preliminaries of Menger’s Theorem?

A

a graph G where u and v aren’t adjacent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is menger’s theorem?

A

the minimum number of vertices in a vertex cut that disconnects u and v = the max number of pairwise vertex-independent paths between u and v. (same for edges)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

when is G k connected?

A

if k is the minimum number of vertex independent paths (same for edges)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

when is a graph strongly connected?

A

every vertex connects to every other vertex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

when is a graph weakly connected?

A

when the undirected graph is connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is a circuit?

A

a closed walk that touches every edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is an Euler circuit?

A

a closed walk where all edges are traversed once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is a hamilton path?

A

a path containing every vertex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what is a hamilton cycle?

A

a cycle containing every vertex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

when is a graph hamiltonian?

A

when it contains a hamilton cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Eccentricity?

A

e(u): max{d(u,v) l v is in V(G)}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is radius?

A

rad(G): min{ e(u) l u is in V(G)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what is diameter?

A

diam(G): max{d(u,v) l u, v are in V(G)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is the characteristic path length of a graph?

A

the median of the shortest paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what is the clustering coefficient?

A

the degree to which nodes cluster together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

concerning robustness of networks, what is true if p <= (1-e)/n?

A

the size of the components is around logn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

concerning robustness of networks, what is true if p > (1+e)/n?

A

there is 1 giant component with other components tending toward O(logn)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

concerning robustness of networks, what is true if p = 1/n?

A

the number of vertices in the largest component is proportional to n^(2/3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

where average degree is k:

what is true when k < 1?

A

clusters will be small and isolated, diameter is small, paths will be short

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

where average degree is k:

what is true when k = 1?

A

a giant component arises, diameter peaks, paths are long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

where average degree is k:

what is true when k > 1?

A

almost all nodes are connected, diameter is small, paths are short

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what is robustness in networks>

A

what fraction of edges or vertices would need to be removed to create a partition?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

what is the clustering property of ER graphs?

A

they have a low clustering coefficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Describe the Watts-Strogatz Algorithm

A

V is a set of vertices, k is even, n>k>ln(n)>1

  1. order n vertices into a ring
  2. connect each v to its k/2 left and k/2 right neighbours
  3. with probability p, replace < u , v> with < u , w > that doesn’t exist in G
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

what is the risk equation?

A

risk = probability * expected loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

define risk

A

the potential that a given threat will exploit vulnerabilities of an asset and cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

(FMEA) define basic functions

A

verb/noun descriptions of required critical system functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

(FMEA) define secondary functions

A

verb/noun descriptions of required non-critical system functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

(FMEA) define failure mode

A

description of a failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

(FMEA) define failure effect

A

impact of the failure on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

(FMEA) define failure cause

A

the cause of the failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

(FMEA) define occurence

A

rate at which the first level cause will occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

(FMEA) define detection

A

likelihood that controls will detect the failure mode during development or operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are the 3 steps for FMEA?

A
  1. functional analysis
  2. identification of failure modes
  3. determination of severity, occurrence, criticality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

describe FTAs

A

Fault and Attack trees.

system oriented, top down analysis approach. most common for casual analysis

58
Q

what are the 4 steps for attack tree construction?

A
  1. select a system level failure and assign it top event
  2. investigate immediate causes
  3. repeat recursively until component failures are identified
  4. group immediate, necessary, and sufficient causes with logic gates
59
Q

what is Qo(t)?

A

probability(top event occurs at time t)

60
Q

what is qi(t)?

A

probability(event i occurs at t)

61
Q

what is Ei(t)?

A

event i occurs at t

62
Q

What does FTA do and not do?

A

distinguishes events but doesn’t describe attacks

63
Q

define non-repairable

A

a defect can’t be remedied. modelled by failure rate lambda i

64
Q

define repairable

A

a defect can be remedied. qi(t) = lambda i * MTTRi

65
Q

what is MTTRi?

A

mean time to react to i

66
Q

define periodical testing

A

a unit i is tested periodically at fixed intervals T

67
Q

periodical testing formula

A

qi(t) = (lambda i * Ti) / 2

68
Q

What are the limitations of attack trees?

A

> they’re static, so they can’t capture attacker/defender interactions
they require formal syntax and semantics definitions

69
Q

describe attack defence trees

A

they incorporate attack noes and defence nodes

can be refined for further detail until a basic action is reached

70
Q

describe attack countermeasure trees

A

they consider defensive and mitigating measures

minimum cut = attack countermeasure scenarios

71
Q

What does game theory model?

A

adversarial and co-operative behaviour

which strategy to employ

72
Q

describe game theory peoperties

A

> actions are views as variables
there are constraints on joint behaviour of variables
interested in strategy not probability
assumes players are rational and selfish

73
Q

describe equilibrium in game theory

A

> no player has incentive to deviate
all players know all matrices
no communication between players

74
Q

when is product distribution in nash equillibrium?

A

if for every player i and every mixed strategy p’i:

Ea~p[Mi(a)] >= Ea~p[i:p’i][Mi(a)]

a game may have multiple NEs

75
Q

when is state required in game theory?

A

when previous rounds are considered

76
Q

What are petri nets?

A

a family of formalisms that allow intuitive graphical and mathematical modelling of concurrency

77
Q

what are graphical representations of petri nets used for?

A

communicating complex process behaviour

78
Q

what are mathematical representation of petri nets used for?

A

precise analysis and automation of analysis

79
Q

what is the main benefit of petri nets?

A
  • the ability to capture concurrent behaviour

- giving natural formalisation for distributed and parallel activity that can also be non deterministic.

80
Q

What does the graphical petri net model look like?

A

a bipartite graph with:
> place nodes for resources and states
> transition nodes for transitional and events

81
Q

when is transition t enabled in a petri net?

A

t is enabled in a marking if for every edge place p -> t there exists a distinct token in the marking

82
Q

what are the results of firing a transition?

A

> 1 token is removed from any p for every edge pt

> 1 token is added from any p for any edge tp

83
Q

Describe Hierarchal Petri Nets

A

they allow the decomposition of complex networks into assemblies
low level details can be hidden for decision making

84
Q

describe coloured Petri nets (CPNs)

A

they allow tokens to have value, and are therefore more compact

85
Q

describe timed petri nets

A

petri nets where time is incorporated

86
Q

(Control Systems) define process

A

a set/sequence operation using resources to transform inputs into outputs

87
Q

(Control Systems) define manipulated variable

A

the parameter of a process that is manipulated by the control system

88
Q

(Control Systems) define final control element (FCE)

A

a component changing a MVs value

89
Q

(Control Systems) define controller output

A

a signal from the controller to the FCE

90
Q

(Control Systems) define process variable

A

a measurement variable that changes in response to the MV changing

91
Q

(Control Systems) define set point

A

value the PV tries to maintain

92
Q

(Control Systems) define actuator

A

mechanism for translating a controller output into physical changes

93
Q

(Control Systems) define detector

A

translates physical variables into MVs

94
Q

(Control Systems) define transducer

A

a device receiving information in 1 form and translating it to another

95
Q

(Control Systems) define transmitter

A

a transducer responding to a MV via a sensor and converting it to a standardised transmission signal thats a function of the MV

96
Q

(Control Systems) define controller

A

a device that operates automatically to regulate a controlled variable

97
Q

(Control Systems) define Process Control

A

the act of controlling FCEs to change MVs so as to maintain PVs at desired Set Points

98
Q

describe an open loop control system

A

the simplest for of control system. relies only on the model and current state of the system.
it is cheap to implement and does not rely on feedback.

99
Q

in which situation is an open loop control system appropriate?

A

in highly predictable and non critical environments disturbances are not taken into account

100
Q

how do you make an open loop system into a closed loop system?

A

add a feedback loop and a process variable to be monitored

101
Q

what are the 3 stages of designing a closed loop control system?

A
  1. modelling
  2. analysis
  3. design
102
Q

What are some points that are considered in control system analysis?

A

does it overshoot or undershoot resulting in oscillations

103
Q

how are oscillations handles?

A

by dampening. Strong dampening limits the speed and magnitude of the control systems response.

104
Q

describe observability in control systems

A

a system is observable if its state can be determined by its outputs in finite time

105
Q

what re some problems with non linear control systems?

A

> no superposition
may have multiple, isolated equilibrium points rather than just 1
can have a finite escape time if unstable

106
Q

what is the main problem with actuators and sensors?

A

they can be manipulated and are subject to wear and tear.

107
Q

define accuracy

A

how close to the true value a result is

108
Q

define precision

A

how similar the results are when a process is repeated

109
Q

what pattern do errors usually follow?

A

normal distribution

110
Q

How is bias compensated for in control systems?

A

via calibration. But calibration may be manipulated

111
Q

What are the downsides of a processing unit in a control system?

A

it allows more flexibility for the attacker

112
Q

what are the downsides of intelligent sensors in a control system?

A

it enables a number of attacks that can’t be detected by simple statistical tests

113
Q

what are possible attacks on actuators?

A

physical manipulation can change the gain achieved and can restrict the range of the actuator

114
Q

What are the 2 most severe control systems problems?

A

loss of view and loss of control

115
Q

CNE

A

computer network exploitation (intelligence seeking)

116
Q

CNA

A

computer network attack (offensive)

117
Q

what are the 7 cyber kill chain steps?

A
  1. reconnaissance
  2. weaponisation
  3. delivery
  4. exploitation
  5. installation
  6. command and control
  7. actions on objectives
118
Q

what are the 6 kill chain steps?

A
F2T2EA
find
fix
track
target
engage
assess
119
Q

what was MITRE ATT&CK originally formulate for?

A

to describe both attacker and defender behaviour

120
Q

TTPS

A

tactics, techniques, and procedures

121
Q

what is the MITRE ATT&CK framework structure?

A

matrices -> databases -> technique records -> details

122
Q

what are the key uses of the MITRE ATT&CK framework?

A
> threat intelligence mapping
> gap identification
> incident support
> threat hunting
> red teaming (reverse engineering attacks)
123
Q

APT

A

advances persistent threat

124
Q

What is a direct defence to the cyber kill chain?

A

cyber kill chains are intelligence driven so intelligence should be monitored and limited

125
Q

what is the principle of battlefield terrain analysis?

A

defenders know their terrain and can exploit the fact that attackers don’t

126
Q

what are the 5 main aspects of battlefield terrain analysis?

A
> observation and fields of fire
> cover and concealment
> obstacles
> key terrain
> avenues of approach
127
Q

how can users help defend against the cyber kill chain?

A

they can notice and report delivery mechanisms

128
Q

describe an APT

A

> structured

>targetted

129
Q

What is a honeypot?

A

machines providing replicated services

130
Q

What is a honeynet?

A

network segments with dissimulative services or data

131
Q

What is a honeyfile?

A

an audited file no one should have to access

132
Q

what is a honey record?

A

a honey file for databases

133
Q

what is a honey user?

A

user account or even just hash values that can serve as alert sources and decoys

134
Q

How are critical infrastructure interdependencies modelled graphically?

A

with directed graphs

135
Q

what is centrality?

A

the proximity of a node to other nodes

136
Q

what is betweenness?

A

the total number of oaths that pass through a node

137
Q

what is a local clustering coefficient?

A

the fraction of edges between immediately connecting neighbouring vertices over the number of possible edges

138
Q

where is agent-based modelling used?

A

where the state and behaviours of the vertices must be captured. used when we know the conditions.

139
Q

what does agent-based modelling require?

A

a precise description of the behaviour of each agent based on current state and external influences which may not always be completely known.

140
Q

Describe Game Theoretical Models

A

> capture interaction
of interest where conventional adversary models may be too strong
assumes that the adversary is acting optimally for the available information