Midterm Flashcards

(54 cards)

1
Q

Threat

A

Potential dangers to a system’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit

A

Method of attack to cause harm to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability

A

Weakness in a system that can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controls

A

Measures implemented to mitigate risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Motives

A

Why they do it, money, power, control, fame, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Arms Races

A

Constant battle between attackers and defenders in the cybersecurity realm. Attackers develop new methods to breach security, defenders respond with countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Chicken/Egg

A

Which should come first; implementing security measures or responding to security threats.
You can’t trust software because its pretty hard to make every single component yourself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Existence of Absolutes

A

In computer security nothing is absolute. Vulnerabilities can exist even in the most secure systems, and attackers continuously find new ways to exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality

A

Ensures that data is only accessible to to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity

A

Ensures that data is accurate and unaltered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

Ensures that data is accessible any time when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Three Goals of Cybersecurity

A

Confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Confidentiality Examples

A

Encryption, authentication(passwords, biometrics), NDA policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integrity Examples

A

Offline backups, blockchain, digital signatures, hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability Examples

A

load balancing, backups, hot sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SetUid Model

A

Allows users to execute a program with the permissions of the program’s owner. Useful for programs/tasks that change password or file accesses, without needing to grant them full administrative access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Purpose of Bounds Checking

A

Ensures that data stays within the boundaries of allocated memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Arrays

A

More efficient but have fixed sizes. This makes them vulnerable to buffer overflows, off by ones, etc. Lack of runtime bounds checking in some languages. So they can be exploited to read data outside the array’s memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic Memory

A

Some bounds checking done as part of the allocation process. Pointers unlikely to point at anything ripe to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Inheritance

A

Can propagate vulnerabilities from parent classes to child classes if not properly managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Security Through Obscurity

A

Security by means of hiding implementation details. Flawed way of thinking. Bad actors always have the time and drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Policy Based Security

A

Defining rules and regulations that dictate how data, software, and infrastructure of a system should be accessed, used, and protected within an organization.

23
Q

Policy Based Security Examples

A

Coding policy/guide, use dynamic arrays if possible, proactively keep and check array bounds for fixed arrays, peer reviews, code reuse, code audits

24
Q

Fortress Defense

A

Makes it difficult and time consuming for attackers to breach in the system. Primarily focused on access controls.

25
Fortress Defense Examples
Host configuration, ACLs, authentication, role-based access controls, sandboxing, firewalling, MAC, DAC, domain type enforcement
26
Host Configuration
Refers to the setup and configuration of a system such as settings, permissions, installed programs, and etc.
27
Firewalling
A firewall is an application/device that monitors and controls incoming and outgoing network traffic. They inspect data and determine if the data us allowed or blocked depending on rules set.
28
ACL
Access control list. Rules or criteria that determine whether an entity is allowed or denied access to a resource or service. Filesystem ACL and Network ACL.
29
Authentication
Verify identity of a user. Can use passwords, multi factor authentication (MFA), certificates, and etc.
30
Role Based Access Controls
Assigns permissions to users based on their role within an organization.
31
Sandboxing
Running applications or processes in a controlled environment (such as a VM) to limit their access to system resources.
32
MAC
Mandatory Access Controls. A security model where access controls are determined by the owner of the information. Access controls are immutable. Access control info travels with user and data.
33
DAC
Discretionary Access Controls. Alterable access controls. Typically in a filesystem level, API level. You have to trust users because they can make copy of data with new ACLs
34
Domain Type Enforcement
Often called capabilities. Access controls at the programming interface level. Detailed divison of labor, roles, and duties. Can add a level of protection against software bugs. Example: only shells and certain processes can fork or execute
35
Fortress Defense Evasion Techniques
Encapsulation, spoofing (using another’s address or identity), breach of physical security, extortion, exploit encoding and encapsulation and fragmentation
36
Time-Based Defense
To detect and react appropriately. Involves implementing measures to detect and prevent security breaches in real time.
37
Anti-Virus Software
Detect and remove malicious software such as bugs, worms, trojans, etc. Works by scanning files and comparing them against a database of known malware signatures, mire advanced forms use behavior detection.
38
Network Intrusion Detection/Prevention
NIDS/NIPS. Monitors lots of network traffic and identifies anomalies which are then blocked. Can be evaded by cryptography.
39
Host Based(Time Based Defense)
Ability to monitor and identify many system-level events.
40
Time Based Defense Evasion Techniques
Cryptography, encapsulation, fragmentation
41
Denial of Service
Many forms: disrupt services by overwhelming the target system with excessive requests, input validation problems
42
Good Defense Plan
Careful planning, fortress defense tactics, detection and reaction capabilities
43
Offense: Enumeration
Gathering information about your targets.
44
Passive Enumeration
Stealth: Web searching, public directories, packet sniffers, social engineering
45
Active Enumeration
Directly interact with victim, can be traced/alerted: Ping-sweeps, port-scanners, get OS version, use client software
46
Offense Strategies
Privilege escalation, memory corruption, remote code execution/injection DoS
47
Vulnerabilities of a System
Buffer overflows, oversights in design, input validation failures, race conditions, hardware, lack of access controls, lack of encryption, misconfigurations
48
Buffer Overflows and Underflows
Allows memory corruption of same process memory, can be used to inject code or elevate privileges
49
Injecting code/shellcode
Injecting malicious code into a system using vulnerabilities like buffer overflows, SQL injections, etc.
50
Oversights
Mistakes during development or configuration in a system that can add vulnerabilities. Examples: no input validation, not applying security patches, etc.
51
Input Validation Problems
When applications fail to properly validate user input. Ex: SQL injections, script injections, buffer overflows
52
Race Conditions
When the outcome of a system’s event depends on time or sequence, it can lead to vulnerabilities.
53
Hardware Security Holes Examples
Cosmic rays, memory tightly packed leading to leaks, adjusting CPU frequency can make you see data or tamper with higher levels of execution
54
Misconfigurations
When a system is not properly configured to enforce security rules. Blame is on the new or poorly trained person